Dynamically obfuscated scan for protecting IPs against scan-based attacks throughout supply chain
Title | Dynamically obfuscated scan for protecting IPs against scan-based attacks throughout supply chain |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Zhang, Dongrong, He, Miao, Wang, Xiaoxiao, Tehranipoor, M. |
Conference Name | 2017 IEEE 35th VLSI Test Symposium (VTS) |
Keywords | automatic test pattern generation, boundary scan testing, chip security, Clocks, Collaboration, composability, Discrete Fourier transforms, dynamically-obfuscated scan design, EDA generated scan chains, industrial property, integrated circuit design, integrated circuit manufacture, integrated circuit manufacturing, integrated circuit test flow, integrated circuit testing, integrated circuits, intellectual property, ip protection, Logic gates, noninvasive scan attacks, pattern generation time, policy, policy-based governance, pubcrawl, Registers, Resiliency, scan-based attacks, scan-based test, Secure Scan, security, supply chain, Supply chains, Testability |
Abstract | Scan-based test is commonly used to increase testability and fault coverage, however, it is also known to be a liability for chip security. Research has shown that intellectual property (IP) or secret keys can be leaked through scan-based attacks. In this paper, we propose a dynamically-obfuscated scan design for protecting IPs against scan-based attacks. By perturbing all test patterns/responses and protecting the obfuscation key, the proposed architecture is proven to be robust against existing non-invasive scan attacks, and can protect all scan data from attackers in foundry, assembly, and system developers (i.e., OEMs) without compromising the testability. Furthermore, the proposed architecture can be easily plugged into EDA generated scan chains without having a noticeable impact on conventional integrated circuit (IC) design, manufacturing, and test flow. Finally, detailed security and experimental analyses have been performed on several benchmarks. The results demonstrate that the proposed method can protect chips from existing brute force, differential, and other scan-based attacks that target the obfuscation key. The proposed design is of low overhead on area, power consumption, and pattern generation time, and there is no impact on test time. |
URL | https://ieeexplore.ieee.org/document/7928947 |
DOI | 10.1109/VTS.2017.7928947 |
Citation Key | zhang_dynamically_2017 |
- Resiliency
- ip protection
- Logic gates
- noninvasive scan attacks
- pattern generation time
- Policy
- policy-based governance
- pubcrawl
- Registers
- intellectual property
- scan-based attacks
- scan-based test
- Secure Scan
- security
- Supply Chain
- supply chains
- Testability
- automatic test pattern generation
- integrated circuits
- integrated circuit testing
- integrated circuit test flow
- integrated circuit manufacturing
- integrated circuit manufacture
- integrated circuit design
- industrial property
- EDA generated scan chains
- dynamically-obfuscated scan design
- Discrete Fourier transforms
- composability
- collaboration
- Clocks
- chip security
- boundary scan testing