Detection of Security Hacking Attacks by Scan Based TPG Using Verilog

Journal Title: Scholars Journal of Engineering and Technology - Year 2014, Vol 2, Issue 5

Abstract

Hardware development of cryptographic algorithms is subject to various attacks. It has been previously demonstrated that scan chains introduce for hardware testability open a back door to potential attacks. Scan based testing is one of the mainly used and powerful test technique since it provides full observability and controllability of the internal nodes of the IC. It has been previously demonstrated that scan chains introduced for hardware testability open a back door to possible attacks. Here, we propose a scan-protection scheme that provides testing facilities both at production time and over the course of the circuit’s life. Here the underlying principles to scan-in both input vectors and expected responses and to compare expected and actual responses inside the circuit. Compared to regular scan tests, this technique has no impact on the quality of the test or the model-based fault diagnosis. It entails negligible area overhead and avoids the use of an authentication test mechanism. Keywords: security, testability, Design-for-testability (DfT), scan-based attack, test pattern generator

Authors and Affiliations

R. Priyadarsini, S. Anusha

Keywords

Related Articles

The Development Direction and Strategy of New Urbanization from the Perspective of Ecology Theory

The new urbanization development in China can't develop like some western developed countries, which have experienced the urbanization, industrialization, then globalization, informatization and are pursuing the ecology...

Join Operations in Relational Databases with Automatic Attributes Renaming

The paper considers inner and outer join of relation operations, as well as set-theoretical operations on relations. Unlike join operations in Codd’s relational algebra the join operations under consideration are based...

Effects of Shape and Technology of Installation on the Bearing Capacity of Pile Foundations in Layered Soil

Among other factors, which influence the bearing capacity of piles, the shape of its external configuration, as well the installation technique employed during construction, also play major roles. This paper presents the...

Integral Solution of the Non-Homogeneous Heptic Equation with Five Unknowns

We obtain infinitely many non-zero integer quintuples satisfying the non-homogeneous equation of degree seven with five unknowns given by .Various interesting properties between the solutions and special numbers are p...

Construction of single traveling wave solutions to modified YTSF equation

By the complete discrimination system for polynomial method, we obtained the classification of single traveling wave solutions to modified YTSF equation. Keywords: complete discrimination system for polynomial method, mo...

Download PDF file
  • EP ID EP385187
  • DOI -
  • Views 82
  • Downloads 0

How To Cite

R. Priyadarsini, S. Anusha (2014). Detection of Security Hacking Attacks by Scan Based TPG Using Verilog. Scholars Journal of Engineering and Technology, 2(5), 769-773. https://europub.co.uk./articles/-A-385187