Detection of Security Hacking Attacks by Scan Based TPG Using Verilog

Journal Title: Scholars Journal of Engineering and Technology - Year 2014, Vol 2, Issue 5

Abstract

Hardware development of cryptographic algorithms is subject to various attacks. It has been previously demonstrated that scan chains introduce for hardware testability open a back door to potential attacks. Scan based testing is one of the mainly used and powerful test technique since it provides full observability and controllability of the internal nodes of the IC. It has been previously demonstrated that scan chains introduced for hardware testability open a back door to possible attacks. Here, we propose a scan-protection scheme that provides testing facilities both at production time and over the course of the circuit’s life. Here the underlying principles to scan-in both input vectors and expected responses and to compare expected and actual responses inside the circuit. Compared to regular scan tests, this technique has no impact on the quality of the test or the model-based fault diagnosis. It entails negligible area overhead and avoids the use of an authentication test mechanism. Keywords: security, testability, Design-for-testability (DfT), scan-based attack, test pattern generator

Authors and Affiliations

R. Priyadarsini, S. Anusha

Keywords

Related Articles

Overcoming the Leakage Power Analysis Attack Using Higher Order DPA-Resistant AES-Masking

Abstract:The analysis of the effectiveness of Leakage Power Analysis (LPA) attacks to cryptographic VLSI circuits on which circuit level countermeasures against Differential Power Analysis (DPA) are adopted. Security met...

A Comprehensive Contextual Industrial Engineering Research and Software project Management Using Product Metrics

Abstract: For the purpose of exact and flawless valid conclusions while aggregating evidence of software project, it is important to describe the context in which industrial studies and inspection were conducted. This pa...

The Analysis of Regulatory Strategy about Government-Invested Projects Based on the Imperfect Credibility Threats

In the construction market, it is very difficult to obtain the private information of project management units which have uneven aptitude for the government. In order to reduce the government’s risk caused by adverse sel...

Some Indices for Hexagonal Triangle Graph

In this short communication, we determine the vertex PI index, second atom bond connectivity index and revised Szeged index for hexagonal triangle graph.

A Study on Resource Allocation in Cloud

Cloud computing ia a type of internet based computing that is relies on sharing of computer resource from anywhere and anytime. It is similar to utility computing. In this paper a review of various policies for dynamic...

Download PDF file
  • EP ID EP385187
  • DOI -
  • Views 94
  • Downloads 0

How To Cite

R. Priyadarsini, S. Anusha (2014). Detection of Security Hacking Attacks by Scan Based TPG Using Verilog. Scholars Journal of Engineering and Technology, 2(5), 769-773. https://europub.co.uk/articles/-A-385187