{"id":"https://openalex.org/W1982643606","doi":"https://doi.org/10.1109/vts.2012.6231061","title":"Are advanced DfT structures sufficient for preventing scan-attacks?","display_name":"Are advanced DfT structures sufficient for preventing scan-attacks?","publication_year":2012,"publication_date":"2012-04-01","ids":{"openalex":"https://openalex.org/W1982643606","doi":"https://doi.org/10.1109/vts.2012.6231061","mag":"1982643606"},"language":"en","primary_location":{"id":"doi:10.1109/vts.2012.6231061","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vts.2012.6231061","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE 30th VLSI Test Symposium (VTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017715153","display_name":"Jean Da Rolt","orcid":null},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210101743","display_name":"Laboratoire d'Informatique, de Robotique et de Micro\u00e9lectronique de Montpellier","ror":"https://ror.org/013yean28","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I151295451","https://openalex.org/I19894307","https://openalex.org/I4210101743","https://openalex.org/I4210159245","https://openalex.org/I4412460525"]},{"id":"https://openalex.org/I19894307","display_name":"Universit\u00e9 de Montpellier","ror":"https://ror.org/051escj72","country_code":"FR","type":"education","lineage":["https://openalex.org/I19894307"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Jean Da Rolt","raw_affiliation_strings":["LIRMM, Universit\u00e9 Montpellier II /CNRS UMR, Montpellier, France","LIRMM (Universit\u00e9 Montpellier II / CNRS UMR 5506), France"],"affiliations":[{"raw_affiliation_string":"LIRMM, Universit\u00e9 Montpellier II /CNRS UMR, Montpellier, France","institution_ids":["https://openalex.org/I19894307","https://openalex.org/I4210101743","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"LIRMM (Universit\u00e9 Montpellier II / CNRS UMR 5506), France","institution_ids":["https://openalex.org/I19894307","https://openalex.org/I1294671590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078888989","display_name":"Giorgio Di Natale","orcid":"https://orcid.org/0000-0001-8063-5388"},"institutions":[{"id":"https://openalex.org/I4210101743","display_name":"Laboratoire d'Informatique, de Robotique et de Micro\u00e9lectronique de Montpellier","ror":"https://ror.org/013yean28","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I151295451","https://openalex.org/I19894307","https://openalex.org/I4210101743","https://openalex.org/I4210159245","https://openalex.org/I4412460525"]},{"id":"https://openalex.org/I19894307","display_name":"Universit\u00e9 de Montpellier","ror":"https://ror.org/051escj72","country_code":"FR","type":"education","lineage":["https://openalex.org/I19894307"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Giorgio Di Natale","raw_affiliation_strings":["LIRMM, Universit\u00e9 Montpellier II /CNRS UMR, Montpellier, France","LIRMM (Universit\u00e9 Montpellier II / CNRS UMR 5506), France"],"affiliations":[{"raw_affiliation_string":"LIRMM, Universit\u00e9 Montpellier II /CNRS UMR, Montpellier, France","institution_ids":["https://openalex.org/I19894307","https://openalex.org/I4210101743","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"LIRMM (Universit\u00e9 Montpellier II / CNRS UMR 5506), France","institution_ids":["https://openalex.org/I19894307","https://openalex.org/I1294671590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081237741","display_name":"Marie-Lise Flottes","orcid":"https://orcid.org/0000-0002-7231-3976"},"institutions":[{"id":"https://openalex.org/I4210101743","display_name":"Laboratoire d'Informatique, de Robotique et de Micro\u00e9lectronique de Montpellier","ror":"https://ror.org/013yean28","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I151295451","https://openalex.org/I19894307","https://openalex.org/I4210101743","https://openalex.org/I4210159245","https://openalex.org/I4412460525"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I19894307","display_name":"Universit\u00e9 de Montpellier","ror":"https://ror.org/051escj72","country_code":"FR","type":"education","lineage":["https://openalex.org/I19894307"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Marie-Lise Flottes","raw_affiliation_strings":["LIRMM, Universit\u00e9 Montpellier II /CNRS UMR, Montpellier, France","LIRMM (Universit\u00e9 Montpellier II / CNRS UMR 5506), France"],"affiliations":[{"raw_affiliation_string":"LIRMM, Universit\u00e9 Montpellier II /CNRS UMR, Montpellier, France","institution_ids":["https://openalex.org/I19894307","https://openalex.org/I4210101743","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"LIRMM (Universit\u00e9 Montpellier II / CNRS UMR 5506), France","institution_ids":["https://openalex.org/I19894307","https://openalex.org/I1294671590"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035518436","display_name":"Bruno Rouzeyre","orcid":null},"institutions":[{"id":"https://openalex.org/I19894307","display_name":"Universit\u00e9 de Montpellier","ror":"https://ror.org/051escj72","country_code":"FR","type":"education","lineage":["https://openalex.org/I19894307"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210101743","display_name":"Laboratoire d'Informatique, de Robotique et de Micro\u00e9lectronique de Montpellier","ror":"https://ror.org/013yean28","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I151295451","https://openalex.org/I19894307","https://openalex.org/I4210101743","https://openalex.org/I4210159245","https://openalex.org/I4412460525"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Bruno Rouzeyre","raw_affiliation_strings":["LIRMM, Universit\u00e9 Montpellier II /CNRS UMR, Montpellier, France","LIRMM (Universit\u00e9 Montpellier II / CNRS UMR 5506), France"],"affiliations":[{"raw_affiliation_string":"LIRMM, Universit\u00e9 Montpellier II /CNRS UMR, Montpellier, France","institution_ids":["https://openalex.org/I19894307","https://openalex.org/I4210101743","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"LIRMM (Universit\u00e9 Montpellier II / CNRS UMR 5506), France","institution_ids":["https://openalex.org/I19894307","https://openalex.org/I1294671590"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5017715153"],"corresponding_institution_ids":["https://openalex.org/I1294671590","https://openalex.org/I19894307","https://openalex.org/I4210101743"],"apc_list":null,"apc_paid":null,"fwci":4.9771,"has_fulltext":false,"cited_by_count":70,"citation_normalized_percentile":{"value":0.95296671,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"246","last_page":"251"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11032","display_name":"VLSI and Analog Circuit Testing","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6910856366157532},{"id":"https://openalex.org/keywords/design-for-testing","display_name":"Design for testing","score":0.6330452561378479},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.6094140410423279},{"id":"https://openalex.org/keywords/scan-chain","display_name":"Scan chain","score":0.5678167939186096},{"id":"https://openalex.org/keywords/testability","display_name":"Testability","score":0.5450026392936707},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.532497763633728},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5164987444877625},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5043405294418335},{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.4974961578845978},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4848667085170746},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4290885031223297},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3722631633281708},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.34384334087371826},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.25592073798179626},{"id":"https://openalex.org/keywords/integrated-circuit","display_name":"Integrated circuit","score":0.19850823283195496},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1579967737197876}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6910856366157532},{"id":"https://openalex.org/C190874656","wikidata":"https://www.wikidata.org/wiki/Q5264347","display_name":"Design for testing","level":3,"score":0.6330452561378479},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.6094140410423279},{"id":"https://openalex.org/C150012182","wikidata":"https://www.wikidata.org/wiki/Q225990","display_name":"Scan chain","level":3,"score":0.5678167939186096},{"id":"https://openalex.org/C51234621","wikidata":"https://www.wikidata.org/wiki/Q2149495","display_name":"Testability","level":2,"score":0.5450026392936707},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.532497763633728},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5164987444877625},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5043405294418335},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.4974961578845978},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4848667085170746},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4290885031223297},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3722631633281708},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.34384334087371826},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.25592073798179626},{"id":"https://openalex.org/C530198007","wikidata":"https://www.wikidata.org/wiki/Q80831","display_name":"Integrated circuit","level":2,"score":0.19850823283195496},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1579967737197876},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/vts.2012.6231061","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vts.2012.6231061","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE 30th VLSI Test Symposium (VTS)","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:lirmm-00694536v1","is_oa":false,"landing_page_url":"https://hal-lirmm.ccsd.cnrs.fr/lirmm-00694536","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.tttc-vts.org/public_html/new/2012/index.php","raw_type":"Conference papers"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6499999761581421,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2030873248","https://openalex.org/W2130468378","https://openalex.org/W2139009001","https://openalex.org/W2139291494","https://openalex.org/W2141624968","https://openalex.org/W2142537526","https://openalex.org/W2149494050","https://openalex.org/W2155450755","https://openalex.org/W2162765851","https://openalex.org/W6679267926","https://openalex.org/W6681931124"],"related_works":["https://openalex.org/W2107525390","https://openalex.org/W2169611555","https://openalex.org/W2157191248","https://openalex.org/W2765347974","https://openalex.org/W2553035740","https://openalex.org/W2150046587","https://openalex.org/W2164493372","https://openalex.org/W2114980936","https://openalex.org/W1594445436","https://openalex.org/W2146689260"],"abstract_inverted_index":{"Standard":[0],"Design":[1],"for":[2,31,37,156],"Testability":[3],"(DfT)":[4],"structures":[5],"are":[6,54,133],"well":[7],"known":[8],"as":[9,73,105],"potential":[10],"sources":[11],"of":[12,91,120,149],"confidential":[13],"information":[14,47,93],"leakage.":[15],"Scan-based":[16],"attacks":[17],"have":[18,63],"been":[19,29],"reported":[20],"in":[21,111],"publications":[22],"since":[23],"the":[24,34,92,150],"early":[25],"2000s.":[26],"It":[27],"has":[28],"shown":[30],"instance":[32],"that":[33,116,129],"secret":[35],"key":[36],"symmetric":[38],"encryption":[39],"standards":[40],"(DES,":[41],"AES)":[42],"could":[43],"be":[44],"retrieved":[45],"from":[46],"gathered":[48],"on":[49,95],"scan-out":[50],"pins":[51],"when":[52],"scan-chains":[53],"fully":[55],"observed":[56,155],"through":[57],"these":[58,87],"pins.":[59],"However":[60],"DfT":[61,117],"practices":[62],"progressed":[64],"to":[65,67,142],"adapt":[66],"large":[68],"and":[69,128],"complex":[70],"designs":[71,145],"such":[72],"test":[74,157],"response":[75],"compaction,":[76],"associated":[77],"X-masking":[78],"structure,":[79],"partial":[80],"scan,":[81],"etc.":[82],"As":[83],"a":[84,138],"side":[85],"effect,":[86],"techniques":[88],"mask":[89],"part":[90,148],"collected":[94],"scan":[96],"outputs.":[97],"Thus,":[98],"at":[99],"first":[100],"glance,":[101],"they":[102],"may":[103],"appear":[104],"countermeasures":[106,132],"against":[107],"scan-based":[108],"attacks.":[109],"Nevertheless,":[110],"this":[112],"paper":[113],"we":[114],"show":[115],"structures,":[118],"regardless":[119],"their":[121],"nature,":[122],"do":[123],"not":[124],"inherently":[125],"enhance":[126],"security":[127],"specific":[130],"additional":[131],"still":[134],"needed.":[135],"We":[136],"propose":[137],"new-scan":[139],"attack":[140],"able":[141],"deal":[143],"with":[144],"where":[146],"only":[147],"internal":[151],"circuit's":[152],"state":[153],"is":[154],"purpose.":[158]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":10},{"year":2017,"cited_by_count":11},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
