Scan Chain Based Attacks and Countermeasures: A Survey
Scan chains increase the testability but decrease security. Attackers may use scan chains to launch attacks to obtain sensitive information, which poses serious security threats. The scan chain-based attacks contain two steps: 1) scan data obtaining, including mode switching obtaining method and tes...
Main Authors: | Xiaowei Li, Wenjie Li, Jing Ye, Huawei Li, Yu Hu |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8746214/ |
Similar Items
-
From Cryptography to Logic Locking: A Survey on the Architecture Evolution of Secure Scan Chains
by: Kimia Zamiri Azar, et al.
Published: (2021-01-01) -
A Secure Scan Architecture Protecting Scan Test and Scan Dump Using Skew-Based Lock and Key
by: Hyungil Woo, et al.
Published: (2021-01-01) -
A Secure DFT Architecture Protecting Crypto Chips Against Scan-Based Attacks
by: Weizheng Wang, et al.
Published: (2019-01-01) -
The memory effect of nanoscale memristors investigated by conducting scanning probe microscopy methods
by: César Moreno, et al.
Published: (2012-11-01) -
Design of Test Wrapper Scan Chain Based on Differential Evolution
by: Aijun Zhu, et al.
Published: (2013-08-01)