Detection of Security Hacking Attacks by Scan Based TPG Using Verilog

Journal Title: Scholars Journal of Engineering and Technology - Year 2014, Vol 2, Issue 5

Abstract

Hardware development of cryptographic algorithms is subject to various attacks. It has been previously demonstrated that scan chains introduce for hardware testability open a back door to potential attacks. Scan based testing is one of the mainly used and powerful test technique since it provides full observability and controllability of the internal nodes of the IC. It has been previously demonstrated that scan chains introduced for hardware testability open a back door to possible attacks. Here, we propose a scan-protection scheme that provides testing facilities both at production time and over the course of the circuit’s life. Here the underlying principles to scan-in both input vectors and expected responses and to compare expected and actual responses inside the circuit. Compared to regular scan tests, this technique has no impact on the quality of the test or the model-based fault diagnosis. It entails negligible area overhead and avoids the use of an authentication test mechanism. Keywords: security, testability, Design-for-testability (DfT), scan-based attack, test pattern generator

Authors and Affiliations

R. Priyadarsini, S. Anusha

Keywords

Related Articles

Lead Time Reduction of Inbound Logistics in a FMCG Company

Abstract:Fast Moving Consumer Goods(FMCG) by the name has high demand in the market as well as heavy competition. Maximizing efficiency and effectiveness of the process in the industry by shrinking supply chain and makin...

Performance Evaluation of A Stud Grinder for Roasted or Bone Dried Grains/Cereals Using ParticleDiscretization Analysis witha Vibrating Sieve.

Abstract:The performance of a stud grinding machine is done with particles size discretization analysis with sieve to validate its preference for bone dried or roasted materials. The discretization analysis is done by gr...

“BIG DATA” Galaxies (A New Definition for Assembling “BIG DATA”)

“BIG DATA” is a key topic in many areas such as government, industry, healthcare, education and data economies are increasingly being hailed as a way to create more jobs and completely new industries. Recently, the worl...

All travelling wave solutions to the regularized short pulse equation

The complete discrimination system for polynomial method is applied to the RSPE, and we have obtained all of its possible exact traveling wave solutions including rational function type solutions, solitary wave solutions...

Influence of Boiling, Temperature and Thickness on Drying Time of Aerial Yam (Dioscorea bulbifera bulbis)

Effect of boiling, thickness (0.5 and 1cm) and temperature on drying time of Dioscorea bulbifera was investigated in a fabricated hot air drier at a temperature range of 50 -70°C. . The drying process was conducted in tr...

Download PDF file
  • EP ID EP385187
  • DOI -
  • Views 70
  • Downloads 0

How To Cite

R. Priyadarsini, S. Anusha (2014). Detection of Security Hacking Attacks by Scan Based TPG Using Verilog. Scholars Journal of Engineering and Technology, 2(5), 769-773. https://europub.co.uk/articles/-A-385187