SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 120
DESIGN AND IMPLEMENTATION OF SECURED SCAN BASED
ATTACKS ON IC’S BY USING ON CHIP COMPARISON
G.Nalini.Krishnakanth1
, K. Jyothi2
1
PG student (VLSI&ES), GIET, Rajahmundry, India
2
Associate Professor, ECE Dept, GIET, Rajahmundry, India
Abstract
Physical designing of cryptographic analysis is subjected to various physical attacks. It has been formerly evidenced that scan
chains introduce for hardware testability open a back door to potential attacks. Scan based testing technique is mainly used for
testing and it provides full observabilty and controllability of the inner nodes of the IC. Therefore, in this paper, we propose a
scan-protection scheme that provides testing facilities both at assembly time and over the course of the circuit’s life. An efficient
principle is used to scan-in both input vectors and expected responses to compare expected and actual responses inside the
circuit. This method has no impact on the feature of the test or the model-based fault analysis when compared to traditional scan
tests. It occupies less area on the chip and avoids the authentication test mechanism.
Keywords- security, testability, Design-for-testability (DFT), scan-based attack, test pattern generator
---------------------------------------------------------------------***--------------------------------------------------------------------
1. INTRODUCTION
Many features of our daily lives rely on electronic data
interchange. Encryption algorithms are used to guarantee the
confidentiality, integrity, and validity of these exchanges.
These algorithms are implemented on dedicated hardware
for performance optimization and to embed confidential
information, which must be kept secret from illegal users.
Imperfect production processes of electronic devices lead to
the need for manufacturing testing to sort out defective
circuits from good quality ones, whatever be the aim
application. This is even more relevant for secure circuits
where a physical fault could jeopardize the security of the
classified information. However, the most common practice
for testing digital devices relies on a scan-chains insertion
that guarantees high fault coverage and thus an ultimate
product quality, but open backdoors to security threats too.
The “Scan attacks” described for instance in [1] and [2]
utilize the access offered by scan chains’ IOs for retrieving
the secret key of an encryption core. These attacks rely on
the possibility to observe the circuit’s internal state while
this state is related to the secret.
A common industrial practice to solve this security threat is
to physically disconnect the scan chains after production
testing by blow the fuses located at both ends of the scan
chains. However, this solution impedes the testing of those
devices require being tested after manufacturing. In
particular, the correct performance of the secure circuits
should be validated after the introduction of the secret key,
which can be programmed at any time of the circuit’s life
cycle. This secured information can indeed be owned by any
circuit producer (e.g., designer, manufacturer, and system
integrator) or user (e.g., reseller or final customer). In
addition, scan disconnection stops any further analysis, e.g.,
diagnostic, or cannot be considered as an appropriate
response to the scan attack if the connection can be
reconstructed. In the literature, several solutions have thus
been proposed to avoid disconnecting scan chains after
manufacturing testing. However, the solutions are either
expensive or not fully safe against latest scan attacks.
In this brief, we explain new design-for-testability (DFT)
architecture that eliminates the need to separate the scan
chains. This approach is based on the concept of
maintenance information. The test procedure consists in
providing both the test vectors and expected test responses
to the device-under-test (DUT) for an on-chip comparison.
Methods for the on-chip comparison of actual and expected
test responses have already been explored in other contexts
[3]–[6], mainly to lessen the test data volume to transfer
from DUTs to test equipment. However, none of these
solutions achieve the target security requirements since
individual bit values stored in the scan chains can still be
observed or deducted from observed data, thanks to the test
circuitry. Because testability features must not be
implemented to the detriment of the security of the circuit,
and vice versa, this brief also discusses test and diagnostic
procedures with our DFT proposal, as well as security of the
circuit with respect to attacks perpetrate on the test
infrastructure.
Cryptography is the science of secure communication and
information protection from unauthorized access.
Cryptography enables communicating parties to exchange
information securely over an insecure channel. Modern
cryptography not only applies to secure communication, but
also has applications in software security, security of
electronic devices (smart cards, RFIDs, memories, etc.),
data protection (disk encryption), copyright protection
(Digital Rights Management (DRM)) and more. Examples
include RFID based access control systems, authenticating
users for bank transactions using smart cards supporting
cryptographic protocols, and full hard disk encryption
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 121
employing symmetric-key cryptography. Cryptography as a
technology can be used to provide the following security
properties: confidentiality of data, data integrity, entity
authentication of the sender and the receiver, and non-
repudiation of sender and receiver, among others [89].
Various cryptographic primitives and protocols can help in
attaining these objectives. Though the mathematical or
theoretical strength of these primitives can be quite high,
their implementations in hardware or software are prone to
information leakages. Cryptographic implementations in
hardware and software need to be protected against attacks
aimed at revealing the secret information stored within
them. Hardware attacks can be characterized as follows:
Active or passive attacks: active attacks require the attacker
to tamper or troubles bate the device internals (by probing,
laser impingement, etc.) and derive the secret data from the
observed response. Passive attacks require the attacker to
only observe passively and infer the secret from the
observed behavior by exploiting one or more physical
characteristics of the device when it is in operation. Some of
these characteristics include power consumption,
electromagnetic radiation, execution timing, or the data
coming in or out of the external interface. Invasive, semi-
invasive or non-invasive attacks: invasive attacks require
opening the device package and contact the electronic
circuits inside; semi invasive attacks also require opening
the device package but no contact to the internal circuits is
needed, while non-invasive attacks do not require
modification of the device package.
Scan has been generally accepted as the standard method of
testing chips due to high fault coverage and relatively lower
area overhead. Inserting scan-chains while designing the
chip requires a few additional/multiplexed pins to the
primary inputs/outputs to serve as the scan-enable, scan-
inputs and scan-outputs. Internally, there is little impact on
the design since the standard flip-flops (FFs) are replaced by
scan flip-flops (SFFs) (i.e., flip-flops with an input
multiplexer) which are then linked to one another creating a
shift register (scan chain). An example of a scan chain is
shown in the Figure 1. Scan-enable selects between
functional and test mode operations. It controls each
multiplexer, choosing between the normal mode input of the
FF or the output of the previous SFF in the chain.
Fig .1 Scan Chain DFT Structure
A brief summarization of the proposed scheme is explained
as below.
Section II discuss the Security Analysis and Testability of
the proposed scheme along with the existing scheme,
Section III representing the Test Pattern Generator, Section
IV explains the Simulation results for the Proposed secure
comparator Using Test Pattern Generator and finally,
Section V concludes on this brief.
2. SECURITY, TEST, AND DIAGNOSTIC
ISSUES
This section discusses the security improvements related to
the observation of a single pass/fail result as well as issues
related to test and diagnosis.
2.1 Security Analysis
The role of the proposed Secure Comparator is to avoid the
observation of SFFs containing secret information. If the
result of the comparison was accessible at each clock cycle
instead of each test vector, an attacker could easily observe
the scan chain content by shifting in “000…000” on the
Sexp pin. Each bit-comparison would then validate that
either the actual bit was “0” when Test Res = 1 and vice
versa. On the contrary, with the proposed vector-wise
comparison, the only way to retrieve the sensitive data
information is to apply a brute-force attack by trying every
possible response until Test Res is asserted. This attack
would thus require 2#SFF attempts. If other attacks such as
side-channel attacks [16] or faults attacks [17] are dreaded,
the Secure Comparator has to be protected as the rest of the
circuit. Even if countermeasures can lead to a large area
overhead (e.g., [18]) their implementation concerns a very
small part of the circuit.
2.2 Testability
The secure comparator does not impact the fault coverage.
In fact, each test response is compared to the expected one
as in a classical ATE-based test scheme. Therefore, the
achievable fault coverage is not altered. Test time is not
increased either, since the expected responses are scanned-in
at the same time as the next input vector is scanned-in.
Concerning the test of the Secure Comparator itself, any
DFT technique controlled by the external ATE (e.g., a
dedicated scan chain to test the counter of the Output
Enabler) would jeopardize the overall security.
Nevertheless, the Secure Comparator can be totally tested by
using only its inputs (Sen, Sexp, Sin, Test Res). We have
identified a procedure to test all stuck-at faults no matter of
the size of the Secure Comparator. This functional test
involves the comparison of the actual SFF values with a
partially matching, a fully un-matching, and a correct
response. Moreover, it includes the application of a two un-
matching responses without the intermediate capture cycle,
and twice the execution of the capture cycle. This test
procedure requires 6· (#SFF+1) clock cycles to provide
100% stuck at fault coverage.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 122
Fig 2 Proposed secure comparator Using Test Pattern
Generator
A limitation of our technique is related to the presence of
possible unpredictable values in the SFFs. Computing
expected values for the on-chip comparison is indeed no
longer possible. To fix this limitation, the Sticky
Comparator should ignore the comparison result (and keep
unchanged its flag) when Sout is unknown. This can be
implemented by providing an additional mask signal that is
asserted when needed. However, an attacker must not be
able to mask as many bits as wanted. In fact, if it were
possible to mask all but one bit, it would be obvious to
discover the value of each single bit in the scan response.
This would reduce the complexity of the brute-force attack
from exponential [O (2#SFF)] to linear [O(#SFF)].
Therefore, the number of masked bit (per test vector) must
be limited to P such that a brute force attack on 2#SFF−P
remains unfeasible. The extra cost to tolerate unknown
values includes an extra pin for the mask, a log2 P counter
to limit the number of masked bits and two logic gates. Fig.
2 shows a possible implementation.
3. TEST PATTERN GENERATOR
Using Linear Feedback Shift Registers (LFSRs)
Efficient design for Test Pattern Generators & Output
Response Analyzers FFs plus a few XOR gates better than
counter
• Fewer gates
• Higher clock frequency
Two types of LFSRs: Exterior Feedback, Internal Feedback
• High clock frequency
An LFSR generates periodic sequence must start in a non-
zero situation, The maximum length of an LFSR sequence is
2n -1 does not generate all 0s pattern The characteristic
polynomial of an LFSR generating maximum-length
sequence is a primitive polynomial A maximum-length
series is pseudo-random: number of 1s =number of 0s + 1
same number of runs of successive 0s and 1s 1/2 of the runs
have length1 1/4 of the runs have length 2 (as long as
fractions result in integral numbers of runs).
Fig .3 Linear Feedback Shift Registers
A hardware test pattern generator(TPG) generated by the no
of flip-flops cascading. These flip-flops are cascaded depend
upon the polynomial which are used for the development of
the test pattern generator the expected sequences are
developed from the polynomial construction of LFSR.
Table 1: Proposed area reports
Device Utilization Summary (estimated
values)
[-]
Logic Utilization Used Available Utilization
Number of Slices 2 2448 0%
Number of Slice Flip
Flops
4 4896 0%
Number of 4 input LUTs 1 4896 0%
Number of bonded IOBs 3 108 2%
Number of GCLKs 1 24 4%
Table 2: Existing area reports
Device Utilization Summary (estimated
values)
[-]
Logic Utilization Used Available Utilization
Number of Slice Registers 21 126800 0%
Number of Slice LUTs 8 63400 0%
Number of fully used
LUT-FF pairs
7 22 31%
Number of bonded IOBs 5 210 2%
Number of
BUFG/BUFGCTRLs
1 32 3%
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 123
4. SIMULATION RESULTS
Fig.4 Block diagram
Fig.5 RTL Schematic Secure Comparator
Fig.6 Technology schematic
Fig.7 Test Pattern Generator
Fig.8 Simulation Results
Fig.9 Delay Report
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 124
5. CONCLUSION
Inserting scan into a secure design implies new approaches
of the technique eventually; applying ones of these
countermeasures has also proven that at a suitable cost, scan
and security can live together. In this paper we do not give
the expected outputs. But in the scan circuit to generate the
expected values by using TPG. Here linear feedback circuit
used for TPG (Test pattern generator). The proposed
approach is based on the idea of withholding information.
The idea is to compare test responses within the chip. Both
input vectors and expected responses are scanned into the
circuit and the compare between expected and actual
responses is done at vector level. It does not provide
information on the value of every individual scan bit for
security purposes. In this paper we proposed a novel DFT
technique for scan design to ensure security not including
relying on costly test infrastructures to switch from mission
to test modes.
REFERENCES
[1]. B. Yang, K. Wu, and R. Karri, “Secure scan: A design-
for-test architecture for crypto chips,” IEEE Trans.
Comput.-Aided Design Integr. Circuits Syst., vol. 25, no. 10,
pp. 2287–2293, Oct. 2006.
[2]. B. Yang, K. Wu, and R. Karri, “Scan based side channel
attack on dedicated hardware implementations of data
encryption standard,” in Proc. IEEE Int. Test Conf., Oct.
2004, pp. 339–344.
[3]. Y. Wu and P. MacDonald, “Testing ASICs with
multiple identical cores,” IEEE Trans. Comput.-Aided
Design Integr. Circuits Syst., vol. 22, no. 3, pp. 327–336,
Mar. 2003.
[4]. K. J. Balakrishnan, G. Giles, and J. Wingfield, “Test
access mechanism in the quad-core AMD opteron
microprocessor,” IEEE Design Test Comput., vol. 26, no. 1,
pp. 52–59, Jan. 2009.
[5]. D. Andreu, “System and method for wirelessly testing
integrated circuits,” U.S. Patent 0 244 814, Oct. 6, 2011.
[6]. F. Poehl, M. Beck, R. Arnold, J. Rzeha, T. Rabenalt,
and M. Goessel, “On-chip evaluation, compensation and
storage of scan diagnosis data,” IET Comput.Digit.Tech.,
vol. 1, no. 3, pp. 207–212, 2007.
[7]. G.-M. Chiu and J. C.-M.Li, “A secure test wrapper
design against internal and boundary scan attacks for
embedded cores,” IEEE Trans. Very Large Scale Integr.
(VLSI) Syst., vol. 20, no. 1, pp. 126–134, Jan. 2012.
[8]. K. Rosenfeld and R. Karri, “Attacks and defenses for
JTAG,” IEEE Design Test Comput., vol. 27, no. 1, pp. 36–
47, Jan. 2010.
[9]. C. J. Clark, “Anti-tamper JTAG TAP design enables
DRM to JTAG registers and P1687 on-chip instruments,” in
Proc. IEEE Int. Symp. Hardw.-Oriented Security Trust, Jun.
2010, pp. 19–24.
[10]. D. Hely, F. Bancel, N. Berard, M. L. Flottes, and B.
Rouzeyre, “Test control for secure scan designs,” in Proc.
IEEE Eur. Test Symp., May 2005, pp. 190–195.
[11]. D. Hely, M.-L. Flottes, F. Bancel, B. Rouzeyre, N.
Berard, and M. Renovell, “Scan design and secure chip
[secure IC testing].,” in Proc. IEEE Int. On-Line Test.
Symp., Jul. 2004, pp. 219–224.
[12]. G. Sengar, D. Mukhopadhyay, and D. R. Chowdhury,
“Secured flipped scan-chain model for crypto-architecture,”
IEEE Trans. Comput.-Aided Design Integr. Circuits Syst.,
vol. 26, no. 11, pp. 2080–2084, Nov. 2007.
[13]. H. Fujiwara and M. E. J. Obien, “Secure and testable
scan design using extended de Bruijn graphs,” in Proc. Asia
South Pacific Design Autom. Conf., 2010, pp. 413–418.
[14]. J. Da Rolt, G. Di Natale, M.-L.Flottes, and B.
Rouzeyre, “New security threats against chips containing
scan chain structures,” in Proc. IEEE Int. Symp. Hardw.-
Oriented Security Trust, Jun. 2011, pp. 110–115.
[15]. L. Chunsheng and Y. Huang, “Effects of embedded
decompression and compaction architectures on side-
channel attack resistance,” in Proc. IEEE VLSI Test Symp.,
May 2007, pp. 461–468.
[16]. P. Kocher, J. Jaffe, and B. Jun, “Differential power
analysis,” in Proc. Int. Cryptol. Conf. Adv. Cryptol., 1999,
pp. 388–397.
[17]. P. Dusart, G. Letourneux, and O. Vivolo, “Differential
fault analysis on A.E.S,” in Applied Cryptography and
Network Security, vol. 2846. New York, NY, USA:
Springer-Verlag, 2003, pp. 293–306.
[18]. A. Moradi, T. Eisenbarth, A. Poschmann, C. Rolfes, C.
Paar, M. T. M. Shalmani, and M. Salmasizadeh,
“Information leakage of flip-flops in DPA-resistant logic
styles,” in Proc. IACR Cryptology ePrint Archive, 2008, pp.
188–188. 2008, pp. 188–188.

More Related Content

What's hot

MRA Analysis for Faults Indentification in Multilevel Inverter
MRA Analysis for Faults Indentification in Multilevel InverterMRA Analysis for Faults Indentification in Multilevel Inverter
MRA Analysis for Faults Indentification in Multilevel InverterIRJET Journal
 
Zigbee based differential pilot protection of transmission line
Zigbee based differential pilot protection of transmission lineZigbee based differential pilot protection of transmission line
Zigbee based differential pilot protection of transmission lineeSAT Publishing House
 
Lab view Based Harmonic Analyser
Lab view Based Harmonic AnalyserLab view Based Harmonic Analyser
Lab view Based Harmonic Analysertheijes
 
Fault Management of Electrical Drives Onboard Ship using Power Line Communica...
Fault Management of Electrical Drives Onboard Ship using Power Line Communica...Fault Management of Electrical Drives Onboard Ship using Power Line Communica...
Fault Management of Electrical Drives Onboard Ship using Power Line Communica...IRJET Journal
 
Prediction of viable performance of wireless sensor network by using finite
Prediction of viable performance of wireless sensor network by using finitePrediction of viable performance of wireless sensor network by using finite
Prediction of viable performance of wireless sensor network by using finiteIAEME Publication
 
Apllictaions of improved gilbert multiplier 2
Apllictaions of improved gilbert multiplier 2Apllictaions of improved gilbert multiplier 2
Apllictaions of improved gilbert multiplier 2IAEME Publication
 
A04310104
A04310104A04310104
A04310104theijes
 
A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...eSAT Publishing House
 
A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...eSAT Publishing House
 
Glitch Analysis and Reduction in Combinational Circuits
Glitch Analysis and Reduction in Combinational CircuitsGlitch Analysis and Reduction in Combinational Circuits
Glitch Analysis and Reduction in Combinational Circuitscsandit
 
Open switch fault diagnosis in three phase inverter
Open switch fault diagnosis in three phase inverterOpen switch fault diagnosis in three phase inverter
Open switch fault diagnosis in three phase invertereSAT Publishing House
 
Design and Implementation of Digital PLL using Self Correcting DCO System
Design and Implementation of Digital PLL using Self Correcting DCO SystemDesign and Implementation of Digital PLL using Self Correcting DCO System
Design and Implementation of Digital PLL using Self Correcting DCO SystemIJERA Editor
 
IRJET- Simulation of 10nm Double Gate MOSFET using Visual TCAD Tool
IRJET-  	  Simulation of 10nm Double Gate MOSFET using Visual TCAD ToolIRJET-  	  Simulation of 10nm Double Gate MOSFET using Visual TCAD Tool
IRJET- Simulation of 10nm Double Gate MOSFET using Visual TCAD ToolIRJET Journal
 

What's hot (18)

MRA Analysis for Faults Indentification in Multilevel Inverter
MRA Analysis for Faults Indentification in Multilevel InverterMRA Analysis for Faults Indentification in Multilevel Inverter
MRA Analysis for Faults Indentification in Multilevel Inverter
 
Zigbee based differential pilot protection of transmission line
Zigbee based differential pilot protection of transmission lineZigbee based differential pilot protection of transmission line
Zigbee based differential pilot protection of transmission line
 
Mobile sniffer and jammer
Mobile sniffer and jammerMobile sniffer and jammer
Mobile sniffer and jammer
 
Lab view Based Harmonic Analyser
Lab view Based Harmonic AnalyserLab view Based Harmonic Analyser
Lab view Based Harmonic Analyser
 
Fault Management of Electrical Drives Onboard Ship using Power Line Communica...
Fault Management of Electrical Drives Onboard Ship using Power Line Communica...Fault Management of Electrical Drives Onboard Ship using Power Line Communica...
Fault Management of Electrical Drives Onboard Ship using Power Line Communica...
 
20120140503021
2012014050302120120140503021
20120140503021
 
Ijetcas14 648
Ijetcas14 648Ijetcas14 648
Ijetcas14 648
 
Prediction of viable performance of wireless sensor network by using finite
Prediction of viable performance of wireless sensor network by using finitePrediction of viable performance of wireless sensor network by using finite
Prediction of viable performance of wireless sensor network by using finite
 
Singh2017
Singh2017Singh2017
Singh2017
 
Apllictaions of improved gilbert multiplier 2
Apllictaions of improved gilbert multiplier 2Apllictaions of improved gilbert multiplier 2
Apllictaions of improved gilbert multiplier 2
 
A04310104
A04310104A04310104
A04310104
 
A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...
 
A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...
 
40120130405008
4012013040500840120130405008
40120130405008
 
Glitch Analysis and Reduction in Combinational Circuits
Glitch Analysis and Reduction in Combinational CircuitsGlitch Analysis and Reduction in Combinational Circuits
Glitch Analysis and Reduction in Combinational Circuits
 
Open switch fault diagnosis in three phase inverter
Open switch fault diagnosis in three phase inverterOpen switch fault diagnosis in three phase inverter
Open switch fault diagnosis in three phase inverter
 
Design and Implementation of Digital PLL using Self Correcting DCO System
Design and Implementation of Digital PLL using Self Correcting DCO SystemDesign and Implementation of Digital PLL using Self Correcting DCO System
Design and Implementation of Digital PLL using Self Correcting DCO System
 
IRJET- Simulation of 10nm Double Gate MOSFET using Visual TCAD Tool
IRJET-  	  Simulation of 10nm Double Gate MOSFET using Visual TCAD ToolIRJET-  	  Simulation of 10nm Double Gate MOSFET using Visual TCAD Tool
IRJET- Simulation of 10nm Double Gate MOSFET using Visual TCAD Tool
 

Similar to Design and implementation of secured scan based attacks on ic’s by using on chip comparison

Test versus security @ IEEE Concept
Test versus security @ IEEE ConceptTest versus security @ IEEE Concept
Test versus security @ IEEE Conceptkodela3
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...eSAT Publishing House
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...eSAT Journals
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...IRJET Journal
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilitiesNirmal Thaliyil
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network subhradeep mitra
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTIJNSA Journal
 
Employee trust based industrial device
Employee trust based industrial deviceEmployee trust based industrial device
Employee trust based industrial deviceIJNSA Journal
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTIJNSA Journal
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)JIEMS Akkalkuwa
 
Hardware Trojan Identification and Detection
Hardware Trojan Identification and DetectionHardware Trojan Identification and Detection
Hardware Trojan Identification and Detectionijcisjournal
 
Vishwanath rakesh ece 561
Vishwanath rakesh ece 561Vishwanath rakesh ece 561
Vishwanath rakesh ece 561RAKESH_CSU
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...AM Publications
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET Journal
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...EditorJST
 
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...IRJET Journal
 

Similar to Design and implementation of secured scan based attacks on ic’s by using on chip comparison (20)

Test versus security @ IEEE Concept
Test versus security @ IEEE ConceptTest versus security @ IEEE Concept
Test versus security @ IEEE Concept
 
A05510105
A05510105A05510105
A05510105
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
 
Employee trust based industrial device
Employee trust based industrial deviceEmployee trust based industrial device
Employee trust based industrial device
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
 
Hardware Trojan Identification and Detection
Hardware Trojan Identification and DetectionHardware Trojan Identification and Detection
Hardware Trojan Identification and Detection
 
Vishwanath rakesh ece 561
Vishwanath rakesh ece 561Vishwanath rakesh ece 561
Vishwanath rakesh ece 561
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Design and implementation of secured scan based attacks on ic’s by using on chip comparison

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 120 DESIGN AND IMPLEMENTATION OF SECURED SCAN BASED ATTACKS ON IC’S BY USING ON CHIP COMPARISON G.Nalini.Krishnakanth1 , K. Jyothi2 1 PG student (VLSI&ES), GIET, Rajahmundry, India 2 Associate Professor, ECE Dept, GIET, Rajahmundry, India Abstract Physical designing of cryptographic analysis is subjected to various physical attacks. It has been formerly evidenced that scan chains introduce for hardware testability open a back door to potential attacks. Scan based testing technique is mainly used for testing and it provides full observabilty and controllability of the inner nodes of the IC. Therefore, in this paper, we propose a scan-protection scheme that provides testing facilities both at assembly time and over the course of the circuit’s life. An efficient principle is used to scan-in both input vectors and expected responses to compare expected and actual responses inside the circuit. This method has no impact on the feature of the test or the model-based fault analysis when compared to traditional scan tests. It occupies less area on the chip and avoids the authentication test mechanism. Keywords- security, testability, Design-for-testability (DFT), scan-based attack, test pattern generator ---------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION Many features of our daily lives rely on electronic data interchange. Encryption algorithms are used to guarantee the confidentiality, integrity, and validity of these exchanges. These algorithms are implemented on dedicated hardware for performance optimization and to embed confidential information, which must be kept secret from illegal users. Imperfect production processes of electronic devices lead to the need for manufacturing testing to sort out defective circuits from good quality ones, whatever be the aim application. This is even more relevant for secure circuits where a physical fault could jeopardize the security of the classified information. However, the most common practice for testing digital devices relies on a scan-chains insertion that guarantees high fault coverage and thus an ultimate product quality, but open backdoors to security threats too. The “Scan attacks” described for instance in [1] and [2] utilize the access offered by scan chains’ IOs for retrieving the secret key of an encryption core. These attacks rely on the possibility to observe the circuit’s internal state while this state is related to the secret. A common industrial practice to solve this security threat is to physically disconnect the scan chains after production testing by blow the fuses located at both ends of the scan chains. However, this solution impedes the testing of those devices require being tested after manufacturing. In particular, the correct performance of the secure circuits should be validated after the introduction of the secret key, which can be programmed at any time of the circuit’s life cycle. This secured information can indeed be owned by any circuit producer (e.g., designer, manufacturer, and system integrator) or user (e.g., reseller or final customer). In addition, scan disconnection stops any further analysis, e.g., diagnostic, or cannot be considered as an appropriate response to the scan attack if the connection can be reconstructed. In the literature, several solutions have thus been proposed to avoid disconnecting scan chains after manufacturing testing. However, the solutions are either expensive or not fully safe against latest scan attacks. In this brief, we explain new design-for-testability (DFT) architecture that eliminates the need to separate the scan chains. This approach is based on the concept of maintenance information. The test procedure consists in providing both the test vectors and expected test responses to the device-under-test (DUT) for an on-chip comparison. Methods for the on-chip comparison of actual and expected test responses have already been explored in other contexts [3]–[6], mainly to lessen the test data volume to transfer from DUTs to test equipment. However, none of these solutions achieve the target security requirements since individual bit values stored in the scan chains can still be observed or deducted from observed data, thanks to the test circuitry. Because testability features must not be implemented to the detriment of the security of the circuit, and vice versa, this brief also discusses test and diagnostic procedures with our DFT proposal, as well as security of the circuit with respect to attacks perpetrate on the test infrastructure. Cryptography is the science of secure communication and information protection from unauthorized access. Cryptography enables communicating parties to exchange information securely over an insecure channel. Modern cryptography not only applies to secure communication, but also has applications in software security, security of electronic devices (smart cards, RFIDs, memories, etc.), data protection (disk encryption), copyright protection (Digital Rights Management (DRM)) and more. Examples include RFID based access control systems, authenticating users for bank transactions using smart cards supporting cryptographic protocols, and full hard disk encryption
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 121 employing symmetric-key cryptography. Cryptography as a technology can be used to provide the following security properties: confidentiality of data, data integrity, entity authentication of the sender and the receiver, and non- repudiation of sender and receiver, among others [89]. Various cryptographic primitives and protocols can help in attaining these objectives. Though the mathematical or theoretical strength of these primitives can be quite high, their implementations in hardware or software are prone to information leakages. Cryptographic implementations in hardware and software need to be protected against attacks aimed at revealing the secret information stored within them. Hardware attacks can be characterized as follows: Active or passive attacks: active attacks require the attacker to tamper or troubles bate the device internals (by probing, laser impingement, etc.) and derive the secret data from the observed response. Passive attacks require the attacker to only observe passively and infer the secret from the observed behavior by exploiting one or more physical characteristics of the device when it is in operation. Some of these characteristics include power consumption, electromagnetic radiation, execution timing, or the data coming in or out of the external interface. Invasive, semi- invasive or non-invasive attacks: invasive attacks require opening the device package and contact the electronic circuits inside; semi invasive attacks also require opening the device package but no contact to the internal circuits is needed, while non-invasive attacks do not require modification of the device package. Scan has been generally accepted as the standard method of testing chips due to high fault coverage and relatively lower area overhead. Inserting scan-chains while designing the chip requires a few additional/multiplexed pins to the primary inputs/outputs to serve as the scan-enable, scan- inputs and scan-outputs. Internally, there is little impact on the design since the standard flip-flops (FFs) are replaced by scan flip-flops (SFFs) (i.e., flip-flops with an input multiplexer) which are then linked to one another creating a shift register (scan chain). An example of a scan chain is shown in the Figure 1. Scan-enable selects between functional and test mode operations. It controls each multiplexer, choosing between the normal mode input of the FF or the output of the previous SFF in the chain. Fig .1 Scan Chain DFT Structure A brief summarization of the proposed scheme is explained as below. Section II discuss the Security Analysis and Testability of the proposed scheme along with the existing scheme, Section III representing the Test Pattern Generator, Section IV explains the Simulation results for the Proposed secure comparator Using Test Pattern Generator and finally, Section V concludes on this brief. 2. SECURITY, TEST, AND DIAGNOSTIC ISSUES This section discusses the security improvements related to the observation of a single pass/fail result as well as issues related to test and diagnosis. 2.1 Security Analysis The role of the proposed Secure Comparator is to avoid the observation of SFFs containing secret information. If the result of the comparison was accessible at each clock cycle instead of each test vector, an attacker could easily observe the scan chain content by shifting in “000…000” on the Sexp pin. Each bit-comparison would then validate that either the actual bit was “0” when Test Res = 1 and vice versa. On the contrary, with the proposed vector-wise comparison, the only way to retrieve the sensitive data information is to apply a brute-force attack by trying every possible response until Test Res is asserted. This attack would thus require 2#SFF attempts. If other attacks such as side-channel attacks [16] or faults attacks [17] are dreaded, the Secure Comparator has to be protected as the rest of the circuit. Even if countermeasures can lead to a large area overhead (e.g., [18]) their implementation concerns a very small part of the circuit. 2.2 Testability The secure comparator does not impact the fault coverage. In fact, each test response is compared to the expected one as in a classical ATE-based test scheme. Therefore, the achievable fault coverage is not altered. Test time is not increased either, since the expected responses are scanned-in at the same time as the next input vector is scanned-in. Concerning the test of the Secure Comparator itself, any DFT technique controlled by the external ATE (e.g., a dedicated scan chain to test the counter of the Output Enabler) would jeopardize the overall security. Nevertheless, the Secure Comparator can be totally tested by using only its inputs (Sen, Sexp, Sin, Test Res). We have identified a procedure to test all stuck-at faults no matter of the size of the Secure Comparator. This functional test involves the comparison of the actual SFF values with a partially matching, a fully un-matching, and a correct response. Moreover, it includes the application of a two un- matching responses without the intermediate capture cycle, and twice the execution of the capture cycle. This test procedure requires 6· (#SFF+1) clock cycles to provide 100% stuck at fault coverage.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 122 Fig 2 Proposed secure comparator Using Test Pattern Generator A limitation of our technique is related to the presence of possible unpredictable values in the SFFs. Computing expected values for the on-chip comparison is indeed no longer possible. To fix this limitation, the Sticky Comparator should ignore the comparison result (and keep unchanged its flag) when Sout is unknown. This can be implemented by providing an additional mask signal that is asserted when needed. However, an attacker must not be able to mask as many bits as wanted. In fact, if it were possible to mask all but one bit, it would be obvious to discover the value of each single bit in the scan response. This would reduce the complexity of the brute-force attack from exponential [O (2#SFF)] to linear [O(#SFF)]. Therefore, the number of masked bit (per test vector) must be limited to P such that a brute force attack on 2#SFF−P remains unfeasible. The extra cost to tolerate unknown values includes an extra pin for the mask, a log2 P counter to limit the number of masked bits and two logic gates. Fig. 2 shows a possible implementation. 3. TEST PATTERN GENERATOR Using Linear Feedback Shift Registers (LFSRs) Efficient design for Test Pattern Generators & Output Response Analyzers FFs plus a few XOR gates better than counter • Fewer gates • Higher clock frequency Two types of LFSRs: Exterior Feedback, Internal Feedback • High clock frequency An LFSR generates periodic sequence must start in a non- zero situation, The maximum length of an LFSR sequence is 2n -1 does not generate all 0s pattern The characteristic polynomial of an LFSR generating maximum-length sequence is a primitive polynomial A maximum-length series is pseudo-random: number of 1s =number of 0s + 1 same number of runs of successive 0s and 1s 1/2 of the runs have length1 1/4 of the runs have length 2 (as long as fractions result in integral numbers of runs). Fig .3 Linear Feedback Shift Registers A hardware test pattern generator(TPG) generated by the no of flip-flops cascading. These flip-flops are cascaded depend upon the polynomial which are used for the development of the test pattern generator the expected sequences are developed from the polynomial construction of LFSR. Table 1: Proposed area reports Device Utilization Summary (estimated values) [-] Logic Utilization Used Available Utilization Number of Slices 2 2448 0% Number of Slice Flip Flops 4 4896 0% Number of 4 input LUTs 1 4896 0% Number of bonded IOBs 3 108 2% Number of GCLKs 1 24 4% Table 2: Existing area reports Device Utilization Summary (estimated values) [-] Logic Utilization Used Available Utilization Number of Slice Registers 21 126800 0% Number of Slice LUTs 8 63400 0% Number of fully used LUT-FF pairs 7 22 31% Number of bonded IOBs 5 210 2% Number of BUFG/BUFGCTRLs 1 32 3%
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 123 4. SIMULATION RESULTS Fig.4 Block diagram Fig.5 RTL Schematic Secure Comparator Fig.6 Technology schematic Fig.7 Test Pattern Generator Fig.8 Simulation Results Fig.9 Delay Report
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 124 5. CONCLUSION Inserting scan into a secure design implies new approaches of the technique eventually; applying ones of these countermeasures has also proven that at a suitable cost, scan and security can live together. In this paper we do not give the expected outputs. But in the scan circuit to generate the expected values by using TPG. Here linear feedback circuit used for TPG (Test pattern generator). The proposed approach is based on the idea of withholding information. The idea is to compare test responses within the chip. Both input vectors and expected responses are scanned into the circuit and the compare between expected and actual responses is done at vector level. It does not provide information on the value of every individual scan bit for security purposes. In this paper we proposed a novel DFT technique for scan design to ensure security not including relying on costly test infrastructures to switch from mission to test modes. REFERENCES [1]. B. Yang, K. Wu, and R. Karri, “Secure scan: A design- for-test architecture for crypto chips,” IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 25, no. 10, pp. 2287–2293, Oct. 2006. [2]. B. Yang, K. Wu, and R. Karri, “Scan based side channel attack on dedicated hardware implementations of data encryption standard,” in Proc. IEEE Int. Test Conf., Oct. 2004, pp. 339–344. [3]. Y. Wu and P. MacDonald, “Testing ASICs with multiple identical cores,” IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 22, no. 3, pp. 327–336, Mar. 2003. [4]. K. J. Balakrishnan, G. Giles, and J. Wingfield, “Test access mechanism in the quad-core AMD opteron microprocessor,” IEEE Design Test Comput., vol. 26, no. 1, pp. 52–59, Jan. 2009. [5]. D. Andreu, “System and method for wirelessly testing integrated circuits,” U.S. Patent 0 244 814, Oct. 6, 2011. [6]. F. Poehl, M. Beck, R. Arnold, J. Rzeha, T. Rabenalt, and M. Goessel, “On-chip evaluation, compensation and storage of scan diagnosis data,” IET Comput.Digit.Tech., vol. 1, no. 3, pp. 207–212, 2007. [7]. G.-M. Chiu and J. C.-M.Li, “A secure test wrapper design against internal and boundary scan attacks for embedded cores,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 20, no. 1, pp. 126–134, Jan. 2012. [8]. K. Rosenfeld and R. Karri, “Attacks and defenses for JTAG,” IEEE Design Test Comput., vol. 27, no. 1, pp. 36– 47, Jan. 2010. [9]. C. J. Clark, “Anti-tamper JTAG TAP design enables DRM to JTAG registers and P1687 on-chip instruments,” in Proc. IEEE Int. Symp. Hardw.-Oriented Security Trust, Jun. 2010, pp. 19–24. [10]. D. Hely, F. Bancel, N. Berard, M. L. Flottes, and B. Rouzeyre, “Test control for secure scan designs,” in Proc. IEEE Eur. Test Symp., May 2005, pp. 190–195. [11]. D. Hely, M.-L. Flottes, F. Bancel, B. Rouzeyre, N. Berard, and M. Renovell, “Scan design and secure chip [secure IC testing].,” in Proc. IEEE Int. On-Line Test. Symp., Jul. 2004, pp. 219–224. [12]. G. Sengar, D. Mukhopadhyay, and D. R. Chowdhury, “Secured flipped scan-chain model for crypto-architecture,” IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 26, no. 11, pp. 2080–2084, Nov. 2007. [13]. H. Fujiwara and M. E. J. Obien, “Secure and testable scan design using extended de Bruijn graphs,” in Proc. Asia South Pacific Design Autom. Conf., 2010, pp. 413–418. [14]. J. Da Rolt, G. Di Natale, M.-L.Flottes, and B. Rouzeyre, “New security threats against chips containing scan chain structures,” in Proc. IEEE Int. Symp. Hardw.- Oriented Security Trust, Jun. 2011, pp. 110–115. [15]. L. Chunsheng and Y. Huang, “Effects of embedded decompression and compaction architectures on side- channel attack resistance,” in Proc. IEEE VLSI Test Symp., May 2007, pp. 461–468. [16]. P. Kocher, J. Jaffe, and B. Jun, “Differential power analysis,” in Proc. Int. Cryptol. Conf. Adv. Cryptol., 1999, pp. 388–397. [17]. P. Dusart, G. Letourneux, and O. Vivolo, “Differential fault analysis on A.E.S,” in Applied Cryptography and Network Security, vol. 2846. New York, NY, USA: Springer-Verlag, 2003, pp. 293–306. [18]. A. Moradi, T. Eisenbarth, A. Poschmann, C. Rolfes, C. Paar, M. T. M. Shalmani, and M. Salmasizadeh, “Information leakage of flip-flops in DPA-resistant logic styles,” in Proc. IACR Cryptology ePrint Archive, 2008, pp. 188–188. 2008, pp. 188–188.