Analysis of Hardware Security to Prevent the Scan Based Attacks by using Sticky Counter

Abstract

Security of integrated circuits (ICs) has emerged as a major concern at different stages of IC life-cycle, spanning design, test, fabrication and deployment. Modern ICs are becoming increasingly vulnerable to various forms of security threats, such as: 1) illegaluse of hardware intellectual property (IP) \IP Piracy. 2) Illegal manufacturing of IC\ IC Piracy. Designing of confidential ICs must satisfy many design rules in order to rectify the various attacks and to protect the secret data. Based on the concept of withholding information, on-chip comparisons for actual and expected response. Obfuscation method to prevent the piracy overbuilding and reverse engineering RE. But no security against scan based attackers. This practical logic obfuscation applicable for combinational circuits and will not protect the scan attacks. In order overcome this drawback the recent works on hardware security to prevent piracy. From the security point of view, few limitations of existing method limit the security level. Some countermeasures have been proposed in order to secure the scan technique and on-chip comparison. This method can be applicable for both sequential, combinational circuits. This proposed method can be applied for all scan testing. We implement the project using Xilinx ISE tool for Simulation and synthesis and the code is written in Verilog HDL. Rangu Lavanya | Dr. G. Shanmugapriya | Mr. S. Gopala Krishna"Analysis of Hardware Security to Prevent the Scan Based Attacks by using Sticky Counter" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11335.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/11335/analysis-of-hardware-security-to-prevent-the-scan-based-attacks-by-using-sticky-counter/rangu-lavanya

Authors and Affiliations

Keywords

Related Articles

Growth and Yield Response of Sunflower Helianthus annuus l to Spacing and Nitrogen Fertilization in Southern Guinea Savanna Ecological Zone of Nigeria

The experiments were conducted during 2016 and2017 rainy season to determine the optimal rate of nitrogen fertilizer and adequate plant spacing for production of sunflower in southern guinea savanna agroecology zone of N...

The Effect of Dosage and Modulus of Activator on the Strength of Alkali Activated Slag and Fly Ash Based on Geopolymer Mortar

In this study, the effect of dosage and modulus of activator on the strength of alkali activated slag and fly ash based geopolymer mortar is studied. Fly ash from Tingyi is used. Blast furnace slag from No 1 Iron and Ste...

Healthcare Business Intelligence A Primer

To succeed in a modern digital world, healthcare industry must be data driven. Hospitals and healthcare institutions desire to make their workflows more efficient in order to meet demand. One way they can achieve this is...

Behaviour of Lustrous Carbon Additives in Green Sand Casting

The advent of High Volume, High Density and High Pressure Moulding Lines has changed the logistics of Molding Techniques and selection of additives significantly. Having 4 main ingredients, Base Sand, Bentonite, Lustrous...

Impact of Normalization in Future

Data and functionality are two primary aspects of systems. Unfortunately, there is a mental gap between these two aspects. Therefore, nowadays many are looking for the corresponding research and development fields as qui...

Download PDF file
  • EP ID EP359971
  • DOI -
  • Views 98
  • Downloads 0

How To Cite

(2018). Analysis of Hardware Security to Prevent the Scan Based Attacks by using Sticky Counter. International Journal of Trend in Scientific Research and Development, 2(3), -. https://europub.co.uk/articles/-A-359971