The document analyzes hardware security concerning scan-based attacks on cryptographic devices, highlighting potential vulnerabilities such as side-channel analysis and fault injection. It categorizes various attack methodologies and examines countermeasures, which can be employed during both front-end and back-end design stages. The paper mainly focuses on ensuring the integrity of cryptographic operations amidst growing threats posed by adversaries exploiting test infrastructures.