Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/13572
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMazumdar, Bodhisatwaen_US
dc.date.accessioned2024-04-26T12:43:20Z-
dc.date.available2024-04-26T12:43:20Z-
dc.date.issued2024-
dc.identifier.citationSao, Y., Ali, S. S., & Mazumdar, B. (2024). DefScan: Provably Defeating Scan Attack on AES-Like Ciphers. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. Scopus. https://doi.org/10.1109/TCAD.2024.3368289en_US
dc.identifier.issn0278-0070-
dc.identifier.otherEID(2-s2.0-85186082730)-
dc.identifier.urihttps://doi.org/10.1109/TCAD.2024.3368289-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/13572-
dc.description.abstractScan-based Design-for-testability (DfT) is the de facto standard in the semiconductor testing industry to guarantee the functional and structural correctness of chips. It provides improved observability and controllability, leading to enhanced fault coverage. However, owing to widespread usage, attackers devise techniques to misuse this method to steal secret keys embedded in a security-critical chip. A vast majority of off-the-shelf defense mechanisms are based on either randomizing the scan output or restricting access to the scan. However, none of these defense mechanisms leverage the fundamental properties of the scan attacken_US
dc.description.abstractthus, they tend to be complex and incur high area and computation overhead. In this paper, we propose a defense mechanism by preventing the vulnerabilities of fundamental properties from being exploited in scan attacks. The paper first pinpoints the ultimate condition of the scan attack on Advanced Encryption Standard (AES). This attack condition is inherent to the cryptographic property of the cipher, which, when violated, thwarts the attack. To implement our defense, we interchange the AES round outputs by applying pre-computed masks. The designer chooses inputs with a fixed difference to swap the outputs. A modified incorrect key is recovered instead of an actual key if a scan-based attack is launched. To show the generality of the proposed defense, it is extended to another AES-like cipher, Light Encryption Device (LED). To the best of our knowledge, this is the first defense against a scan attack wherein the complete testing process, including structural and functional tests, can be outsourced to untrusted third parties without compromising the actual key. In comparison, logic locking techniques limaye2020thwarting can outsource only structural testing to untrusted third parties. IEEEen_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systemsen_US
dc.subjectAESen_US
dc.subjectCiphersen_US
dc.subjectDefScanen_US
dc.subjectLight emitting diodesen_US
dc.subjectRegistersen_US
dc.subjectScan Attacken_US
dc.subjectScan Chainen_US
dc.subjectScan-based DfTen_US
dc.subjectStandardsen_US
dc.subjectSwitchesen_US
dc.subjectSymbolsen_US
dc.subjectTestabilityen_US
dc.subjectTestingen_US
dc.title<italic>DefScan</italic>: Provably Defeating Scan Attack on AES-Like Ciphersen_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: