Analysis of Hardware Security to Prevent the Scan Based Attacks by using Sticky Counter
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2018, Vol 2, Issue 3
Abstract
Security of integrated circuits (ICs) has emerged as a major concern at different stages of IC life-cycle, spanning design, test, fabrication and deployment. Modern ICs are becoming increasingly vulnerable to various forms of security threats, such as: 1) illegaluse of hardware intellectual property (IP) \IP Piracy. 2) Illegal manufacturing of IC\ IC Piracy. Designing of confidential ICs must satisfy many design rules in order to rectify the various attacks and to protect the secret data. Based on the concept of withholding information, on-chip comparisons for actual and expected response. Obfuscation method to prevent the piracy overbuilding and reverse engineering RE. But no security against scan based attackers. This practical logic obfuscation applicable for combinational circuits and will not protect the scan attacks. In order overcome this drawback the recent works on hardware security to prevent piracy. From the security point of view, few limitations of existing method limit the security level. Some countermeasures have been proposed in order to secure the scan technique and on-chip comparison. This method can be applicable for both sequential, combinational circuits. This proposed method can be applied for all scan testing. We implement the project using Xilinx ISE tool for Simulation and synthesis and the code is written in Verilog HDL. Rangu Lavanya | Dr. G. Shanmugapriya | Mr. S. Gopala Krishna"Analysis of Hardware Security to Prevent the Scan Based Attacks by using Sticky Counter" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11335.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/11335/analysis-of-hardware-security-to-prevent-the-scan-based-attacks-by-using-sticky-counter/rangu-lavanya
Growth and Yield Response of Sunflower Helianthus annuus l to Spacing and Nitrogen Fertilization in Southern Guinea Savanna Ecological Zone of Nigeria
The experiments were conducted during 2016 and2017 rainy season to determine the optimal rate of nitrogen fertilizer and adequate plant spacing for production of sunflower in southern guinea savanna agroecology zone of N...
The Effect of Dosage and Modulus of Activator on the Strength of Alkali Activated Slag and Fly Ash Based on Geopolymer Mortar
In this study, the effect of dosage and modulus of activator on the strength of alkali activated slag and fly ash based geopolymer mortar is studied. Fly ash from Tingyi is used. Blast furnace slag from No 1 Iron and Ste...
Healthcare Business Intelligence A Primer
To succeed in a modern digital world, healthcare industry must be data driven. Hospitals and healthcare institutions desire to make their workflows more efficient in order to meet demand. One way they can achieve this is...
Behaviour of Lustrous Carbon Additives in Green Sand Casting
The advent of High Volume, High Density and High Pressure Moulding Lines has changed the logistics of Molding Techniques and selection of additives significantly. Having 4 main ingredients, Base Sand, Bentonite, Lustrous...
Impact of Normalization in Future
Data and functionality are two primary aspects of systems. Unfortunately, there is a mental gap between these two aspects. Therefore, nowadays many are looking for the corresponding research and development fields as qui...