A Memristor-based Secure Scan Design against the Scan-based Side-Channel Attacks

被引:0
|
作者
Lu, Mengqiang [1 ]
Cui, Aijiao [1 ]
Shao, Yan [2 ]
Qu, Gang [3 ,4 ]
机构
[1] Harbin Inst Technol, Sch Elect & Informat Engn, Shenzhen, Guangdong, Peoples R China
[2] Chinese Acad Sci, Shenzhen Inst Adv Technol, Ctr Photon Informat & Energy Mat, Shenzhen, Guangdong, Peoples R China
[3] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[4] Univ Maryland, Syst Res Inst, College Pk, MD 20742 USA
基金
中国国家自然科学基金;
关键词
Secure scan design; scan-based side-channel attack; memristor; random number;
D O I
10.1145/3526241.3530345
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Scan chain design can improve the testability of a circuit while it can be used as a side-channel to access the sensitive information inside a cryptographic chip for the crack of cipher key. To secure the scan design while maintaining its testability, this paper proposes a memristor-based secure scan design. A lock and key scheme is introduced. Physical unclonable function (PUF) is used to generate a unique test key for each chip. When an input test key matches the PUF-based key, the scan chain can be used normally for testing. Otherwise, the data in some scan cells are obfuscated by the random bits, which are generated by reading the status of a memristor. As the random bits do not relate to the original test data, an adversary cannot access useful information from scan chain to deduce the cipher key. The experimental results show that the proposed secure scan design can resist all existing attacks while incurring low overhead. Also, the testability of the original design is not affected.
引用
收藏
页码:71 / 76
页数:6
相关论文
共 50 条
  • [41] VIm-Scan: A low overhead scan design approach for protection of secret key in scan-based secure chips
    Paul, Somnath
    Chakraborty, Rajat Subhra
    Bhunia, Swarup
    25TH IEEE VLSI TEST SYMPOSIUM, PROCEEDINGS, 2007, : 455 - +
  • [42] Secure Quantum-based Adder Design for Protecting Machine Learning Systems Against Side-Channel Attacks
    Ul Ain, Noor
    Ahmadpour, Seyed-Sajad
    Navimipour, Nima Jafari
    Diakina, E.
    Kassa, Sankit R.
    APPLIED SOFT COMPUTING, 2025, 169
  • [43] A scan matrix design for low power scan-based test
    Lin, SP
    Lee, CL
    Chen, JE
    14TH ASIAN TEST SYMPOSIUM, PROCEEDINGS, 2005, : 224 - 229
  • [44] A Memristor-based Scan Hold Flip-Flop
    Cui, Aijiao
    Chang, Zhenxing
    Wang, Ziming
    Qu, Gang
    Li, Huawei
    2019 IEEE NON-VOLATILE MEMORY SYSTEMS AND APPLICATIONS SYMPOSIUM (NVMSA-2019), 2019,
  • [45] On Securing Cryptographic ICs against Scan-based Attacks: A HammingWeight Distribution Perspective
    Ray, Dipojjwal
    Sao, Yogendra
    Biswas, Santosh
    Ali, Sk Subidh
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2023, 19 (02)
  • [46] Efficient Solution to Secure ECC Against Side-channel Attacks
    Wu Keke
    Li Huiyun
    Zhu Dingju
    Yu Fengqi
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (03): : 471 - 475
  • [47] How secure is your cache against side-channel attacks?
    He, Zecheng
    Lee, Ruby B.
    50TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), 2017, : 341 - 353
  • [48] DNNCloak: Secure DNN Models Against Memory Side-channel Based Reverse Engineering Attacks
    Che, Yuezhi
    Wang, Rujia
    2022 IEEE 40TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2022), 2022, : 89 - 96
  • [49] Compiler-Based Techniques to Secure Cryptographic Embedded Software Against Side-Channel Attacks
    Agosta, Giovanni
    Barenghi, Alessandro
    Pelosi, Gerardo
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (08) : 1550 - 1554
  • [50] Scan-based Attack against DES Cryptosystems Using Scan Signatures
    Kodera, Hirokazu
    Yanagisawa, Masao
    Togawa, Nozomu
    2012 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS), 2012, : 599 - 602