Encryption Techniques for Test Infrastructures - Archive ouverte HAL Access content directly
Conference Poster Year :

Encryption Techniques for Test Infrastructures

(1) , (1) , (2) , (1)


Test infrastructures are widely deployed in modern Systems-on-Chip (SoC). They allow the tester to control and observe the internal state of the SoC. However, a malicious user can exploit these infrastructures in order to extract secret information stored inside the SoC. In this paper, we review and compare security countermeasures based on the encryption of test data. The present techniques ensure the confidentiality of the exchanged messages between the circuit and the tester. Moreover, they provide lightweight user authentication in order to prevent malicious users from accessing the test infrastructure.
Fichier principal
Vignette du fichier
Stream_block_comparison.pdf (83.21 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

lirmm-02306922 , version 1 (07-10-2019)


  • HAL Id : lirmm-02306922 , version 1


Emanuele Valea, Marie-Lise Flottes, Giorgio Di Natale, Bruno Rouzeyre. Encryption Techniques for Test Infrastructures. 13ème Colloque National Du GDR SoC², Jun 2019, Montpellier, France. . ⟨lirmm-02306922⟩
65 View
89 Download


Gmail Facebook Twitter LinkedIn More