{"id":"https://openalex.org/W2978732915","doi":"https://doi.org/10.1109/iolts.2019.8854411","title":"Securing Scan through Plain-text Restriction","display_name":"Securing Scan through Plain-text Restriction","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W2978732915","doi":"https://doi.org/10.1109/iolts.2019.8854411","mag":"2978732915"},"language":"en","primary_location":{"id":"doi:10.1109/iolts.2019.8854411","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iolts.2019.8854411","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078604240","display_name":"Satyadev Ahlawat","orcid":"https://orcid.org/0000-0003-0186-1446"},"institutions":[{"id":"https://openalex.org/I162827531","display_name":"Indian Institute of Technology Bombay","ror":"https://ror.org/02qyf5152","country_code":"IN","type":"education","lineage":["https://openalex.org/I162827531"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Satyadev Ahlawat","raw_affiliation_strings":["Computer Architecture and Dependable Systems Laboratory, Indian Institute of Technology Bombay, India"],"affiliations":[{"raw_affiliation_string":"Computer Architecture and Dependable Systems Laboratory, Indian Institute of Technology Bombay, India","institution_ids":["https://openalex.org/I162827531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070127929","display_name":"Kailash Ahirwar","orcid":null},"institutions":[{"id":"https://openalex.org/I162827531","display_name":"Indian Institute of Technology Bombay","ror":"https://ror.org/02qyf5152","country_code":"IN","type":"education","lineage":["https://openalex.org/I162827531"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kailash Ahirwar","raw_affiliation_strings":["Computer Architecture and Dependable Systems Laboratory, Indian Institute of Technology Bombay, India"],"affiliations":[{"raw_affiliation_string":"Computer Architecture and Dependable Systems Laboratory, Indian Institute of Technology Bombay, India","institution_ids":["https://openalex.org/I162827531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018584319","display_name":"Jaynarayan Tudu","orcid":"https://orcid.org/0000-0002-0329-3190"},"institutions":[{"id":"https://openalex.org/I4210109292","display_name":"Indian Institute of Technology Tirupati","ror":"https://ror.org/01xtkxh20","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210109292"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Jaynarayan Tudu","raw_affiliation_strings":["Dept. of Computer Science Engineering, Indian Institute of Technology Tirupati, India"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science Engineering, Indian Institute of Technology Tirupati, India","institution_ids":["https://openalex.org/I4210109292"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027837299","display_name":"Masahiro Fujita","orcid":"https://orcid.org/0000-0002-6516-4175"},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Masahiro Fujita","raw_affiliation_strings":["VLSI Design and Education Centre, The University of Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"VLSI Design and Education Centre, The University of Tokyo, Japan","institution_ids":["https://openalex.org/I74801974"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073587430","display_name":"Virendra Singh","orcid":"https://orcid.org/0000-0002-7035-7844"},"institutions":[{"id":"https://openalex.org/I162827531","display_name":"Indian Institute of Technology Bombay","ror":"https://ror.org/02qyf5152","country_code":"IN","type":"education","lineage":["https://openalex.org/I162827531"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Virendra Singh","raw_affiliation_strings":["Computer Architecture and Dependable Systems Laboratory, Indian Institute of Technology Bombay, India"],"affiliations":[{"raw_affiliation_string":"Computer Architecture and Dependable Systems Laboratory, Indian Institute of Technology Bombay, India","institution_ids":["https://openalex.org/I162827531"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5078604240"],"corresponding_institution_ids":["https://openalex.org/I162827531"],"apc_list":null,"apc_paid":null,"fwci":0.984,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.74738587,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"251","last_page":"252"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11032","display_name":"VLSI and Analog Circuit Testing","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.8871150016784668},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7219013571739197},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.670324444770813},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.6437878012657166},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.640363335609436},{"id":"https://openalex.org/keywords/plain-text","display_name":"Plain text","score":0.6064215302467346},{"id":"https://openalex.org/keywords/chip","display_name":"Chip","score":0.579402506351471},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4845487177371979},{"id":"https://openalex.org/keywords/system-on-a-chip","display_name":"System on a chip","score":0.48191407322883606},{"id":"https://openalex.org/keywords/scan-chain","display_name":"Scan chain","score":0.4482444226741791},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.40540415048599243},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3361625075340271},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29757940769195557},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08126866817474365},{"id":"https://openalex.org/keywords/integrated-circuit","display_name":"Integrated circuit","score":0.07795029878616333},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06285005807876587}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8871150016784668},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7219013571739197},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.670324444770813},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.6437878012657166},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.640363335609436},{"id":"https://openalex.org/C46503548","wikidata":"https://www.wikidata.org/wiki/Q1145976","display_name":"Plain text","level":3,"score":0.6064215302467346},{"id":"https://openalex.org/C165005293","wikidata":"https://www.wikidata.org/wiki/Q1074500","display_name":"Chip","level":2,"score":0.579402506351471},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4845487177371979},{"id":"https://openalex.org/C118021083","wikidata":"https://www.wikidata.org/wiki/Q610398","display_name":"System on a chip","level":2,"score":0.48191407322883606},{"id":"https://openalex.org/C150012182","wikidata":"https://www.wikidata.org/wiki/Q225990","display_name":"Scan chain","level":3,"score":0.4482444226741791},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.40540415048599243},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3361625075340271},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29757940769195557},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08126866817474365},{"id":"https://openalex.org/C530198007","wikidata":"https://www.wikidata.org/wiki/Q80831","display_name":"Integrated circuit","level":2,"score":0.07795029878616333},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06285005807876587},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iolts.2019.8854411","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iolts.2019.8854411","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS)","raw_type":"proceedings-article"},{"id":"pmh:oai:dsapce.library.iitb.ac.in:100/27841","is_oa":false,"landing_page_url":"http://dspace.library.iitb.ac.in/xmlui/handle/100/27841","pdf_url":null,"source":{"id":"https://openalex.org/S4306400899","display_name":"DSpace (IIT Bombay)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I162827531","host_organization_name":"Indian Institute of Technology Bombay","host_organization_lineage":["https://openalex.org/I162827531"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6499999761581421}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W1982643606","https://openalex.org/W2734491096"],"related_works":["https://openalex.org/W2130364905","https://openalex.org/W4386374027","https://openalex.org/W2787358728","https://openalex.org/W1548096828","https://openalex.org/W2151102355","https://openalex.org/W2513553310","https://openalex.org/W2094057173","https://openalex.org/W2950564519","https://openalex.org/W79379040","https://openalex.org/W1626471040"],"abstract_inverted_index":{"Scan":[0],"design-for-test":[1],"(DfT)":[2],"feature":[3,33,92],"can":[4],"be":[5,45,97],"exploited":[6],"as":[7],"a":[8,13,37,57,100],"side":[9],"channel":[10],"to":[11,39,44,62,99,129],"break":[12],"cryptographic":[14,40,71],"chip.":[15,72],"The":[16,73,124],"stringent":[17],"test":[18,108,138],"and":[19,131],"diagnosis":[20],"requirements":[21],"of":[22,29,111,118],"present-day":[23],"complex":[24],"system-on-chip":[25],"(SoC)":[26],"make":[27],"use":[28,89],"the":[30,48,77,85,90,93,107],"scan":[31,64,91,122],"DfT":[32],"unavoidable.":[34],"However,":[35],"being":[36],"threat":[38],"chips,":[41],"it":[42],"needs":[43],"secured":[46],"against":[47],"scan-based":[49],"side-channel":[50],"attacks.":[51],"In":[52],"this":[53,112],"paper,":[54],"we":[55],"propose":[56],"simple":[58,128],"yet":[59],"effective":[60],"technique":[61,75,126],"prevent":[63],"attack":[65],"on":[66,137],"Advanced":[67],"Encryption":[68],"Standard":[69],"(AES)":[70],"proposed":[74,125],"restricts":[76],"user":[78],"from":[79],"applying":[80],"any":[81,120,135],"random":[82],"inputs":[83,95],"at":[84],"plain-text":[86,94],"inputs.":[87],"To":[88],"must":[96],"forced":[98],"constant":[101],"all-0":[102],"or":[103],"all-1":[104],"value":[105],"throughout":[106],"session.":[109],"Because":[110],"feature,":[113],"there":[114],"is":[115,127],"no":[116],"possibility":[117],"mounting":[119],"differential":[121],"attack.":[123],"implement":[130],"does":[132],"not":[133],"have":[134],"impact":[136],"coverage.":[139]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
