DocumentCode :
170118
Title :
Test-mode-only scan attack using the boundary scan chain
Author :
Ali, Sk Subidh ; Sinanoglu, Ozgur ; Karri, Ramesh
fYear :
2014
fDate :
26-30 May 2014
Firstpage :
1
Lastpage :
6
Abstract :
Boundary-scan is a very popular technology with wide applications in product life cycle that ranges from product design, prototype debugging, production to field service. However, when it comes to securing a product such as smart card, RFID tag, set-top-box, etc., the technology can be targeted by an attacker to reveal the secret information of the chip. In this paper, for the first time, we will show that the boundary scan chain can be used to bypass the mode-reset countermeasure, which is used to thwart all the scan attacks that rely on switching between the normal mode and the test mode of the chip. We propose two attacks on the AES core. The first attack uses the boundary scan chain to apply input plaintexts to the first round of AES, whereas the second attack targets the final round by applying the inputs through the internal scan chain(s) and the round output is captured in the boundary scan chain. The attacks not only bypass the mode-reset countermeasure but also circumvent the affect of stimulus decompressor (first attack) or the response compactor (second attack). Both attacks retrieve the 128-bit secret key within one minute of execution.
Keywords :
design for testability; integrated circuit testing; microprocessor chips; public key cryptography; 128-bit secret key; AES core; RFID tag; boundary scan chain; crypto-chip; design-for-testability methodology; input plaintexts; internal scan chain; mode-reset countermeasure; normal mode; product design; product life cycle; production-to-field service; prototype debugging; response compactor; set-top-box; smart card; stimulus decompressor; test mode; test-mode-only scan attack; Ciphers; Computer architecture; Hamming distance; Radiation detectors; Registers; Switches; Vectors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Test Symposium (ETS), 2014 19th IEEE European
Conference_Location :
Paderborn
Type :
conf
DOI :
10.1109/ETS.2014.6847798
Filename :
6847798
Link To Document :
بازگشت