A Memristor-based Secure Scan Design against the Scan-based Side-Channel Attacks

被引:0
|
作者
Lu, Mengqiang [1 ]
Cui, Aijiao [1 ]
Shao, Yan [2 ]
Qu, Gang [3 ,4 ]
机构
[1] Harbin Inst Technol, Sch Elect & Informat Engn, Shenzhen, Guangdong, Peoples R China
[2] Chinese Acad Sci, Shenzhen Inst Adv Technol, Ctr Photon Informat & Energy Mat, Shenzhen, Guangdong, Peoples R China
[3] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[4] Univ Maryland, Syst Res Inst, College Pk, MD 20742 USA
基金
中国国家自然科学基金;
关键词
Secure scan design; scan-based side-channel attack; memristor; random number;
D O I
10.1145/3526241.3530345
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Scan chain design can improve the testability of a circuit while it can be used as a side-channel to access the sensitive information inside a cryptographic chip for the crack of cipher key. To secure the scan design while maintaining its testability, this paper proposes a memristor-based secure scan design. A lock and key scheme is introduced. Physical unclonable function (PUF) is used to generate a unique test key for each chip. When an input test key matches the PUF-based key, the scan chain can be used normally for testing. Otherwise, the data in some scan cells are obfuscated by the random bits, which are generated by reading the status of a memristor. As the random bits do not relate to the original test data, an adversary cannot access useful information from scan chain to deduce the cipher key. The experimental results show that the proposed secure scan design can resist all existing attacks while incurring low overhead. Also, the testability of the original design is not affected.
引用
收藏
页码:71 / 76
页数:6
相关论文
共 50 条
  • [31] A Scan-Based Side Channel Attack on the NTRUEncrypt Cryptosystem
    Kamal, Abdel Alim
    Youssef, Amr M.
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 402 - 409
  • [32] Dynamically Obfuscated Scan for Protecting IPs Against Scan-Based Attacks Throughout Supply Chain
    Zhang, Dongrong
    He, Miao
    Wang, Xiaoxiao
    Tehranipoor, Mark
    2017 IEEE 35TH VLSI TEST SYMPOSIUM (VTS), 2017,
  • [33] Thwarting Scan-Based Attacks on Secure-ICs With On-Chip Comparison
    Da Rolt, Jean
    Di Natale, Giorgio
    Flottes, Marie-Lise
    Rouzeyre, Bruno
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2014, 22 (04) : 947 - 951
  • [34] Vulnerability modelling of crypto-chips against scan-based attacks
    Taherifard, Mohammad
    Patooghy, Ahmad
    Fazeli, Mahdi
    IET INFORMATION SECURITY, 2018, 12 (06) : 543 - 550
  • [35] Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks
    Kroeger, Trevor
    Cheng, Wei
    Guilley, Sylvain
    Danger, Jean-Luc
    Karimi, Nazhmeh
    PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, : 1000 - 1005
  • [36] Scan-based side channel attack on stream ciphers and its prevention
    Karmakar, Sandip
    Chowdhury, Dipanwita Roy
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2018, 8 (04) : 327 - 340
  • [37] Secure Scan-based Design Using Blum Blum Shub Algorithm
    Koopahi, Elnaz
    Borujeni, Shahram Etemadi
    PROCEEDINGS OF 2016 IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS), 2016,
  • [38] Scan-based side channel attack on stream ciphers and its prevention
    Sandip Karmakar
    Dipanwita Roy Chowdhury
    Journal of Cryptographic Engineering, 2018, 8 : 327 - 340
  • [39] State Dependent Scan Flip-Flop with Key-Based Configuration against Scan-Based Side Channel Attack on RSA Circuit
    Atobe, Yuta
    Shi, Youhua
    Yanagisawa, Masao
    Togawa, Nozomu
    2012 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS), 2012, : 607 - 610
  • [40] Side-Channel Attack with Fault Analysis on Memristor-based Computation-in-Memory
    Sapui, Brojogopal
    Meschkov, Sergej
    Tahoori, Mehdi B.
    2024 IEEE 30TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN, IOLTS 2024, 2024,