Comparison of Scan Chain Protection Techniques
Beschreibung
Manufacturing large ICs with ever-shrinking features requires exhaustive chip testing. Scan chains enable test facilities to evaluate the chip's circuits individually, using sophisticated test patterns. As they provide in-depth access to the chip for debugging and testing, they become a powerful tool in an adversary's hands. Among other threats, scan chain access is a key requirement for most oracle-guided attacks against anti-reverse engineering (anti-RE) protection schemes. Therefore, scan chains must be secured against unauthorized access to prevent adversaries from circumventing anti-RE protection.
This work aims to explore and compare state-of-the-art scan chain protection mechanisms. To narrow the scope, the focus is on protecting anti-RE schemes.
References:
[1] H. M. Kamali, K. Z. Azar, F. Farahmandi, and M. Tehranipoor, “Advances in Logic Locking: Past, Present, and Prospects.” Cryptology ePrint Archive, Paper 2022/260, Mar. 2022. [Online]. Available: https://eprint.iacr.org/2022/260/20220302:140658
Kontakt
Betreuer:
Multi-Party Threshold Cryptography Project
Beschreibung
The National Institute of Standards and Technology (NIST) is about to start a project for evaluation of of advanced cryptographic techniques based on secure multi-party computation (MPC) to construct threshold schemes [1]. The main principle is that a secret key is split into n parties and remains uncompromised even if several, i.e. up to f out of n, parties are corrupted. Such thresholding techniques can be applied to e.g. encryption or signature schemes.
The goal of this work is to provide an overview of the NIST project by working out what kind of categories exist, and what sort of schemes have been submitted as previews to the project.
References:
- [1] https://csrc.nist.gov/Projects/threshold-cryptography
Kontakt
Request topic: Patrick Karl
Betreuer:
Polynomial Masking to Protect Against Combined Attacks
Beschreibung
Recently, research studying attacks combining fault injection with side-channel analysis has gained traction. One proposed countermeasure is the usage of polynomial masking instead of the widely used Boolean masking. Recent work has made strides in increasing the efficiency of polynomial masking [1].
The goal of this work is to explore polynomial masking and its computational and randomness overheads.
[1] Andresen, J., Arnold, P., Berndt, S., Eisenbarth, T., Faust, S., Gourjon, M., Landthaler, E., Micheli, E., Orlt, M., Pauls, P., Wirschem, K., & Zhao, L. (2026). UP TO 50% OFF: Efficient Implementation of Polynomial Masking. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2026(1), 688-731. https://doi.org/10.46586/tches.v2026.i1.688-731
Kontakt
Betreuer:
Attack Detection Leveraging Hardware Performance Counters (HPCs)
Beschreibung
With the growing complexity of embedded systems, traditional software-based attack detection approaches face challenges in terms of latency, visibility, and resilience against low-level attacks. Hardware-assisted monitoring, such as using Hardware Performance Counters (HPCs), offers a promising complement. These sources can reveal subtle anomalies and attack traces at the microarchitectural or physical level.
However, the diversity of proposed detection mechanisms (machine-learning-based, threshold-based, hybrid firmware-hardware schemes, etc.) and the wide range of targeted attack types (e.g., side-channel, control-flow hijack, fault injection, denial-of-service) make it difficult to systematically compare and evaluate these techniques. A structured analysis of this research landscape is therefore essential.
The aim of this work is a:
- literature review of hardware-assisted attack detection mechanisms,
- with a focus on the HPCs,
- analysing the detection methodologies,
- and summarizing the key findings.
References:
[1] Foreman, James Christopher. "A survey of cyber security countermeasures using hardware performance counters." arXiv preprint arXiv:1807.10868 (2018).
[2] C. Li and J. -L. Gaudiot, "Detecting Malicious Attacks Exploiting Hardware Vulnerabilities Using Performance Counters," 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), Milwaukee, WI, USA, 2019, pp. 588-597, doi: 10.1109/COMPSAC.2019.00090.
Kontakt
Betreuer:
Post-Quantum Signatures from VOLE-in-the-Head
Beschreibung
VOLE-in-the-Head [1] is a relatively new zero-knowledge proof technique that is built upon the MPC-in-the-Head concept. Using this technique, post-quantum secure signatures can be obtained. In the recently started on-ramp signature call by NIST, FAEST [2] is one candidate that uses the VOLE-in-the-Head concept.
In this work, the student should get an overview of the VOLE-in-the-Head framework and explain it's basic concepts and how the signature scheme FAEST is constructed from it.
References:
- [1] https://link.springer.com/chapter/10.1007/978-3-031-38554-4_19
- [2] https://faest.info/resources.html
Kontakt
Request topic: Patrick Karl