A Dynamic-Key Based Secure Scan Architecture for Manufacturing and In-Field IC Testing
The design for testability (DFT) technology based on scan chains is widely used in industry to increase the testability of circuits. However, it also leads to a potential security problem that attackers can use scan chains as a backdoor to attack a system. Common methods to defend such attacks inclu...
Saved in:
| Published in | IEEE transactions on emerging topics in computing Vol. 10; no. 1; pp. 373 - 385 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
New York
IEEE
01.01.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects | |
| Online Access | Get full text |
| ISSN | 2168-6750 2168-6750 |
| DOI | 10.1109/TETC.2020.3021820 |
Cover
| Abstract | The design for testability (DFT) technology based on scan chains is widely used in industry to increase the testability of circuits. However, it also leads to a potential security problem that attackers can use scan chains as a backdoor to attack a system. Common methods to defend such attacks include disabling the scan chain after manufacturing test or employing some secret keys to encrypt/decrypt scan data or to verify the identities of users. The former would make in-field testing impossible and the latter would require storing keys in memory which might also undergo high risk of memory attacks. In this paper we propose a dynamic-key based secure scan architecture that works together with an intrinsic Physical Unclonable Function (PUF) of chips to defend both scan-based and memory attacks while facilitating both manufacturing and in-field testing. A system equipped with this secure architecture will shift out true circuit responses only when legal test patterns are shifted into the scan chains. Moreover, no test key will be stored in memory, hence no memory attacks are possible. We also leverage the PUF to distinct the legal test patterns for different manufactured chips so as to further protect chips. Analysis results show that our protection scheme can achieve a very high security level without sacrificing system performance, testability and diagnosability. |
|---|---|
| AbstractList | The design for testability (DFT) technology based on scan chains is widely used in industry to increase the testability of circuits. However, it also leads to a potential security problem that attackers can use scan chains as a backdoor to attack a system. Common methods to defend such attacks include disabling the scan chain after manufacturing test or employing some secret keys to encrypt/decrypt scan data or to verify the identities of users. The former would make in-field testing impossible and the latter would require storing keys in memory which might also undergo high risk of memory attacks. In this paper we propose a dynamic-key based secure scan architecture that works together with an intrinsic Physical Unclonable Function (PUF) of chips to defend both scan-based and memory attacks while facilitating both manufacturing and in-field testing. A system equipped with this secure architecture will shift out true circuit responses only when legal test patterns are shifted into the scan chains. Moreover, no test key will be stored in memory, hence no memory attacks are possible. We also leverage the PUF to distinct the legal test patterns for different manufactured chips so as to further protect chips. Analysis results show that our protection scheme can achieve a very high security level without sacrificing system performance, testability and diagnosability. |
| Author | Wu, Chia-Chi Lee, Kuen-Jong Liu, Ching-An |
| Author_xml | – sequence: 1 givenname: Kuen-Jong orcidid: 0000-0002-6690-0074 surname: Lee fullname: Lee, Kuen-Jong email: kjlee@mail.ncku.edu.tw organization: Department Electrical Engineering, National Cheng Kung University, Tainan, Taiwan – sequence: 2 givenname: Ching-An orcidid: 0000-0002-9416-1010 surname: Liu fullname: Liu, Ching-An email: jason19950319@gmail.com organization: Department Electrical Engineering, National Cheng Kung University, Tainan, Taiwan – sequence: 3 givenname: Chia-Chi orcidid: 0000-0001-7059-333X surname: Wu fullname: Wu, Chia-Chi email: steven12wu@gmail.com organization: Department Electrical Engineering, National Cheng Kung University, Tainan, Taiwan |
| BookMark | eNp9kE9PAjEQxRuDiYh8AOOliefF_lna7RFRlIjxAHptSjurJdDF7u6Bb283GGM8OJeZTt5vXvPOUS9UARC6pGREKVE3q_vVdMQIIyNOGC0YOUF9RkWRCTkmvV_zGRrW9YakKqhQQvbR2wTfHYLZeZs9wQHfmhocXoJtI-ClNQFPov3wDdim25RVxM8mtKXp3j68YxMcnods5mGbhileQd2k_QU6Lc22huF3H6DXWfrkY7Z4eZhPJ4vMMsWbjBaFGyvDISdjKXNXSmKcKBnnQE1pYV1YwcfEgpWOKZVEwjpqrHLrXDhm-ABdH-_uY_XZJm-9qdoYkqVmiZRU5EQlFT2qbKzqOkKp99HvTDxoSnSXoO4S1F2C-jvBxMg_jPWNaXwVmmj89l_y6kh6APhxUlTlnCv-BQOEfoM |
| CODEN | ITETBT |
| CitedBy_id | crossref_primary_10_1109_ACCESS_2022_3164712 crossref_primary_10_1109_TIFS_2023_3265815 crossref_primary_10_1109_ACCESS_2024_3505898 crossref_primary_10_1016_j_vlsi_2023_102067 crossref_primary_10_1109_TCSI_2024_3447080 crossref_primary_10_1109_TCAD_2024_3429071 crossref_primary_10_3390_cryptography9010006 |
| Cites_doi | 10.1109/VTS.2007.89 10.1109/TIFS.2016.2613847 10.1109/VTS.2006.7 10.1109/TCAD.2018.2818722 10.1109/TDSC.2007.70215 10.1109/TETC.2019.2903387 10.1145/2593069.2593204 10.1109/ISSCC.2018.8310218 10.1109/SP.2015.8 10.1109/IVSW.2018.8494852 10.1109/ARES.2013.52 10.1109/JPROC.2014.2320516 10.1109/ASQED.2009.5206245 10.1109/OLT.2004.1319691 10.1007/978-3-642-41395-7 10.1201/b10805 10.1109/CASES.2013.6662530 10.1109/TVLSI.2005.859470 10.1109/DATE.2012.6176618 10.1145/1506409.1506429 10.1109/PRDC.2013.47 10.1109/TCAD.2017.2772817 10.1109/TVLSI.2010.2089071 10.1109/TEST.2004.1386969 10.1109/ESSCIRC.2012.6341361 10.1109/ATS.2018.00020 10.1109/VTS.2009.20 10.1109/MSSC.2019.2923503 10.1016/j.diin.2016.01.009 10.1109/VTS.2016.7477293 10.1016/j.vlsi.2016.10.011 10.1109/ETS.2005.36 10.1137/060651380 10.1109/VLSI-SoC.2013.6673281 10.1109/TETC.2014.2304492 10.1145/2024723.2000086 10.1109/AsianHOST.2017.8353988 10.1109/HPCA.2017.10 10.1109/AsianHOST.2018.8607168 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| DOI | 10.1109/TETC.2020.3021820 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library (IEL) (UW System Shared) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2168-6750 |
| EndPage | 385 |
| ExternalDocumentID | 10_1109_TETC_2020_3021820 9194339 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Qualcomm Inc. – fundername: Ministry of Science and Technology, Taiwan grantid: 107-2218-E-006-025 funderid: 10.13039/501100004663 |
| GroupedDBID | 0R~ 4.4 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG ACGFS AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD IEDLZ IFIPE IPLJI JAVBF KQ8 M43 O9- OCL RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c293t-188d59a3e405774df70ad6f233e1afceb8c6350cec7d2990576cd1ac9db46d2a3 |
| IEDL.DBID | RIE |
| ISSN | 2168-6750 |
| IngestDate | Mon Jun 30 05:20:44 EDT 2025 Thu Apr 24 23:02:02 EDT 2025 Wed Oct 01 04:11:06 EDT 2025 Wed Aug 27 02:49:31 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c293t-188d59a3e405774df70ad6f233e1afceb8c6350cec7d2990576cd1ac9db46d2a3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-6690-0074 0000-0002-9416-1010 0000-0001-7059-333X |
| PQID | 2635716409 |
| PQPubID | 4437215 |
| PageCount | 13 |
| ParticipantIDs | crossref_primary_10_1109_TETC_2020_3021820 crossref_citationtrail_10_1109_TETC_2020_3021820 ieee_primary_9194339 proquest_journals_2635716409 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2022-Jan.-March-1 2022-1-1 20220101 |
| PublicationDateYYYYMMDD | 2022-01-01 |
| PublicationDate_xml | – month: 01 year: 2022 text: 2022-Jan.-March-1 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE transactions on emerging topics in computing |
| PublicationTitleAbbrev | TETC |
| PublicationYear | 2022 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref35 ref12 ref15 ref36 ref31 ref30 ref11 ref33 ref32 ref1 ref17 ref39 ref16 ref19 ref18 ref24 ref46 ref23 ref45 (ref14) 1993 ref26 ref25 ref47 ref20 ref42 ref41 ref22 ref44 ref21 ref43 Wang (ref34) 2006 ref28 ref27 Azriel (ref37) 2016 ref29 ref8 ref7 Skorobogatov (ref10) ref9 ref4 ref3 ref6 ref5 Tehranipoor (ref2) 2011 ref40 |
| References_xml | – ident: ref42 article-title: Physically unclonable function database – ident: ref17 doi: 10.1109/VTS.2007.89 – ident: ref22 doi: 10.1109/TIFS.2016.2613847 – ident: ref21 doi: 10.1109/VTS.2006.7 – ident: ref24 doi: 10.1109/TCAD.2018.2818722 – year: 1993 ident: ref14 article-title: Security locks for integrated circuits – volume-title: VLSI Test Principles And Architectures: Design for Testability year: 2006 ident: ref34 – ident: ref15 doi: 10.1109/TDSC.2007.70215 – start-page: 1 volume-title: Proc. Des. Secur. Cryptogr. Algorithms Devices ident: ref10 article-title: Fault attacks on secure chips: From glitch to flash – ident: ref18 doi: 10.1109/TETC.2019.2903387 – ident: ref12 doi: 10.1145/2593069.2593204 – ident: ref43 doi: 10.1109/ISSCC.2018.8310218 – ident: ref26 doi: 10.1109/SP.2015.8 – ident: ref25 doi: 10.1109/IVSW.2018.8494852 – ident: ref8 doi: 10.1109/ARES.2013.52 – ident: ref11 doi: 10.1109/JPROC.2014.2320516 – ident: ref4 doi: 10.1109/ASQED.2009.5206245 – ident: ref19 doi: 10.1109/OLT.2004.1319691 – ident: ref41 doi: 10.1007/978-3-642-41395-7 – ident: ref27 doi: 10.1201/b10805 – ident: ref29 doi: 10.1109/CASES.2013.6662530 – ident: ref31 doi: 10.1109/TVLSI.2005.859470 – ident: ref47 doi: 10.1109/DATE.2012.6176618 – ident: ref7 doi: 10.1145/1506409.1506429 – ident: ref20 doi: 10.1109/PRDC.2013.47 – ident: ref23 doi: 10.1109/TCAD.2017.2772817 – ident: ref16 doi: 10.1109/TVLSI.2010.2089071 – year: 2016 ident: ref37 article-title: Exploiting the scan side channel for reverse engineering of a VLSI device – ident: ref3 doi: 10.1109/TEST.2004.1386969 – ident: ref32 doi: 10.1109/ESSCIRC.2012.6341361 – ident: ref13 doi: 10.1109/ATS.2018.00020 – volume-title: Introduction to Hardware Security and Trust year: 2011 ident: ref2 – ident: ref45 doi: 10.1109/VTS.2009.20 – ident: ref33 article-title: Antifuse-based split-channel 1T-fuse bit cell for OTP NVM IP – ident: ref40 doi: 10.1109/MSSC.2019.2923503 – ident: ref5 doi: 10.1016/j.diin.2016.01.009 – ident: ref9 doi: 10.1109/VTS.2016.7477293 – ident: ref39 doi: 10.1016/j.vlsi.2016.10.011 – ident: ref35 doi: 10.1109/ETS.2005.36 – ident: ref30 doi: 10.1137/060651380 – ident: ref36 doi: 10.1109/VLSI-SoC.2013.6673281 – ident: ref1 doi: 10.1109/TETC.2014.2304492 – ident: ref28 doi: 10.1145/2024723.2000086 – ident: ref44 doi: 10.1109/AsianHOST.2017.8353988 – ident: ref6 doi: 10.1109/HPCA.2017.10 – ident: ref46 doi: 10.1109/AsianHOST.2018.8607168 |
| SSID | ssj0000816967 |
| Score | 2.3107202 |
| Snippet | The design for testability (DFT) technology based on scan chains is widely used in industry to increase the testability of circuits. However, it also leads to... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 373 |
| SubjectTerms | Chains Computer architecture Discrete Fourier transforms dynamic key generation Field study Generators Hardware security Integrated circuits Manufacturing memory attack physical unclonable function (PUF) Random access memory scan design secure scan architecture Security side-channel attack Testability Testing |
| Title | A Dynamic-Key Based Secure Scan Architecture for Manufacturing and In-Field IC Testing |
| URI | https://ieeexplore.ieee.org/document/9194339 https://www.proquest.com/docview/2635716409 |
| Volume | 10 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2168-6750 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000816967 issn: 2168-6750 databaseCode: KQ8 dateStart: 20130101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVIEE databaseName: IEEE/IET Electronic Library (IEL) (UW System Shared) customDbUrl: eissn: 2168-6750 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000816967 issn: 2168-6750 databaseCode: RIE dateStart: 20130101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED61TDDwRpSXPDAh0iZ24thjKVQtqCwUxBYl9pkBlCJoB_j12E5a8RJiy2BL1p2du-8e3wEca4rS2lmLTQRnQUxTEwgas4BzWRSJVJz6YTCjaz64jS_vk_sGnC56YRDRF59h2336XL6eqJkLlXWkRdyMySY0U8GrXq1FPMUNkJA8rROXUSg744txzwJAanFpxVP-xfT4WSo_fsDeqvTXYDQ_T1VM8tieTYu2ev9G1fjfA6_Dau1ekm51HzaggeUmrHwiHdyCuy45r8bQB1f4Rs6sGdPEh92R3FhBk-6n3AKxPi0Z5eXMNUD4jkaSl5oMy6DvSt_IsEfGjqejfNiG274VxSCopysEypr4aRAJoROZM3QuWxprk4a55oYyhlFuFBZCWWckVKhS7WyWBSZKR7mSuoi5pjnbgaVyUuIukFxTrpkKhUkwpoYJY0RiZKxQI7IoakE4F3ymaupxNwHjKfMQJJSZ01XmdJXVumrByWLLc8W78dfiLSf7xcJa7C04mGs3q1_ma-bIdxxGDOXe77v2YZm6FgcfZjmApenLDA-t4zEtjvyN-wBdVdQF |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED7xGICBN6I8PTAhUhLbceKxPKoWKAsFsUWJfWYApQjaAX49tpNWvITYMtiSdWfn7rvHdwAHmqK0dtZik1SwgNPEBCnlLBBCFkUslaB-GEzvWnRu-cV9fD8FR5NeGET0xWfYdJ8-l68HauRCZcfSIm7G5DTMxpzzuOrWmkRU3AgJKZI6dRmF8rh_3j-1EJBaZFoxlX8xPn6ayo9fsLcr7SXojU9UlZM8NkfDoqnev5E1_vfIy7BYO5ikVd2IFZjCchUWPtEOrsFdi5xVg-iDS3wjJ9aQaeID70hurKhJ61N2gVivlvTycuRaIHxPI8lLTbpl0HbFb6R7SvqOqaN8WIfbthVFJ6jnKwTKGvlhEKWpjmXO0DltCdcmCXMtDGUMo9woLFJl3ZFQoUq0s1oWmigd5UrqggtNc7YBM-WgxE0guaZCMxWmJkZODUuNSWMjuUKNyKKoAeFY8JmqycfdDIynzIOQUGZOV5nTVVbrqgGHky3PFfPGX4vXnOwnC2uxN2BnrN2sfpuvmaPfcSgxlFu_79qHuU6_d5Vdda8vt2GeuoYHH3TZgZnhywh3rRsyLPb87fsAoCHXUg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Dynamic-Key+Based+Secure+Scan+Architecture+for+Manufacturing+and+In-Field+IC+Testing&rft.jtitle=IEEE+transactions+on+emerging+topics+in+computing&rft.au=Lee%2C+Kuen-Jong&rft.au=Ching-An%2C+Liu&rft.au=Wu%2C+Chia-Chi&rft.date=2022-01-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.eissn=2168-6750&rft.volume=10&rft.issue=1&rft.spage=373&rft_id=info:doi/10.1109%2FTETC.2020.3021820&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2168-6750&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2168-6750&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2168-6750&client=summon |