SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 120
DESIGN AND IMPLEMENTATION OF SECURED SCAN BASED
ATTACKS ON IC’S BY USING ON CHIP COMPARISON
G.Nalini.Krishnakanth1
, K. Jyothi2
1
PG student (VLSI&ES), GIET, Rajahmundry, India
2
Associate Professor, ECE Dept, GIET, Rajahmundry, India
Abstract
Physical designing of cryptographic analysis is subjected to various physical attacks. It has been formerly evidenced that scan
chains introduce for hardware testability open a back door to potential attacks. Scan based testing technique is mainly used for
testing and it provides full observabilty and controllability of the inner nodes of the IC. Therefore, in this paper, we propose a
scan-protection scheme that provides testing facilities both at assembly time and over the course of the circuit’s life. An efficient
principle is used to scan-in both input vectors and expected responses to compare expected and actual responses inside the
circuit. This method has no impact on the feature of the test or the model-based fault analysis when compared to traditional scan
tests. It occupies less area on the chip and avoids the authentication test mechanism.
Keywords- security, testability, Design-for-testability (DFT), scan-based attack, test pattern generator
---------------------------------------------------------------------***--------------------------------------------------------------------
1. INTRODUCTION
Many features of our daily lives rely on electronic data
interchange. Encryption algorithms are used to guarantee the
confidentiality, integrity, and validity of these exchanges.
These algorithms are implemented on dedicated hardware
for performance optimization and to embed confidential
information, which must be kept secret from illegal users.
Imperfect production processes of electronic devices lead to
the need for manufacturing testing to sort out defective
circuits from good quality ones, whatever be the aim
application. This is even more relevant for secure circuits
where a physical fault could jeopardize the security of the
classified information. However, the most common practice
for testing digital devices relies on a scan-chains insertion
that guarantees high fault coverage and thus an ultimate
product quality, but open backdoors to security threats too.
The “Scan attacks” described for instance in [1] and [2]
utilize the access offered by scan chains’ IOs for retrieving
the secret key of an encryption core. These attacks rely on
the possibility to observe the circuit’s internal state while
this state is related to the secret.
A common industrial practice to solve this security threat is
to physically disconnect the scan chains after production
testing by blow the fuses located at both ends of the scan
chains. However, this solution impedes the testing of those
devices require being tested after manufacturing. In
particular, the correct performance of the secure circuits
should be validated after the introduction of the secret key,
which can be programmed at any time of the circuit’s life
cycle. This secured information can indeed be owned by any
circuit producer (e.g., designer, manufacturer, and system
integrator) or user (e.g., reseller or final customer). In
addition, scan disconnection stops any further analysis, e.g.,
diagnostic, or cannot be considered as an appropriate
response to the scan attack if the connection can be
reconstructed. In the literature, several solutions have thus
been proposed to avoid disconnecting scan chains after
manufacturing testing. However, the solutions are either
expensive or not fully safe against latest scan attacks.
In this brief, we explain new design-for-testability (DFT)
architecture that eliminates the need to separate the scan
chains. This approach is based on the concept of
maintenance information. The test procedure consists in
providing both the test vectors and expected test responses
to the device-under-test (DUT) for an on-chip comparison.
Methods for the on-chip comparison of actual and expected
test responses have already been explored in other contexts
[3]–[6], mainly to lessen the test data volume to transfer
from DUTs to test equipment. However, none of these
solutions achieve the target security requirements since
individual bit values stored in the scan chains can still be
observed or deducted from observed data, thanks to the test
circuitry. Because testability features must not be
implemented to the detriment of the security of the circuit,
and vice versa, this brief also discusses test and diagnostic
procedures with our DFT proposal, as well as security of the
circuit with respect to attacks perpetrate on the test
infrastructure.
Cryptography is the science of secure communication and
information protection from unauthorized access.
Cryptography enables communicating parties to exchange
information securely over an insecure channel. Modern
cryptography not only applies to secure communication, but
also has applications in software security, security of
electronic devices (smart cards, RFIDs, memories, etc.),
data protection (disk encryption), copyright protection
(Digital Rights Management (DRM)) and more. Examples
include RFID based access control systems, authenticating
users for bank transactions using smart cards supporting
cryptographic protocols, and full hard disk encryption
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 121
employing symmetric-key cryptography. Cryptography as a
technology can be used to provide the following security
properties: confidentiality of data, data integrity, entity
authentication of the sender and the receiver, and non-
repudiation of sender and receiver, among others [89].
Various cryptographic primitives and protocols can help in
attaining these objectives. Though the mathematical or
theoretical strength of these primitives can be quite high,
their implementations in hardware or software are prone to
information leakages. Cryptographic implementations in
hardware and software need to be protected against attacks
aimed at revealing the secret information stored within
them. Hardware attacks can be characterized as follows:
Active or passive attacks: active attacks require the attacker
to tamper or troubles bate the device internals (by probing,
laser impingement, etc.) and derive the secret data from the
observed response. Passive attacks require the attacker to
only observe passively and infer the secret from the
observed behavior by exploiting one or more physical
characteristics of the device when it is in operation. Some of
these characteristics include power consumption,
electromagnetic radiation, execution timing, or the data
coming in or out of the external interface. Invasive, semi-
invasive or non-invasive attacks: invasive attacks require
opening the device package and contact the electronic
circuits inside; semi invasive attacks also require opening
the device package but no contact to the internal circuits is
needed, while non-invasive attacks do not require
modification of the device package.
Scan has been generally accepted as the standard method of
testing chips due to high fault coverage and relatively lower
area overhead. Inserting scan-chains while designing the
chip requires a few additional/multiplexed pins to the
primary inputs/outputs to serve as the scan-enable, scan-
inputs and scan-outputs. Internally, there is little impact on
the design since the standard flip-flops (FFs) are replaced by
scan flip-flops (SFFs) (i.e., flip-flops with an input
multiplexer) which are then linked to one another creating a
shift register (scan chain). An example of a scan chain is
shown in the Figure 1. Scan-enable selects between
functional and test mode operations. It controls each
multiplexer, choosing between the normal mode input of the
FF or the output of the previous SFF in the chain.
Fig .1 Scan Chain DFT Structure
A brief summarization of the proposed scheme is explained
as below.
Section II discuss the Security Analysis and Testability of
the proposed scheme along with the existing scheme,
Section III representing the Test Pattern Generator, Section
IV explains the Simulation results for the Proposed secure
comparator Using Test Pattern Generator and finally,
Section V concludes on this brief.
2. SECURITY, TEST, AND DIAGNOSTIC
ISSUES
This section discusses the security improvements related to
the observation of a single pass/fail result as well as issues
related to test and diagnosis.
2.1 Security Analysis
The role of the proposed Secure Comparator is to avoid the
observation of SFFs containing secret information. If the
result of the comparison was accessible at each clock cycle
instead of each test vector, an attacker could easily observe
the scan chain content by shifting in “000…000” on the
Sexp pin. Each bit-comparison would then validate that
either the actual bit was “0” when Test Res = 1 and vice
versa. On the contrary, with the proposed vector-wise
comparison, the only way to retrieve the sensitive data
information is to apply a brute-force attack by trying every
possible response until Test Res is asserted. This attack
would thus require 2#SFF attempts. If other attacks such as
side-channel attacks [16] or faults attacks [17] are dreaded,
the Secure Comparator has to be protected as the rest of the
circuit. Even if countermeasures can lead to a large area
overhead (e.g., [18]) their implementation concerns a very
small part of the circuit.
2.2 Testability
The secure comparator does not impact the fault coverage.
In fact, each test response is compared to the expected one
as in a classical ATE-based test scheme. Therefore, the
achievable fault coverage is not altered. Test time is not
increased either, since the expected responses are scanned-in
at the same time as the next input vector is scanned-in.
Concerning the test of the Secure Comparator itself, any
DFT technique controlled by the external ATE (e.g., a
dedicated scan chain to test the counter of the Output
Enabler) would jeopardize the overall security.
Nevertheless, the Secure Comparator can be totally tested by
using only its inputs (Sen, Sexp, Sin, Test Res). We have
identified a procedure to test all stuck-at faults no matter of
the size of the Secure Comparator. This functional test
involves the comparison of the actual SFF values with a
partially matching, a fully un-matching, and a correct
response. Moreover, it includes the application of a two un-
matching responses without the intermediate capture cycle,
and twice the execution of the capture cycle. This test
procedure requires 6· (#SFF+1) clock cycles to provide
100% stuck at fault coverage.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 122
Fig 2 Proposed secure comparator Using Test Pattern
Generator
A limitation of our technique is related to the presence of
possible unpredictable values in the SFFs. Computing
expected values for the on-chip comparison is indeed no
longer possible. To fix this limitation, the Sticky
Comparator should ignore the comparison result (and keep
unchanged its flag) when Sout is unknown. This can be
implemented by providing an additional mask signal that is
asserted when needed. However, an attacker must not be
able to mask as many bits as wanted. In fact, if it were
possible to mask all but one bit, it would be obvious to
discover the value of each single bit in the scan response.
This would reduce the complexity of the brute-force attack
from exponential [O (2#SFF)] to linear [O(#SFF)].
Therefore, the number of masked bit (per test vector) must
be limited to P such that a brute force attack on 2#SFF−P
remains unfeasible. The extra cost to tolerate unknown
values includes an extra pin for the mask, a log2 P counter
to limit the number of masked bits and two logic gates. Fig.
2 shows a possible implementation.
3. TEST PATTERN GENERATOR
Using Linear Feedback Shift Registers (LFSRs)
Efficient design for Test Pattern Generators & Output
Response Analyzers FFs plus a few XOR gates better than
counter
• Fewer gates
• Higher clock frequency
Two types of LFSRs: Exterior Feedback, Internal Feedback
• High clock frequency
An LFSR generates periodic sequence must start in a non-
zero situation, The maximum length of an LFSR sequence is
2n -1 does not generate all 0s pattern The characteristic
polynomial of an LFSR generating maximum-length
sequence is a primitive polynomial A maximum-length
series is pseudo-random: number of 1s =number of 0s + 1
same number of runs of successive 0s and 1s 1/2 of the runs
have length1 1/4 of the runs have length 2 (as long as
fractions result in integral numbers of runs).
Fig .3 Linear Feedback Shift Registers
A hardware test pattern generator(TPG) generated by the no
of flip-flops cascading. These flip-flops are cascaded depend
upon the polynomial which are used for the development of
the test pattern generator the expected sequences are
developed from the polynomial construction of LFSR.
Table 1: Proposed area reports
Device Utilization Summary (estimated
values)
[-]
Logic Utilization Used Available Utilization
Number of Slices 2 2448 0%
Number of Slice Flip
Flops
4 4896 0%
Number of 4 input LUTs 1 4896 0%
Number of bonded IOBs 3 108 2%
Number of GCLKs 1 24 4%
Table 2: Existing area reports
Device Utilization Summary (estimated
values)
[-]
Logic Utilization Used Available Utilization
Number of Slice Registers 21 126800 0%
Number of Slice LUTs 8 63400 0%
Number of fully used
LUT-FF pairs
7 22 31%
Number of bonded IOBs 5 210 2%
Number of
BUFG/BUFGCTRLs
1 32 3%
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 123
4. SIMULATION RESULTS
Fig.4 Block diagram
Fig.5 RTL Schematic Secure Comparator
Fig.6 Technology schematic
Fig.7 Test Pattern Generator
Fig.8 Simulation Results
Fig.9 Delay Report
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 124
5. CONCLUSION
Inserting scan into a secure design implies new approaches
of the technique eventually; applying ones of these
countermeasures has also proven that at a suitable cost, scan
and security can live together. In this paper we do not give
the expected outputs. But in the scan circuit to generate the
expected values by using TPG. Here linear feedback circuit
used for TPG (Test pattern generator). The proposed
approach is based on the idea of withholding information.
The idea is to compare test responses within the chip. Both
input vectors and expected responses are scanned into the
circuit and the compare between expected and actual
responses is done at vector level. It does not provide
information on the value of every individual scan bit for
security purposes. In this paper we proposed a novel DFT
technique for scan design to ensure security not including
relying on costly test infrastructures to switch from mission
to test modes.
REFERENCES
[1]. B. Yang, K. Wu, and R. Karri, “Secure scan: A design-
for-test architecture for crypto chips,” IEEE Trans.
Comput.-Aided Design Integr. Circuits Syst., vol. 25, no. 10,
pp. 2287–2293, Oct. 2006.
[2]. B. Yang, K. Wu, and R. Karri, “Scan based side channel
attack on dedicated hardware implementations of data
encryption standard,” in Proc. IEEE Int. Test Conf., Oct.
2004, pp. 339–344.
[3]. Y. Wu and P. MacDonald, “Testing ASICs with
multiple identical cores,” IEEE Trans. Comput.-Aided
Design Integr. Circuits Syst., vol. 22, no. 3, pp. 327–336,
Mar. 2003.
[4]. K. J. Balakrishnan, G. Giles, and J. Wingfield, “Test
access mechanism in the quad-core AMD opteron
microprocessor,” IEEE Design Test Comput., vol. 26, no. 1,
pp. 52–59, Jan. 2009.
[5]. D. Andreu, “System and method for wirelessly testing
integrated circuits,” U.S. Patent 0 244 814, Oct. 6, 2011.
[6]. F. Poehl, M. Beck, R. Arnold, J. Rzeha, T. Rabenalt,
and M. Goessel, “On-chip evaluation, compensation and
storage of scan diagnosis data,” IET Comput.Digit.Tech.,
vol. 1, no. 3, pp. 207–212, 2007.
[7]. G.-M. Chiu and J. C.-M.Li, “A secure test wrapper
design against internal and boundary scan attacks for
embedded cores,” IEEE Trans. Very Large Scale Integr.
(VLSI) Syst., vol. 20, no. 1, pp. 126–134, Jan. 2012.
[8]. K. Rosenfeld and R. Karri, “Attacks and defenses for
JTAG,” IEEE Design Test Comput., vol. 27, no. 1, pp. 36–
47, Jan. 2010.
[9]. C. J. Clark, “Anti-tamper JTAG TAP design enables
DRM to JTAG registers and P1687 on-chip instruments,” in
Proc. IEEE Int. Symp. Hardw.-Oriented Security Trust, Jun.
2010, pp. 19–24.
[10]. D. Hely, F. Bancel, N. Berard, M. L. Flottes, and B.
Rouzeyre, “Test control for secure scan designs,” in Proc.
IEEE Eur. Test Symp., May 2005, pp. 190–195.
[11]. D. Hely, M.-L. Flottes, F. Bancel, B. Rouzeyre, N.
Berard, and M. Renovell, “Scan design and secure chip
[secure IC testing].,” in Proc. IEEE Int. On-Line Test.
Symp., Jul. 2004, pp. 219–224.
[12]. G. Sengar, D. Mukhopadhyay, and D. R. Chowdhury,
“Secured flipped scan-chain model for crypto-architecture,”
IEEE Trans. Comput.-Aided Design Integr. Circuits Syst.,
vol. 26, no. 11, pp. 2080–2084, Nov. 2007.
[13]. H. Fujiwara and M. E. J. Obien, “Secure and testable
scan design using extended de Bruijn graphs,” in Proc. Asia
South Pacific Design Autom. Conf., 2010, pp. 413–418.
[14]. J. Da Rolt, G. Di Natale, M.-L.Flottes, and B.
Rouzeyre, “New security threats against chips containing
scan chain structures,” in Proc. IEEE Int. Symp. Hardw.-
Oriented Security Trust, Jun. 2011, pp. 110–115.
[15]. L. Chunsheng and Y. Huang, “Effects of embedded
decompression and compaction architectures on side-
channel attack resistance,” in Proc. IEEE VLSI Test Symp.,
May 2007, pp. 461–468.
[16]. P. Kocher, J. Jaffe, and B. Jun, “Differential power
analysis,” in Proc. Int. Cryptol. Conf. Adv. Cryptol., 1999,
pp. 388–397.
[17]. P. Dusart, G. Letourneux, and O. Vivolo, “Differential
fault analysis on A.E.S,” in Applied Cryptography and
Network Security, vol. 2846. New York, NY, USA:
Springer-Verlag, 2003, pp. 293–306.
[18]. A. Moradi, T. Eisenbarth, A. Poschmann, C. Rolfes, C.
Paar, M. T. M. Shalmani, and M. Salmasizadeh,
“Information leakage of flip-flops in DPA-resistant logic
styles,” in Proc. IACR Cryptology ePrint Archive, 2008, pp.
188–188. 2008, pp. 188–188.
Ad

More Related Content

What's hot (18)

Elevating security in mobile adhoc network using
Elevating security in mobile adhoc network usingElevating security in mobile adhoc network using
Elevating security in mobile adhoc network using
eSAT Publishing House
 
Finding Diversity In Remote Code Injection Exploits
Finding Diversity In Remote Code Injection ExploitsFinding Diversity In Remote Code Injection Exploits
Finding Diversity In Remote Code Injection Exploits
amiable_indian
 
Automating Analysis and Exploitation of Embedded Device Firmware
Automating Analysis and Exploitation of Embedded Device FirmwareAutomating Analysis and Exploitation of Embedded Device Firmware
Automating Analysis and Exploitation of Embedded Device Firmware
Malachi Jones
 
J1802056063
J1802056063J1802056063
J1802056063
IOSR Journals
 
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET Journal
 
Adaptive key generation algorithm based on software engineering methodology
Adaptive key generation algorithm based on software engineering methodology Adaptive key generation algorithm based on software engineering methodology
Adaptive key generation algorithm based on software engineering methodology
IJECEIAES
 
False positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algoFalse positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algo
eSAT Journals
 
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Mahmud Hossain
 
E1802052327
E1802052327E1802052327
E1802052327
IOSR Journals
 
Employee trust based industrial device
Employee trust based industrial deviceEmployee trust based industrial device
Employee trust based industrial device
IJNSA Journal
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
IJNSA Journal
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
IJCSIS Research Publications
 
Intrusion Alert Correlation
Intrusion Alert CorrelationIntrusion Alert Correlation
Intrusion Alert Correlation
amiable_indian
 
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
IAEME Publication
 
Securing Wireless IMD
Securing Wireless IMDSecuring Wireless IMD
Securing Wireless IMD
University of California Riverside
 
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET-  	  SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...IRJET-  	  SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET Journal
 
Bachelorthesis
BachelorthesisBachelorthesis
Bachelorthesis
Dhara Shah
 
Defcon through the_eyes_of_the_attacker_2018_slides
Defcon through the_eyes_of_the_attacker_2018_slidesDefcon through the_eyes_of_the_attacker_2018_slides
Defcon through the_eyes_of_the_attacker_2018_slides
Marina Krotofil
 
Elevating security in mobile adhoc network using
Elevating security in mobile adhoc network usingElevating security in mobile adhoc network using
Elevating security in mobile adhoc network using
eSAT Publishing House
 
Finding Diversity In Remote Code Injection Exploits
Finding Diversity In Remote Code Injection ExploitsFinding Diversity In Remote Code Injection Exploits
Finding Diversity In Remote Code Injection Exploits
amiable_indian
 
Automating Analysis and Exploitation of Embedded Device Firmware
Automating Analysis and Exploitation of Embedded Device FirmwareAutomating Analysis and Exploitation of Embedded Device Firmware
Automating Analysis and Exploitation of Embedded Device Firmware
Malachi Jones
 
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET Journal
 
Adaptive key generation algorithm based on software engineering methodology
Adaptive key generation algorithm based on software engineering methodology Adaptive key generation algorithm based on software engineering methodology
Adaptive key generation algorithm based on software engineering methodology
IJECEIAES
 
False positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algoFalse positive reduction by combining svm and knn algo
False positive reduction by combining svm and knn algo
eSAT Journals
 
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Mahmud Hossain
 
Employee trust based industrial device
Employee trust based industrial deviceEmployee trust based industrial device
Employee trust based industrial device
IJNSA Journal
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
IJNSA Journal
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
IJCSIS Research Publications
 
Intrusion Alert Correlation
Intrusion Alert CorrelationIntrusion Alert Correlation
Intrusion Alert Correlation
amiable_indian
 
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION...
IAEME Publication
 
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET-  	  SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...IRJET-  	  SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET Journal
 
Bachelorthesis
BachelorthesisBachelorthesis
Bachelorthesis
Dhara Shah
 
Defcon through the_eyes_of_the_attacker_2018_slides
Defcon through the_eyes_of_the_attacker_2018_slidesDefcon through the_eyes_of_the_attacker_2018_slides
Defcon through the_eyes_of_the_attacker_2018_slides
Marina Krotofil
 

Viewers also liked (20)

Using transfer learning for video popularity prediction
Using transfer learning for video popularity predictionUsing transfer learning for video popularity prediction
Using transfer learning for video popularity prediction
eSAT Publishing House
 
20160219 F. Malvestiti - DAL CARIOTIPO AL NGS: COME STA CAMBIANDO LA DIAGNOSI...
20160219 F. Malvestiti - DAL CARIOTIPO AL NGS: COME STA CAMBIANDO LA DIAGNOSI...20160219 F. Malvestiti - DAL CARIOTIPO AL NGS: COME STA CAMBIANDO LA DIAGNOSI...
20160219 F. Malvestiti - DAL CARIOTIPO AL NGS: COME STA CAMBIANDO LA DIAGNOSI...
Roberto Scarafia
 
A mobile based microscope for sample recognition
A mobile based microscope for sample recognitionA mobile based microscope for sample recognition
A mobile based microscope for sample recognition
eSAT Publishing House
 
Secured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetsSecured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manets
eSAT Publishing House
 
A study on geographical characteristics of the krishna western delta using gi...
A study on geographical characteristics of the krishna western delta using gi...A study on geographical characteristics of the krishna western delta using gi...
A study on geographical characteristics of the krishna western delta using gi...
eSAT Publishing House
 
A distinct approach for xmotif application gui test automation
A distinct approach for xmotif application gui test automationA distinct approach for xmotif application gui test automation
A distinct approach for xmotif application gui test automation
eSAT Publishing House
 
A simple instrumentation system for separation of whole blood components usin...
A simple instrumentation system for separation of whole blood components usin...A simple instrumentation system for separation of whole blood components usin...
A simple instrumentation system for separation of whole blood components usin...
eSAT Publishing House
 
Improved block based segmentation for jpeg
Improved block based segmentation for jpegImproved block based segmentation for jpeg
Improved block based segmentation for jpeg
eSAT Publishing House
 
Comparative experimental study of simple absorber
Comparative experimental study of simple absorberComparative experimental study of simple absorber
Comparative experimental study of simple absorber
eSAT Publishing House
 
Simulation of fin geometries for heat sink in forced
Simulation of fin geometries for heat sink in forcedSimulation of fin geometries for heat sink in forced
Simulation of fin geometries for heat sink in forced
eSAT Publishing House
 
Thermal analysis and dc conductivity of
Thermal analysis and dc conductivity ofThermal analysis and dc conductivity of
Thermal analysis and dc conductivity of
eSAT Publishing House
 
Accelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsnsAccelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsns
eSAT Publishing House
 
Pattern –based with surface based morphometry survey
Pattern –based with surface based morphometry surveyPattern –based with surface based morphometry survey
Pattern –based with surface based morphometry survey
eSAT Publishing House
 
Analysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networksAnalysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networks
eSAT Publishing House
 
An adaptive broadcast mechanism to improve alert
An adaptive broadcast mechanism to improve alertAn adaptive broadcast mechanism to improve alert
An adaptive broadcast mechanism to improve alert
eSAT Publishing House
 
A novel approach in identification of blood group using laser technology
A novel approach in identification of blood group using laser technologyA novel approach in identification of blood group using laser technology
A novel approach in identification of blood group using laser technology
eSAT Publishing House
 
Wireless server for total healthcare system for clients
Wireless server for total healthcare system for clientsWireless server for total healthcare system for clients
Wireless server for total healthcare system for clients
eSAT Publishing House
 
Water security for village gavhali through roof top rain water harvesting
Water security for village gavhali through roof top rain water harvestingWater security for village gavhali through roof top rain water harvesting
Water security for village gavhali through roof top rain water harvesting
eSAT Publishing House
 
Review work on analysis of f1 car frame using ansys
Review work on analysis of f1 car frame using ansysReview work on analysis of f1 car frame using ansys
Review work on analysis of f1 car frame using ansys
eSAT Publishing House
 
Investigation of behaviour of 3 degrees of freedom
Investigation of behaviour of 3 degrees of freedomInvestigation of behaviour of 3 degrees of freedom
Investigation of behaviour of 3 degrees of freedom
eSAT Publishing House
 
Using transfer learning for video popularity prediction
Using transfer learning for video popularity predictionUsing transfer learning for video popularity prediction
Using transfer learning for video popularity prediction
eSAT Publishing House
 
20160219 F. Malvestiti - DAL CARIOTIPO AL NGS: COME STA CAMBIANDO LA DIAGNOSI...
20160219 F. Malvestiti - DAL CARIOTIPO AL NGS: COME STA CAMBIANDO LA DIAGNOSI...20160219 F. Malvestiti - DAL CARIOTIPO AL NGS: COME STA CAMBIANDO LA DIAGNOSI...
20160219 F. Malvestiti - DAL CARIOTIPO AL NGS: COME STA CAMBIANDO LA DIAGNOSI...
Roberto Scarafia
 
A mobile based microscope for sample recognition
A mobile based microscope for sample recognitionA mobile based microscope for sample recognition
A mobile based microscope for sample recognition
eSAT Publishing House
 
Secured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetsSecured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manets
eSAT Publishing House
 
A study on geographical characteristics of the krishna western delta using gi...
A study on geographical characteristics of the krishna western delta using gi...A study on geographical characteristics of the krishna western delta using gi...
A study on geographical characteristics of the krishna western delta using gi...
eSAT Publishing House
 
A distinct approach for xmotif application gui test automation
A distinct approach for xmotif application gui test automationA distinct approach for xmotif application gui test automation
A distinct approach for xmotif application gui test automation
eSAT Publishing House
 
A simple instrumentation system for separation of whole blood components usin...
A simple instrumentation system for separation of whole blood components usin...A simple instrumentation system for separation of whole blood components usin...
A simple instrumentation system for separation of whole blood components usin...
eSAT Publishing House
 
Improved block based segmentation for jpeg
Improved block based segmentation for jpegImproved block based segmentation for jpeg
Improved block based segmentation for jpeg
eSAT Publishing House
 
Comparative experimental study of simple absorber
Comparative experimental study of simple absorberComparative experimental study of simple absorber
Comparative experimental study of simple absorber
eSAT Publishing House
 
Simulation of fin geometries for heat sink in forced
Simulation of fin geometries for heat sink in forcedSimulation of fin geometries for heat sink in forced
Simulation of fin geometries for heat sink in forced
eSAT Publishing House
 
Thermal analysis and dc conductivity of
Thermal analysis and dc conductivity ofThermal analysis and dc conductivity of
Thermal analysis and dc conductivity of
eSAT Publishing House
 
Accelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsnsAccelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsns
eSAT Publishing House
 
Pattern –based with surface based morphometry survey
Pattern –based with surface based morphometry surveyPattern –based with surface based morphometry survey
Pattern –based with surface based morphometry survey
eSAT Publishing House
 
Analysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networksAnalysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networks
eSAT Publishing House
 
An adaptive broadcast mechanism to improve alert
An adaptive broadcast mechanism to improve alertAn adaptive broadcast mechanism to improve alert
An adaptive broadcast mechanism to improve alert
eSAT Publishing House
 
A novel approach in identification of blood group using laser technology
A novel approach in identification of blood group using laser technologyA novel approach in identification of blood group using laser technology
A novel approach in identification of blood group using laser technology
eSAT Publishing House
 
Wireless server for total healthcare system for clients
Wireless server for total healthcare system for clientsWireless server for total healthcare system for clients
Wireless server for total healthcare system for clients
eSAT Publishing House
 
Water security for village gavhali through roof top rain water harvesting
Water security for village gavhali through roof top rain water harvestingWater security for village gavhali through roof top rain water harvesting
Water security for village gavhali through roof top rain water harvesting
eSAT Publishing House
 
Review work on analysis of f1 car frame using ansys
Review work on analysis of f1 car frame using ansysReview work on analysis of f1 car frame using ansys
Review work on analysis of f1 car frame using ansys
eSAT Publishing House
 
Investigation of behaviour of 3 degrees of freedom
Investigation of behaviour of 3 degrees of freedomInvestigation of behaviour of 3 degrees of freedom
Investigation of behaviour of 3 degrees of freedom
eSAT Publishing House
 
Ad

Similar to Design and implementation of secured scan based attacks on ic’s by using on chip comparison (20)

Test versus security @ IEEE Concept
Test versus security @ IEEE ConceptTest versus security @ IEEE Concept
Test versus security @ IEEE Concept
kodela3
 
A05510105
A05510105A05510105
A05510105
IOSR-JEN
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
eSAT Publishing House
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
eSAT Journals
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
Nirmal Thaliyil
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
subhradeep mitra
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
IJNSA Journal
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
JIEMS Akkalkuwa
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
eSAT Publishing House
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
IJMER
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
AM Publications
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
IJCNCJournal
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET Journal
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
EditorJST
 
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET Journal
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
IRJET Journal
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
ijsrd.com
 
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
AM Publications
 
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
AM Publications
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
ijasuc
 
Test versus security @ IEEE Concept
Test versus security @ IEEE ConceptTest versus security @ IEEE Concept
Test versus security @ IEEE Concept
kodela3
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
eSAT Publishing House
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
eSAT Journals
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
Nirmal Thaliyil
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
subhradeep mitra
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
IJNSA Journal
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
JIEMS Akkalkuwa
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
eSAT Publishing House
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
IJMER
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
AM Publications
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
IJCNCJournal
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET Journal
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
EditorJST
 
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET Journal
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
IRJET Journal
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
ijsrd.com
 
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
AM Publications
 
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
Techniques to Secure Wireless Sensor Networks in Terms of Delay, Process Time...
AM Publications
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
ijasuc
 
Ad

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 
Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

Recently uploaded (20)

fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Journal of Soft Computing in Civil Engineering
 
How to use nRF24L01 module with Arduino
How to use nRF24L01 module with ArduinoHow to use nRF24L01 module with Arduino
How to use nRF24L01 module with Arduino
CircuitDigest
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Journal of Soft Computing in Civil Engineering
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
Resistance measurement and cfd test on darpa subboff model
Resistance measurement and cfd test on darpa subboff modelResistance measurement and cfd test on darpa subboff model
Resistance measurement and cfd test on darpa subboff model
INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
LECTURE-16 EARTHEN DAM - II.pptx it's uses
LECTURE-16 EARTHEN DAM - II.pptx it's usesLECTURE-16 EARTHEN DAM - II.pptx it's uses
LECTURE-16 EARTHEN DAM - II.pptx it's uses
CLokeshBehera123
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Journal of Soft Computing in Civil Engineering
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdffive-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
AdityaSharma944496
 
new ppt artificial intelligence historyyy
new ppt artificial intelligence historyyynew ppt artificial intelligence historyyy
new ppt artificial intelligence historyyy
PianoPianist
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
How to use nRF24L01 module with Arduino
How to use nRF24L01 module with ArduinoHow to use nRF24L01 module with Arduino
How to use nRF24L01 module with Arduino
CircuitDigest
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
LECTURE-16 EARTHEN DAM - II.pptx it's uses
LECTURE-16 EARTHEN DAM - II.pptx it's usesLECTURE-16 EARTHEN DAM - II.pptx it's uses
LECTURE-16 EARTHEN DAM - II.pptx it's uses
CLokeshBehera123
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdffive-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
AdityaSharma944496
 
new ppt artificial intelligence historyyy
new ppt artificial intelligence historyyynew ppt artificial intelligence historyyy
new ppt artificial intelligence historyyy
PianoPianist
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 

Design and implementation of secured scan based attacks on ic’s by using on chip comparison

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 120 DESIGN AND IMPLEMENTATION OF SECURED SCAN BASED ATTACKS ON IC’S BY USING ON CHIP COMPARISON G.Nalini.Krishnakanth1 , K. Jyothi2 1 PG student (VLSI&ES), GIET, Rajahmundry, India 2 Associate Professor, ECE Dept, GIET, Rajahmundry, India Abstract Physical designing of cryptographic analysis is subjected to various physical attacks. It has been formerly evidenced that scan chains introduce for hardware testability open a back door to potential attacks. Scan based testing technique is mainly used for testing and it provides full observabilty and controllability of the inner nodes of the IC. Therefore, in this paper, we propose a scan-protection scheme that provides testing facilities both at assembly time and over the course of the circuit’s life. An efficient principle is used to scan-in both input vectors and expected responses to compare expected and actual responses inside the circuit. This method has no impact on the feature of the test or the model-based fault analysis when compared to traditional scan tests. It occupies less area on the chip and avoids the authentication test mechanism. Keywords- security, testability, Design-for-testability (DFT), scan-based attack, test pattern generator ---------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION Many features of our daily lives rely on electronic data interchange. Encryption algorithms are used to guarantee the confidentiality, integrity, and validity of these exchanges. These algorithms are implemented on dedicated hardware for performance optimization and to embed confidential information, which must be kept secret from illegal users. Imperfect production processes of electronic devices lead to the need for manufacturing testing to sort out defective circuits from good quality ones, whatever be the aim application. This is even more relevant for secure circuits where a physical fault could jeopardize the security of the classified information. However, the most common practice for testing digital devices relies on a scan-chains insertion that guarantees high fault coverage and thus an ultimate product quality, but open backdoors to security threats too. The “Scan attacks” described for instance in [1] and [2] utilize the access offered by scan chains’ IOs for retrieving the secret key of an encryption core. These attacks rely on the possibility to observe the circuit’s internal state while this state is related to the secret. A common industrial practice to solve this security threat is to physically disconnect the scan chains after production testing by blow the fuses located at both ends of the scan chains. However, this solution impedes the testing of those devices require being tested after manufacturing. In particular, the correct performance of the secure circuits should be validated after the introduction of the secret key, which can be programmed at any time of the circuit’s life cycle. This secured information can indeed be owned by any circuit producer (e.g., designer, manufacturer, and system integrator) or user (e.g., reseller or final customer). In addition, scan disconnection stops any further analysis, e.g., diagnostic, or cannot be considered as an appropriate response to the scan attack if the connection can be reconstructed. In the literature, several solutions have thus been proposed to avoid disconnecting scan chains after manufacturing testing. However, the solutions are either expensive or not fully safe against latest scan attacks. In this brief, we explain new design-for-testability (DFT) architecture that eliminates the need to separate the scan chains. This approach is based on the concept of maintenance information. The test procedure consists in providing both the test vectors and expected test responses to the device-under-test (DUT) for an on-chip comparison. Methods for the on-chip comparison of actual and expected test responses have already been explored in other contexts [3]–[6], mainly to lessen the test data volume to transfer from DUTs to test equipment. However, none of these solutions achieve the target security requirements since individual bit values stored in the scan chains can still be observed or deducted from observed data, thanks to the test circuitry. Because testability features must not be implemented to the detriment of the security of the circuit, and vice versa, this brief also discusses test and diagnostic procedures with our DFT proposal, as well as security of the circuit with respect to attacks perpetrate on the test infrastructure. Cryptography is the science of secure communication and information protection from unauthorized access. Cryptography enables communicating parties to exchange information securely over an insecure channel. Modern cryptography not only applies to secure communication, but also has applications in software security, security of electronic devices (smart cards, RFIDs, memories, etc.), data protection (disk encryption), copyright protection (Digital Rights Management (DRM)) and more. Examples include RFID based access control systems, authenticating users for bank transactions using smart cards supporting cryptographic protocols, and full hard disk encryption
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 121 employing symmetric-key cryptography. Cryptography as a technology can be used to provide the following security properties: confidentiality of data, data integrity, entity authentication of the sender and the receiver, and non- repudiation of sender and receiver, among others [89]. Various cryptographic primitives and protocols can help in attaining these objectives. Though the mathematical or theoretical strength of these primitives can be quite high, their implementations in hardware or software are prone to information leakages. Cryptographic implementations in hardware and software need to be protected against attacks aimed at revealing the secret information stored within them. Hardware attacks can be characterized as follows: Active or passive attacks: active attacks require the attacker to tamper or troubles bate the device internals (by probing, laser impingement, etc.) and derive the secret data from the observed response. Passive attacks require the attacker to only observe passively and infer the secret from the observed behavior by exploiting one or more physical characteristics of the device when it is in operation. Some of these characteristics include power consumption, electromagnetic radiation, execution timing, or the data coming in or out of the external interface. Invasive, semi- invasive or non-invasive attacks: invasive attacks require opening the device package and contact the electronic circuits inside; semi invasive attacks also require opening the device package but no contact to the internal circuits is needed, while non-invasive attacks do not require modification of the device package. Scan has been generally accepted as the standard method of testing chips due to high fault coverage and relatively lower area overhead. Inserting scan-chains while designing the chip requires a few additional/multiplexed pins to the primary inputs/outputs to serve as the scan-enable, scan- inputs and scan-outputs. Internally, there is little impact on the design since the standard flip-flops (FFs) are replaced by scan flip-flops (SFFs) (i.e., flip-flops with an input multiplexer) which are then linked to one another creating a shift register (scan chain). An example of a scan chain is shown in the Figure 1. Scan-enable selects between functional and test mode operations. It controls each multiplexer, choosing between the normal mode input of the FF or the output of the previous SFF in the chain. Fig .1 Scan Chain DFT Structure A brief summarization of the proposed scheme is explained as below. Section II discuss the Security Analysis and Testability of the proposed scheme along with the existing scheme, Section III representing the Test Pattern Generator, Section IV explains the Simulation results for the Proposed secure comparator Using Test Pattern Generator and finally, Section V concludes on this brief. 2. SECURITY, TEST, AND DIAGNOSTIC ISSUES This section discusses the security improvements related to the observation of a single pass/fail result as well as issues related to test and diagnosis. 2.1 Security Analysis The role of the proposed Secure Comparator is to avoid the observation of SFFs containing secret information. If the result of the comparison was accessible at each clock cycle instead of each test vector, an attacker could easily observe the scan chain content by shifting in “000…000” on the Sexp pin. Each bit-comparison would then validate that either the actual bit was “0” when Test Res = 1 and vice versa. On the contrary, with the proposed vector-wise comparison, the only way to retrieve the sensitive data information is to apply a brute-force attack by trying every possible response until Test Res is asserted. This attack would thus require 2#SFF attempts. If other attacks such as side-channel attacks [16] or faults attacks [17] are dreaded, the Secure Comparator has to be protected as the rest of the circuit. Even if countermeasures can lead to a large area overhead (e.g., [18]) their implementation concerns a very small part of the circuit. 2.2 Testability The secure comparator does not impact the fault coverage. In fact, each test response is compared to the expected one as in a classical ATE-based test scheme. Therefore, the achievable fault coverage is not altered. Test time is not increased either, since the expected responses are scanned-in at the same time as the next input vector is scanned-in. Concerning the test of the Secure Comparator itself, any DFT technique controlled by the external ATE (e.g., a dedicated scan chain to test the counter of the Output Enabler) would jeopardize the overall security. Nevertheless, the Secure Comparator can be totally tested by using only its inputs (Sen, Sexp, Sin, Test Res). We have identified a procedure to test all stuck-at faults no matter of the size of the Secure Comparator. This functional test involves the comparison of the actual SFF values with a partially matching, a fully un-matching, and a correct response. Moreover, it includes the application of a two un- matching responses without the intermediate capture cycle, and twice the execution of the capture cycle. This test procedure requires 6· (#SFF+1) clock cycles to provide 100% stuck at fault coverage.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 122 Fig 2 Proposed secure comparator Using Test Pattern Generator A limitation of our technique is related to the presence of possible unpredictable values in the SFFs. Computing expected values for the on-chip comparison is indeed no longer possible. To fix this limitation, the Sticky Comparator should ignore the comparison result (and keep unchanged its flag) when Sout is unknown. This can be implemented by providing an additional mask signal that is asserted when needed. However, an attacker must not be able to mask as many bits as wanted. In fact, if it were possible to mask all but one bit, it would be obvious to discover the value of each single bit in the scan response. This would reduce the complexity of the brute-force attack from exponential [O (2#SFF)] to linear [O(#SFF)]. Therefore, the number of masked bit (per test vector) must be limited to P such that a brute force attack on 2#SFF−P remains unfeasible. The extra cost to tolerate unknown values includes an extra pin for the mask, a log2 P counter to limit the number of masked bits and two logic gates. Fig. 2 shows a possible implementation. 3. TEST PATTERN GENERATOR Using Linear Feedback Shift Registers (LFSRs) Efficient design for Test Pattern Generators & Output Response Analyzers FFs plus a few XOR gates better than counter • Fewer gates • Higher clock frequency Two types of LFSRs: Exterior Feedback, Internal Feedback • High clock frequency An LFSR generates periodic sequence must start in a non- zero situation, The maximum length of an LFSR sequence is 2n -1 does not generate all 0s pattern The characteristic polynomial of an LFSR generating maximum-length sequence is a primitive polynomial A maximum-length series is pseudo-random: number of 1s =number of 0s + 1 same number of runs of successive 0s and 1s 1/2 of the runs have length1 1/4 of the runs have length 2 (as long as fractions result in integral numbers of runs). Fig .3 Linear Feedback Shift Registers A hardware test pattern generator(TPG) generated by the no of flip-flops cascading. These flip-flops are cascaded depend upon the polynomial which are used for the development of the test pattern generator the expected sequences are developed from the polynomial construction of LFSR. Table 1: Proposed area reports Device Utilization Summary (estimated values) [-] Logic Utilization Used Available Utilization Number of Slices 2 2448 0% Number of Slice Flip Flops 4 4896 0% Number of 4 input LUTs 1 4896 0% Number of bonded IOBs 3 108 2% Number of GCLKs 1 24 4% Table 2: Existing area reports Device Utilization Summary (estimated values) [-] Logic Utilization Used Available Utilization Number of Slice Registers 21 126800 0% Number of Slice LUTs 8 63400 0% Number of fully used LUT-FF pairs 7 22 31% Number of bonded IOBs 5 210 2% Number of BUFG/BUFGCTRLs 1 32 3%
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 123 4. SIMULATION RESULTS Fig.4 Block diagram Fig.5 RTL Schematic Secure Comparator Fig.6 Technology schematic Fig.7 Test Pattern Generator Fig.8 Simulation Results Fig.9 Delay Report
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 10 | Oct-2014, Available @ http://www.ijret.org 124 5. CONCLUSION Inserting scan into a secure design implies new approaches of the technique eventually; applying ones of these countermeasures has also proven that at a suitable cost, scan and security can live together. In this paper we do not give the expected outputs. But in the scan circuit to generate the expected values by using TPG. Here linear feedback circuit used for TPG (Test pattern generator). The proposed approach is based on the idea of withholding information. The idea is to compare test responses within the chip. Both input vectors and expected responses are scanned into the circuit and the compare between expected and actual responses is done at vector level. It does not provide information on the value of every individual scan bit for security purposes. In this paper we proposed a novel DFT technique for scan design to ensure security not including relying on costly test infrastructures to switch from mission to test modes. REFERENCES [1]. B. Yang, K. Wu, and R. Karri, “Secure scan: A design- for-test architecture for crypto chips,” IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 25, no. 10, pp. 2287–2293, Oct. 2006. [2]. B. Yang, K. Wu, and R. Karri, “Scan based side channel attack on dedicated hardware implementations of data encryption standard,” in Proc. IEEE Int. Test Conf., Oct. 2004, pp. 339–344. [3]. Y. Wu and P. MacDonald, “Testing ASICs with multiple identical cores,” IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 22, no. 3, pp. 327–336, Mar. 2003. [4]. K. J. Balakrishnan, G. Giles, and J. Wingfield, “Test access mechanism in the quad-core AMD opteron microprocessor,” IEEE Design Test Comput., vol. 26, no. 1, pp. 52–59, Jan. 2009. [5]. D. Andreu, “System and method for wirelessly testing integrated circuits,” U.S. Patent 0 244 814, Oct. 6, 2011. [6]. F. Poehl, M. Beck, R. Arnold, J. Rzeha, T. Rabenalt, and M. Goessel, “On-chip evaluation, compensation and storage of scan diagnosis data,” IET Comput.Digit.Tech., vol. 1, no. 3, pp. 207–212, 2007. [7]. G.-M. Chiu and J. C.-M.Li, “A secure test wrapper design against internal and boundary scan attacks for embedded cores,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 20, no. 1, pp. 126–134, Jan. 2012. [8]. K. Rosenfeld and R. Karri, “Attacks and defenses for JTAG,” IEEE Design Test Comput., vol. 27, no. 1, pp. 36– 47, Jan. 2010. [9]. C. J. Clark, “Anti-tamper JTAG TAP design enables DRM to JTAG registers and P1687 on-chip instruments,” in Proc. IEEE Int. Symp. Hardw.-Oriented Security Trust, Jun. 2010, pp. 19–24. [10]. D. Hely, F. Bancel, N. Berard, M. L. Flottes, and B. Rouzeyre, “Test control for secure scan designs,” in Proc. IEEE Eur. Test Symp., May 2005, pp. 190–195. [11]. D. Hely, M.-L. Flottes, F. Bancel, B. Rouzeyre, N. Berard, and M. Renovell, “Scan design and secure chip [secure IC testing].,” in Proc. IEEE Int. On-Line Test. Symp., Jul. 2004, pp. 219–224. [12]. G. Sengar, D. Mukhopadhyay, and D. R. Chowdhury, “Secured flipped scan-chain model for crypto-architecture,” IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 26, no. 11, pp. 2080–2084, Nov. 2007. [13]. H. Fujiwara and M. E. J. Obien, “Secure and testable scan design using extended de Bruijn graphs,” in Proc. Asia South Pacific Design Autom. Conf., 2010, pp. 413–418. [14]. J. Da Rolt, G. Di Natale, M.-L.Flottes, and B. Rouzeyre, “New security threats against chips containing scan chain structures,” in Proc. IEEE Int. Symp. Hardw.- Oriented Security Trust, Jun. 2011, pp. 110–115. [15]. L. Chunsheng and Y. Huang, “Effects of embedded decompression and compaction architectures on side- channel attack resistance,” in Proc. IEEE VLSI Test Symp., May 2007, pp. 461–468. [16]. P. Kocher, J. Jaffe, and B. Jun, “Differential power analysis,” in Proc. Int. Cryptol. Conf. Adv. Cryptol., 1999, pp. 388–397. [17]. P. Dusart, G. Letourneux, and O. Vivolo, “Differential fault analysis on A.E.S,” in Applied Cryptography and Network Security, vol. 2846. New York, NY, USA: Springer-Verlag, 2003, pp. 293–306. [18]. A. Moradi, T. Eisenbarth, A. Poschmann, C. Rolfes, C. Paar, M. T. M. Shalmani, and M. Salmasizadeh, “Information leakage of flip-flops in DPA-resistant logic styles,” in Proc. IACR Cryptology ePrint Archive, 2008, pp. 188–188. 2008, pp. 188–188.