@ARTICLE{Deepak_V.A._Design_2019, author={Deepak, V.A. and Priyatharishini, M. and Nirmala Devi, M.}, volume={vol. 65}, number={No 3}, journal={International Journal of Electronics and Telecommunications}, pages={389-396}, howpublished={online}, year={2019}, publisher={Polish Academy of Sciences Committee of Electronics and Telecommunications}, abstract={Due to increase in threats posed by offshore foundries, the companies outsourcing IPs are forced to protect their designs from the threats posed by the foundries. Few of the threats are IP piracy, counterfeiting and reverse engineering. To overcome these, logic encryption has been observed to be a leading countermeasure against the threats faced. It introduces extra gates in the design, known as key gates which hide the functionality of the design unless correct keys are fed to them. The scan tests are used by various designs to observe the fault coverage. These scan chains can become vulnerable to sidechannel attacks. The potential solution for protection of this vulnerability is obfuscation of the scan output of the scan chain. This involves shuffling the working of the cells in the scan chain when incorrect test key is fed. In this paper, we propose a method to overcome the threats posed to scan design as well as the logic circuit. The efficiency of the secured design is verified on ISCAS’89 circuits and the results prove the security of the proposed method against the threats posed.}, type={Artykuły / Articles}, title={Design Protection Using Logic Encryption and Scan-Chain Obfuscation Techniques}, URL={http://so.czasopisma.pan.pl/Content/113294/PDF/52_6.09.pdf}, doi={10.24425/ijet.2019.129790}, keywords={Hardware Security, Obfuscation, Logic Encryption, Scan-Chain}, }