首页--工业技术论文--无线电电子学、电信技术论文--微电子学、集成电路(IC)论文--一般性问题论文--测试和检验论文

抗扫描旁路攻击的安全扫描链设计研究

摘要第4-6页
Abstract第6-7页
Acknowledgement第8-11页
Nomenclature第11-15页
Chapter 1 Introduction第15-22页
    1.1 Background第15-16页
        1.1.1 Circuit testing第15页
        1.1.2 Scan-based design-for-testability technique第15-16页
        1.1.3 Security risk of scan chain design第16页
    1.2 Scan-based side-channel attack第16-20页
    1.3 Secure scan designs against scan-based attacks第20页
    1.4 Motivations and objectives第20-21页
    1.5 Organization of the dissertation第21-22页
Chapter 2 Literature Review第22-32页
    2.1 Scan-based attack第22-27页
        2.1.1 Mode-switching attack第22-23页
        2.1.2 An example attack against AES第23-26页
        2.1.3 Scan signature attack第26-27页
        2.1.4 Test-mode-only attack第27页
    2.2 Countermeasures against scan-based attacks第27-31页
        2.2.1 Inherent countermeasures第28页
        2.2.2 Protocol-based techniques第28-31页
    2.3 Summary第31-32页
Chapter 3 Security Analysis of Scan Designs Based on Scrambling Chains第32-44页
    3.1 Scan-based attacks and testing order第32-36页
        3.1.1 Scan-based attacks, scan chain order and obfuscation第32-33页
        3.1.2 An illustrative example第33-35页
        3.1.3 Signature attack and scan chain order第35-36页
    3.2 Countermeasures based on obfuscating scan order第36-40页
        3.2.1 Lock & Key technique第36-38页
        3.2.2 Dynamically configurable connection technique第38-40页
    3.3 An Attack against the random order design scheme第40-43页
        3.3.1 Overview of the proposed attack第40-41页
        3.3.2 Identify the length of sub chain第41-43页
    3.4 Summary第43-44页
Chapter 4 Secure Scan Designs Against Scan-Based Attacks第44-56页
    4.1 Secure scan design based on blocking secret key第44-47页
        4.1.1 Blocking key design第44-45页
        4.1.2 Working scheme第45-46页
        4.1.3 Analysis第46-47页
    4.2 Secure scan design based on obfuscating scan out第47-53页
        4.2.1 Obfuscating scan out第47-49页
        4.2.2 Implementation第49-50页
        4.2.3 Working scheme第50-52页
        4.2.4 Analysis第52-53页
    4.3 Experimental results第53-54页
    4.4 Summary第54-56页
Chapter 5 An Improved Secure Scan Design第56-63页
    5.1 Proposed attack scenario第56-60页
        5.1.1 Pre-analysis of obfuscating scan out design scheme第56-57页
        5.1.2 Attack procedure第57-60页
        5.1.3 Performance analysis第60页
    5.2 Improved secure scan design第60-62页
        5.2.1 The working scheme第60-61页
        5.2.2 Analysis第61-62页
    5.3 Summary第62-63页
Chapter 6 Conclusion第63-65页
References第65-70页
Author’s Publications第70-71页

论文共71页,点击 下载论文
上一篇:社会工作介入高中生家庭亲子冲突的个案研究
下一篇:社会工作介入残障人士就业技能提升的过程研究