A Dynamic-Key Based Secure Scan Architecture for Manufacturing and In-Field IC Testing

The design for testability (DFT) technology based on scan chains is widely used in industry to increase the testability of circuits. However, it also leads to a potential security problem that attackers can use scan chains as a backdoor to attack a system. Common methods to defend such attacks inclu...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on emerging topics in computing Vol. 10; no. 1; pp. 373 - 385
Main Authors Lee, Kuen-Jong, Liu, Ching-An, Wu, Chia-Chi
Format Journal Article
LanguageEnglish
Published New York IEEE 01.01.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN2168-6750
2168-6750
DOI10.1109/TETC.2020.3021820

Cover

Abstract The design for testability (DFT) technology based on scan chains is widely used in industry to increase the testability of circuits. However, it also leads to a potential security problem that attackers can use scan chains as a backdoor to attack a system. Common methods to defend such attacks include disabling the scan chain after manufacturing test or employing some secret keys to encrypt/decrypt scan data or to verify the identities of users. The former would make in-field testing impossible and the latter would require storing keys in memory which might also undergo high risk of memory attacks. In this paper we propose a dynamic-key based secure scan architecture that works together with an intrinsic Physical Unclonable Function (PUF) of chips to defend both scan-based and memory attacks while facilitating both manufacturing and in-field testing. A system equipped with this secure architecture will shift out true circuit responses only when legal test patterns are shifted into the scan chains. Moreover, no test key will be stored in memory, hence no memory attacks are possible. We also leverage the PUF to distinct the legal test patterns for different manufactured chips so as to further protect chips. Analysis results show that our protection scheme can achieve a very high security level without sacrificing system performance, testability and diagnosability.
AbstractList The design for testability (DFT) technology based on scan chains is widely used in industry to increase the testability of circuits. However, it also leads to a potential security problem that attackers can use scan chains as a backdoor to attack a system. Common methods to defend such attacks include disabling the scan chain after manufacturing test or employing some secret keys to encrypt/decrypt scan data or to verify the identities of users. The former would make in-field testing impossible and the latter would require storing keys in memory which might also undergo high risk of memory attacks. In this paper we propose a dynamic-key based secure scan architecture that works together with an intrinsic Physical Unclonable Function (PUF) of chips to defend both scan-based and memory attacks while facilitating both manufacturing and in-field testing. A system equipped with this secure architecture will shift out true circuit responses only when legal test patterns are shifted into the scan chains. Moreover, no test key will be stored in memory, hence no memory attacks are possible. We also leverage the PUF to distinct the legal test patterns for different manufactured chips so as to further protect chips. Analysis results show that our protection scheme can achieve a very high security level without sacrificing system performance, testability and diagnosability.
Author Wu, Chia-Chi
Lee, Kuen-Jong
Liu, Ching-An
Author_xml – sequence: 1
  givenname: Kuen-Jong
  orcidid: 0000-0002-6690-0074
  surname: Lee
  fullname: Lee, Kuen-Jong
  email: kjlee@mail.ncku.edu.tw
  organization: Department Electrical Engineering, National Cheng Kung University, Tainan, Taiwan
– sequence: 2
  givenname: Ching-An
  orcidid: 0000-0002-9416-1010
  surname: Liu
  fullname: Liu, Ching-An
  email: jason19950319@gmail.com
  organization: Department Electrical Engineering, National Cheng Kung University, Tainan, Taiwan
– sequence: 3
  givenname: Chia-Chi
  orcidid: 0000-0001-7059-333X
  surname: Wu
  fullname: Wu, Chia-Chi
  email: steven12wu@gmail.com
  organization: Department Electrical Engineering, National Cheng Kung University, Tainan, Taiwan
BookMark eNp9kE9PAjEQxRuDiYh8AOOliefF_lna7RFRlIjxAHptSjurJdDF7u6Bb283GGM8OJeZTt5vXvPOUS9UARC6pGREKVE3q_vVdMQIIyNOGC0YOUF9RkWRCTkmvV_zGRrW9YakKqhQQvbR2wTfHYLZeZs9wQHfmhocXoJtI-ClNQFPov3wDdim25RVxM8mtKXp3j68YxMcnods5mGbhileQd2k_QU6Lc22huF3H6DXWfrkY7Z4eZhPJ4vMMsWbjBaFGyvDISdjKXNXSmKcKBnnQE1pYV1YwcfEgpWOKZVEwjpqrHLrXDhm-ABdH-_uY_XZJm-9qdoYkqVmiZRU5EQlFT2qbKzqOkKp99HvTDxoSnSXoO4S1F2C-jvBxMg_jPWNaXwVmmj89l_y6kh6APhxUlTlnCv-BQOEfoM
CODEN ITETBT
CitedBy_id crossref_primary_10_1109_ACCESS_2022_3164712
crossref_primary_10_1109_TIFS_2023_3265815
crossref_primary_10_1109_ACCESS_2024_3505898
crossref_primary_10_1016_j_vlsi_2023_102067
crossref_primary_10_1109_TCSI_2024_3447080
crossref_primary_10_1109_TCAD_2024_3429071
crossref_primary_10_3390_cryptography9010006
Cites_doi 10.1109/VTS.2007.89
10.1109/TIFS.2016.2613847
10.1109/VTS.2006.7
10.1109/TCAD.2018.2818722
10.1109/TDSC.2007.70215
10.1109/TETC.2019.2903387
10.1145/2593069.2593204
10.1109/ISSCC.2018.8310218
10.1109/SP.2015.8
10.1109/IVSW.2018.8494852
10.1109/ARES.2013.52
10.1109/JPROC.2014.2320516
10.1109/ASQED.2009.5206245
10.1109/OLT.2004.1319691
10.1007/978-3-642-41395-7
10.1201/b10805
10.1109/CASES.2013.6662530
10.1109/TVLSI.2005.859470
10.1109/DATE.2012.6176618
10.1145/1506409.1506429
10.1109/PRDC.2013.47
10.1109/TCAD.2017.2772817
10.1109/TVLSI.2010.2089071
10.1109/TEST.2004.1386969
10.1109/ESSCIRC.2012.6341361
10.1109/ATS.2018.00020
10.1109/VTS.2009.20
10.1109/MSSC.2019.2923503
10.1016/j.diin.2016.01.009
10.1109/VTS.2016.7477293
10.1016/j.vlsi.2016.10.011
10.1109/ETS.2005.36
10.1137/060651380
10.1109/VLSI-SoC.2013.6673281
10.1109/TETC.2014.2304492
10.1145/2024723.2000086
10.1109/AsianHOST.2017.8353988
10.1109/HPCA.2017.10
10.1109/AsianHOST.2018.8607168
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TETC.2020.3021820
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Computer and Information Systems Abstracts
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library (IEL) (UW System Shared)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2168-6750
EndPage 385
ExternalDocumentID 10_1109_TETC_2020_3021820
9194339
Genre orig-research
GrantInformation_xml – fundername: Qualcomm Inc.
– fundername: Ministry of Science and Technology, Taiwan
  grantid: 107-2218-E-006-025
  funderid: 10.13039/501100004663
GroupedDBID 0R~
4.4
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJNI
ABQJQ
ABVLG
ACGFS
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
IEDLZ
IFIPE
IPLJI
JAVBF
KQ8
M43
O9-
OCL
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c293t-188d59a3e405774df70ad6f233e1afceb8c6350cec7d2990576cd1ac9db46d2a3
IEDL.DBID RIE
ISSN 2168-6750
IngestDate Mon Jun 30 05:20:44 EDT 2025
Thu Apr 24 23:02:02 EDT 2025
Wed Oct 01 04:11:06 EDT 2025
Wed Aug 27 02:49:31 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c293t-188d59a3e405774df70ad6f233e1afceb8c6350cec7d2990576cd1ac9db46d2a3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-6690-0074
0000-0002-9416-1010
0000-0001-7059-333X
PQID 2635716409
PQPubID 4437215
PageCount 13
ParticipantIDs crossref_primary_10_1109_TETC_2020_3021820
crossref_citationtrail_10_1109_TETC_2020_3021820
ieee_primary_9194339
proquest_journals_2635716409
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-Jan.-March-1
2022-1-1
20220101
PublicationDateYYYYMMDD 2022-01-01
PublicationDate_xml – month: 01
  year: 2022
  text: 2022-Jan.-March-1
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on emerging topics in computing
PublicationTitleAbbrev TETC
PublicationYear 2022
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref35
ref12
ref15
ref36
ref31
ref30
ref11
ref33
ref32
ref1
ref17
ref39
ref16
ref19
ref18
ref24
ref46
ref23
ref45
(ref14) 1993
ref26
ref25
ref47
ref20
ref42
ref41
ref22
ref44
ref21
ref43
Wang (ref34) 2006
ref28
ref27
Azriel (ref37) 2016
ref29
ref8
ref7
Skorobogatov (ref10)
ref9
ref4
ref3
ref6
ref5
Tehranipoor (ref2) 2011
ref40
References_xml – ident: ref42
  article-title: Physically unclonable function database
– ident: ref17
  doi: 10.1109/VTS.2007.89
– ident: ref22
  doi: 10.1109/TIFS.2016.2613847
– ident: ref21
  doi: 10.1109/VTS.2006.7
– ident: ref24
  doi: 10.1109/TCAD.2018.2818722
– year: 1993
  ident: ref14
  article-title: Security locks for integrated circuits
– volume-title: VLSI Test Principles And Architectures: Design for Testability
  year: 2006
  ident: ref34
– ident: ref15
  doi: 10.1109/TDSC.2007.70215
– start-page: 1
  volume-title: Proc. Des. Secur. Cryptogr. Algorithms Devices
  ident: ref10
  article-title: Fault attacks on secure chips: From glitch to flash
– ident: ref18
  doi: 10.1109/TETC.2019.2903387
– ident: ref12
  doi: 10.1145/2593069.2593204
– ident: ref43
  doi: 10.1109/ISSCC.2018.8310218
– ident: ref26
  doi: 10.1109/SP.2015.8
– ident: ref25
  doi: 10.1109/IVSW.2018.8494852
– ident: ref8
  doi: 10.1109/ARES.2013.52
– ident: ref11
  doi: 10.1109/JPROC.2014.2320516
– ident: ref4
  doi: 10.1109/ASQED.2009.5206245
– ident: ref19
  doi: 10.1109/OLT.2004.1319691
– ident: ref41
  doi: 10.1007/978-3-642-41395-7
– ident: ref27
  doi: 10.1201/b10805
– ident: ref29
  doi: 10.1109/CASES.2013.6662530
– ident: ref31
  doi: 10.1109/TVLSI.2005.859470
– ident: ref47
  doi: 10.1109/DATE.2012.6176618
– ident: ref7
  doi: 10.1145/1506409.1506429
– ident: ref20
  doi: 10.1109/PRDC.2013.47
– ident: ref23
  doi: 10.1109/TCAD.2017.2772817
– ident: ref16
  doi: 10.1109/TVLSI.2010.2089071
– year: 2016
  ident: ref37
  article-title: Exploiting the scan side channel for reverse engineering of a VLSI device
– ident: ref3
  doi: 10.1109/TEST.2004.1386969
– ident: ref32
  doi: 10.1109/ESSCIRC.2012.6341361
– ident: ref13
  doi: 10.1109/ATS.2018.00020
– volume-title: Introduction to Hardware Security and Trust
  year: 2011
  ident: ref2
– ident: ref45
  doi: 10.1109/VTS.2009.20
– ident: ref33
  article-title: Antifuse-based split-channel 1T-fuse bit cell for OTP NVM IP
– ident: ref40
  doi: 10.1109/MSSC.2019.2923503
– ident: ref5
  doi: 10.1016/j.diin.2016.01.009
– ident: ref9
  doi: 10.1109/VTS.2016.7477293
– ident: ref39
  doi: 10.1016/j.vlsi.2016.10.011
– ident: ref35
  doi: 10.1109/ETS.2005.36
– ident: ref30
  doi: 10.1137/060651380
– ident: ref36
  doi: 10.1109/VLSI-SoC.2013.6673281
– ident: ref1
  doi: 10.1109/TETC.2014.2304492
– ident: ref28
  doi: 10.1145/2024723.2000086
– ident: ref44
  doi: 10.1109/AsianHOST.2017.8353988
– ident: ref6
  doi: 10.1109/HPCA.2017.10
– ident: ref46
  doi: 10.1109/AsianHOST.2018.8607168
SSID ssj0000816967
Score 2.3107202
Snippet The design for testability (DFT) technology based on scan chains is widely used in industry to increase the testability of circuits. However, it also leads to...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 373
SubjectTerms Chains
Computer architecture
Discrete Fourier transforms
dynamic key generation
Field study
Generators
Hardware security
Integrated circuits
Manufacturing
memory attack
physical unclonable function (PUF)
Random access memory
scan design
secure scan architecture
Security
side-channel attack
Testability
Testing
Title A Dynamic-Key Based Secure Scan Architecture for Manufacturing and In-Field IC Testing
URI https://ieeexplore.ieee.org/document/9194339
https://www.proquest.com/docview/2635716409
Volume 10
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 2168-6750
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000816967
  issn: 2168-6750
  databaseCode: KQ8
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVIEE
  databaseName: IEEE/IET Electronic Library (IEL) (UW System Shared)
  customDbUrl:
  eissn: 2168-6750
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000816967
  issn: 2168-6750
  databaseCode: RIE
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED61TDDwRpSXPDAh0iZ24thjKVQtqCwUxBYl9pkBlCJoB_j12E5a8RJiy2BL1p2du-8e3wEca4rS2lmLTQRnQUxTEwgas4BzWRSJVJz6YTCjaz64jS_vk_sGnC56YRDRF59h2336XL6eqJkLlXWkRdyMySY0U8GrXq1FPMUNkJA8rROXUSg744txzwJAanFpxVP-xfT4WSo_fsDeqvTXYDQ_T1VM8tieTYu2ev9G1fjfA6_Dau1ekm51HzaggeUmrHwiHdyCuy45r8bQB1f4Rs6sGdPEh92R3FhBk-6n3AKxPi0Z5eXMNUD4jkaSl5oMy6DvSt_IsEfGjqejfNiG274VxSCopysEypr4aRAJoROZM3QuWxprk4a55oYyhlFuFBZCWWckVKhS7WyWBSZKR7mSuoi5pjnbgaVyUuIukFxTrpkKhUkwpoYJY0RiZKxQI7IoakE4F3ymaupxNwHjKfMQJJSZ01XmdJXVumrByWLLc8W78dfiLSf7xcJa7C04mGs3q1_ma-bIdxxGDOXe77v2YZm6FgcfZjmApenLDA-t4zEtjvyN-wBdVdQF
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED7xGICBN6I8PTAhUhLbceKxPKoWKAsFsUWJfWYApQjaAX49tpNWvITYMtiSdWfn7rvHdwAHmqK0dtZik1SwgNPEBCnlLBBCFkUslaB-GEzvWnRu-cV9fD8FR5NeGET0xWfYdJ8-l68HauRCZcfSIm7G5DTMxpzzuOrWmkRU3AgJKZI6dRmF8rh_3j-1EJBaZFoxlX8xPn6ayo9fsLcr7SXojU9UlZM8NkfDoqnev5E1_vfIy7BYO5ikVd2IFZjCchUWPtEOrsFdi5xVg-iDS3wjJ9aQaeID70hurKhJ61N2gVivlvTycuRaIHxPI8lLTbpl0HbFb6R7SvqOqaN8WIfbthVFJ6jnKwTKGvlhEKWpjmXO0DltCdcmCXMtDGUMo9woLFJl3ZFQoUq0s1oWmigd5UrqggtNc7YBM-WgxE0guaZCMxWmJkZODUuNSWMjuUKNyKKoAeFY8JmqycfdDIynzIOQUGZOV5nTVVbrqgGHky3PFfPGX4vXnOwnC2uxN2BnrN2sfpuvmaPfcSgxlFu_79qHuU6_d5Vdda8vt2GeuoYHH3TZgZnhywh3rRsyLPb87fsAoCHXUg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Dynamic-Key+Based+Secure+Scan+Architecture+for+Manufacturing+and+In-Field+IC+Testing&rft.jtitle=IEEE+transactions+on+emerging+topics+in+computing&rft.au=Lee%2C+Kuen-Jong&rft.au=Ching-An%2C+Liu&rft.au=Wu%2C+Chia-Chi&rft.date=2022-01-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.eissn=2168-6750&rft.volume=10&rft.issue=1&rft.spage=373&rft_id=info:doi/10.1109%2FTETC.2020.3021820&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2168-6750&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2168-6750&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2168-6750&client=summon