Home
Securing Scan Design Using Lock & Key Technique
Contents
1. 9 10 and most recently scan chain hijacking as demonstrated in 1 It is also possible to reveal proprietary information through these side channel attacks making these a particularly large concern to companies Due to the side channel attacks a lot of attention has begun to be paid toward the inclusion of security during design 3 and 4 discuss the importance of using tamper resistant design to prevent such side channel attacks A VLSI design flow was proposed by 5 that included designing tamper resistant circuits beginning as early as the RTL stage Traditional side channel leaks have often been secured with the use of additional circuitry Power analysis attacks can be prevented with noise inducing circuitry 7 or applying additional circuitry to hide supply variations 15 Timing attacks can be prevented by adding additional gates so all operations are performed in the same amount of time or to add random delays to processing time 16 Finally fault injection attacks can be detected with additional logic that performs the inverse operation of the original logic to check if the result reproduces the input 17 18 Subchain 1 E Subchain 2 Subchain 3 EN so EN s m bits wide Test Security Controller TSC Decoder Test Key Comparator Figure 1 Architecture of lock amp key security measure There has not been much work done that
2. exploitation very difficult Design of the technique is flexible and straight forward to implement for varying degrees of security Until another method of testing a chip can yield the similar coverage as scan based designs with better security flexible low overhead solutions must be included in the design of scan References 10 11 12 13 14 15 16 17 18 19 20 21 22 B Yang K Wu and R Karri Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard in Proc of the IEEE Int Test Conf ITC 2004 pp 339 344 M L Bushnell and V D Agrawal Essentials of Electronic Testing Kluwer Academic Publishers 2000 S Ravi A Raghunathan and S Chakradhar Tamper Resistance Mechanisms for Secure Embedded Systems in Proc of the 17th Intl Conf on VLSI Design 2004 pp 605 611 P Kocher R Lee G McGraw A Raghunathan and S Ravi Security as a New Dimension in Embedded System Design in Proc of the 41st Annual Conference on Design Automation June 2004 pp 753 760 K Tiri and I Verbauwhede A VLSI Design Flow for Secure Side Channel Attack Resistant ICs in Proc of Design Automation and Test in Europe Mar 2005 pp 58 63 K Hafner H C Ritter T M Schwair S Wallstab M Deppermann J Gessner S Koesters W D Moeller and G Sandweg Design and Test of an Integrated Cryptochip IEEE Design and Test of Comput
3. is directly related to the security of scan chains Most have gotten around the concern by using BIST In 6 Hafner et al used BIST to test the entire cryptochip they designed It provided high fault coverage for both the standard cells and memories but did not fair nearly as well on the custom designed portions of the chip Both BIST and boundary scan were used in 19 The fault coverage still was not nearly as high as what could have been achieved with automatic test pattern generation ATPG for scan based design Any security sensitive I O were excluded from the boundary scan Work to secure scan designs has only begun recently An encoding decoding security scheme has been proposed 12 13 but another more developed method has been presented by 11 They present a method to modify the scan chains that would internally scramble the values if the test mode was not properly secured By using an unpredictable random number generator to choose the segment to scan out it makes comparing the output after each scan out very difficult Although this will make the output very difficult to interpret for an unauthorized user it will also create significant delay routing and logic overhead since each segment is connected to all other segments in the chain 4 Lock amp key technique The Lock amp Key security measure we are proposing can be used to secure both single and multiple scan designs For either case the scan chain can be divided into sm
4. only active for insecure mode operation As can be seen in Figure 3 the additional bits are hidden behind a multiplexer The output from the LFSR to the input of the decoder does not change Since the original LFSR only makes up a smaller part of the insecure mode LFSR repetitively selecting the same subchain multiple times during one test cycle becomes possible which results in a more complex output Unlike in secure mode repetition is not a large concern since we want the output on SO to confuse and obscure the order of the scan chains To further complicate an attack and to make each test round unique when the TSC is insecure the FSM can create a new random seed every round Another design option when using the LFSR decoder control in the test security controller is to use an LFSR with a non primitive polynomial configuration It is a more design intensive and circuit dependent solution but provides more security since it does not have the same predictability as the primitive polynomial configured LFSR The design would use an LFSR of length r q but only use q log m 1 bits when in a secure state to select a subchain Unlike the advantage of using a primitive polynomial LFSR this design does not guarantee each subchain will only be chosen without repetition during a scan in series and results in an increased test time A memory element could be used in the decoder that will recall which subchains have been selected during the current scan in
5. series and use this to make a decision to choose another subchain Upon entering normal mode to run the test pattern these memory elements would then be cleared for the next pattern If the CUT is in insecure mode the remaining r bits of the LFSR can be used to further randomize the selection made by the decoder Again repeating subchains is not a concern since we are trying to confuse and obscure the response being placed on SO When applying our Lock amp Key technique to multiple scan chain designs essentially the same principles as single scan designs hold If the length of the scan chain is long enough each scan chain is broken down into m subchains but rather than use a separate TSC for each chain a single TSC can be used to control all chains Since each scan chain in multiple scan design would normally be controlled by the same TC there is no reason for each chain to be controlled by a separate TSC No more information about the scan design is given away by using multiple scan as opposed to single scan the only actual difference is in the parallelism for faster testing If the length of each scan chain is short they will not be divided into subchains and the Lock amp Key technique is used to access and control all chains 4 2 Analysis of lock amp key The number of subchains needed is completely dependent upon the amount of complexity required to deter hackers If there are m subchains in the design the response scanned out on SO
6. 24 1 subchains without choosing the same subchain twice before all subchains have been selected once If subchains are allowed to repeat the test application time will become significantly longer Figure 2 shows the LFSR and decoder Since there is at least one primitive polynomial for all values of q the LFSR is guaranteed to choose each subchain once before repeating for any length of the LFSR 2 The choice of a primitive polynomial significantly simplifies the design of the decoder The decoder can directly translate the output of the LFSR into a run of zeros and single one to directly control each subchain This method not only shortens design time but also reduces the area overhead of the TSC as a whole a E Insecure Mode Bits B r bits ee ee S Primitive Polynomial LFSR q bits i Decoder secure from FSM Figure 3 Modifiable LFSR determined by security mode of TSC The problem with using a primitive polynomial configuration LFSR is the predictability of its behavior If the LFSR were to remain unchanged for insecure mode operation it would not take long to find the order since the order is always the same only the start and end points would differ To avoid this predictability the LFSR configuration must be altered when set to insecure mode An additional r bits to the LFSR that are only active when the TSC is insecure easily serve this purpose Figure 3 shows the LFSR with the additional bits that are
7. Key technique to be effective an enable signal must be used for each subchain We cannot treat the enable signal as TC since that would place one subchain into test mode while the remaining subchains are in normal mode potentially changing all registers that had already been loaded with a new test vector We introduce two potential solutions that avoid modification of the standard scan cell The Clock Gating method has been proposed for low power testing in the past 21 22 We would like to apply the same principle to halt normal operation of the subchains when the enable signal from the TSC is low In order to do so this method adds an additional gate that combines the system clock and the enable signals from the TSC to the subchain clock When the enable signal is high for a particular subchain the subchain will behave as a normal scan chain with respect to the system clock When the enable signal is low the subchain will ignore the system clock and not shift when TC is high Figure 4 a shows a gating technique that uses the system clock and the TSC enable signal Since this is a small addition chip area is not severely impacted It does however affect clock skew and chip performance This solution is not suited for high performance applications but does provide the opportunity for low power testing since at most l scan cells would be in transition at any time as opposed to the full length of the scan chain Subchain Feedback is the second tech
8. ST would only return a pass or fail result as opposed to a pattern response that could potentially be used to expose either the test key or random seed The other option would be to simply not test the TSC logic at all since it is part of the testing logic for the CUT This option is similar in nature to the choice of ignoring to test BIST logic due to the fact that if the CUT returns an incorrect result the chip is faulty regardless of whether the CUT is faulty or the TSC is faulty 2 The effect of including Lock amp Key security on a chip is fairly minimal when used in modern Table 1 Number of gates in TSC for 4 bit 8 bit and 12 bit Number of LFSR Size of FSM Size of Size of LFSR Size of Total Size Bits q Test Key Comparator qtr Decoder of TSC 4 bit LFSR Sbit LFSR 12 bit LFSR 5432 5817 5 B Ae ZS EN EN TC clk from TSC from TSC a Clock gating method b Subchain feedback method Figure 4 Two subchain modifications to prevent simultaneous normal and test mode operation designs Not only does the TSC logic provide little area overhead but performance of the chip in normal mode is not affected any more than a circuit with standard scan test In case of using a primitive polynomial for the LFSR the affect on test time is also minimal because only a test key and LFSR seed need to be added to the beginning of the test pattern 4 3 Modification to scan chains In order for the Lock amp
9. Securing Scan Design Using Lock amp Key Technique Jeremy Lee Mohammed Tehranipoor Chintan Patel and Jim Plusquellic CSEE Department University of Maryland Baltimore County 1000 Hilltop Circle Baltimore MD 21250 jlee36 tehrani cpatel2 plusquel umbc edu Abstract Scan test has been a common and useful method for testing VLSI designs due to the high control lability and observability it provides These same properties have recently been shown to also be a security threat to the intellectual property on a chip 1 In order to defend from scan based attacks we present the Lock amp Key technique Our proposed technique provides security while not negatively impacting the design s fault coverage This technique requires only that a small area overhead penalty is incurred for a significant return in security Lock amp Key divides the already present scan chain into smaller subchains of equal length that are controlled by an internal test security controller When a malicious user attempts to manipulate the scan chain the test security controller goes into insecure mode and enables each subchain in an unpredictable sequence making controllability and observability of the circuit under test very difficult We will present and analyze the design of the Lock amp Key technique to show that this is a flexible option to secure scan designs for various levels of security 1 Introduction Scan has been generally accepted as the standard me
10. aller equal length subchains Test vectors are not sequentially shifted into each subchain but rather a linear feedback shift register LFSR randomly selects a subchain to be filled Figure 1 shows a general architecture for the Lock amp Key method for single scan design The goal of this method is to prevent those who do not hold the test key from manipulating the scan chain and revealing vital information about the chip This is ensured by the test security controller TSC which consists of a finite state machine FSM test key comparator LFSR and decoder There are two states the TSC can be in secure and insecure modes When the CUT is initially reset the FSM sets the TSC into insecure mode and will remain in this insecure state until TC is enabled It is only after TC has been enabled for the first time and a test key has been entered that the TSC may exit the insecure state When a test key is entered and a user has been ensured to be a trusted user the FSM allows the TSC to enter secure mode There are two steps the FSM must take before scanning in a test vector for the first time When TC is initially enabled the FSM will first need to check for a correct test key It will feed the first k bits of the test pattern which makes up the test key to the test key comparator The comparator will then return a pass or fail response to the FSM which will then decide the next state If the qtom Decoder Figure 2 LFSR and decoder in TSC
11. can be one of m possible combinations when in secure mode or up to m combinations when in insecure mode With as few as 15 subchains an untrusted user that does not have knowledge of the LFSR configuration nor the seed would have more than one trillion unique combinations to choose from in secure mode and more than 1515 possible combinations to choose from in insecure mode A brute force attempt at resolving the pattern to the location in the chain becomes extremely difficult and continues to increase in difficulty as m increases Overall this method significantly increases the amount of work necessary to mount an attack on the scan chains The following tasks need to be done by a hacker in order for them to perform a successful attack 1 Hackers must first learn of what security strategy is being used 2 If they figure out the strategy used then they must find the secret test key for the operation of the chains to be predictable 3 Even if hackers were to be able to discover the test key hackers must also determine the pseudo random order that patterns will be scanned in and out 4 If hackers are able to find all this information an attack can finally be mounted against the CUT while still having to manage with the pseudo random selection of the subchains As discussed in Section 2 it is easier to design a chip when a specific hacker class is targeted The benefit of Lock amp Key security is that it scales easily to the amount o
12. ch step up the hierarchy the cost and amount of overhead continues to increase just to obscure the side channel leaks a little more We will mainly focus our efforts on securing the scan chains that make the lives of test engineers considerably easier This is not an easy task since the testability of a CUT is dependent on the amount of controllability and observability allowed through the scan chains It is quite likely hackers have a fair amount of knowledge of the chip they are attacking It is not difficult to learn the pin outs and high level timing of the circuit under attack since these are often provided in the specifications from the chip manufacturer 1 Testability and security have what appears to be a mutually exclusive relationship It is very difficult to satisfactorily meet the needs of both specifications A middle ground must be met between the fully controllable and observable CUT and a black box If one considers the hacker during design a clearer relationship between testability and security can more easily be concluded If the designer can target specifically which class he would like to prevent access to it may be easier to make design compromises between testability and security 3 Prior work Implementing encryption algorithms in hardware have revealed quite a few methods to discover the secret keys through side channels These side channel attacks include differential power analysis 7 timing analysis 8 fault injection
13. e mode operation We chose to use a constant r value of 4 for all implementations and the primitive polynomials used were from 2 A 4 bit LFSR can control 15 subchains placing any one of 15 different subchain combinations on SO while insecure Without prior knowledge a beginner would have little chance of hacking any vital information from the chip using the scan chain alone By doubling the size of the LFSR to 8 bits most independent hackers should be deterred Increasing the LFSR size again greatly increases the amount of security but at the cost of a much larger area overhead due to the exponential growth of the decoder Increasing the size beyond 10 bits should suffice for some businesses but if they have enough resources to open the package and reverse engineer the layout any effort to secure the scan chain is inadequate The same can be said for government hackers attempting to reverse engineer the chip If the IP is important enough for them to attempt to hack they will easily be able to pool together the appropriate resources to perform a brute force attack if no other solution is viable However we suggest that design engineers use multiple design security techniques to force both business and government hackers to spend more time money and other resources The components for the TSC are fairly standard and testing it with BIST can provide a fairly high coverage Testing the TSC would defeat the purpose of the security feature since BI
14. ers pp 6 17 Dec 1991 P Kocher J Jaffe and B Jun Differential Power Analysis Lecture Notes in Computer Science vol 1666 pp 388 397 1999 J Kelsey B Schneier D Wagner and C Hall Side Channel Cryptanalysis of Product Ciphers in Proc of the European Symposium on Research in Computer Security Sept 1998 pp 97 110 D Boneh R A Demillo and R J Lipton On the Importance of Checking Cryptographic Protocols for Faults Lecture Notes in Computer Science vol 1233 pp 37 51 1997 E Biham and A Shamir Differential Fault Analysis of Secret Key Cryptosystems Lecture Notes in Computer Science vol 1294 pp 513 527 1997 D H ly M L Flottes F Bancel B Rouzeyre N B rard and M Renovell Scan Design and Secure Chip in Proc of the 10th IEEE Intl On Line Testing Symposium 2004 R Goering Scan Design Called Portal for Hackers Oct 2004 Online Available http www eetimes com news design showArticle jhtml articleID 51200154 S Scheiber The Best Laid Boards Apr 2005 Online Available http www reed electronics com tmworld article CA513261 html P Ludlow Ed High Noon on the Electronic Frontier Conceptual Issues in Cyberspace 1st ed MIT Press 1996 G B Ratanpal R D Williams and T N Blalock An On Chip Signal Suppression Countermeasure to Power Analysis Attacks IEEE Transactions on Dependable and Secure Computing vol 1 no 3 p
15. f security the designer would like to include A small TSC with a 4 bit LFSR would be more than suitable to stop a beginner but increasing the LFSR to 8 bits would potentially be sufficient to prevent some independent hackers from intrusion As the granularity of each subchain becomes smaller and the number of bits in the LFSR becomes greater the TSC becomes larger We synthesized our Lock amp Key technique in Verilog using Synopsys and the Design Analyzer tool 20 Table 1 shows the number of equivalent gates returned by Design Analyzer for the FSM test key comparator LFSR and decoder with 4 bit 8 bit and 12 bit LFSRs The Lock amp Key test security controller grows fairly slowly for a large increase in the number of subchains The FSM and test key comparator remain a fairly constant size FSM operation is mostly independent of size of the LFSR The test key comparator is only dependent upon the size of the test key For a minimally secure test key length a length of k gt 40 bits should be used For our implementation we used a 64 bit test key The size of the test key comparator in Table 1 does not include the additional overhead for on chip key storage but we did include it in the final size of the TSC Only the growth of the LFSR and decoder is of any significance in terms of size but the number of subchains that can be used exponentially increases with each additional bit The total size of each LFSR includes the r bits used for insecur
16. for Lock amp Key security key passes the FSM will switch the TSC to secure mode allowing predictable operation of the scan chains and will remain in this state until the CUT is reset Otherwise the TSC will remain in insecure mode and the behavior of the scan chain will not longer be predictable Assuming the test key comparator returned a pass response to the FSM the next q log m 1 bits will then be fed to the LFSR and used as an initial seed where q is the size of the LFSR and m is the number of subchains being implemented The seeded LFSR will then use a decoder as an interface to the subchains for a one hot output which individually enables each subchain We will discuss in detail the concept of an enable signal and how it is generated to control subchains in Section 4 3 Assuming l is the length of each subchain the LFSR decoder generates the next one hot output after l clock cycles Finally the FSM connects SI to the inputs of the subchains and the test pattern can be shifted into the scan chain Once the scanning in process is finished for the first round TC goes low and the CUT will function in normal mode capturing the response in the SFFs Once the CUT returns to test mode a new test vector is scanned into the subchains in the same or a new random order depending on the design as the previous vector was scanned in The response is shifted out at the same time the new pattern is shifted in If the entered key fails the TSC remain
17. gn security is clearly contra dicted by testability By designing for testability a designer is essentially leaking all information about the chip through the use of scan test If the aim of designing a chip is security it is very difficult to justify the amount of controllability and observability that testability aims to provide be cause of these leaks It is also necessary however to ensure the chip will function properly through testing in a fast and reliable manner The only truly system secure from any leaks is one without any controllable inputs nor observable outputs keeping it a completely black box but this is absurd from both a testability and a usability standpoint Much of this concern over chip security would not be necessary unless the IP needed to be protected from malicious users and hackers There are many hackers in the world with many different motivations They range from the noble attempting make their fellow developers aware of their pitfalls the malicious stealing information that does not rightfully belong to them and simply the curious 14 The skill set of hackers vary as much as their intentions We have categorized hackers into the following classes 1 The Beginner is as the name suggests This class is just getting started possibly out of curiosity 2 The Independent class is more serious about what they do The amount of knowledge available is great and the amount of resources is fairly large This class ma
18. nique that can be used to avoid simultaneous normal and test mode subchain operation Figure 4 b shows an example of the subchain feedback loop Unlike gating the clock each subchain still shifts the SFF registers regardless of whether enable is high By adding a multiplexer to the input of the subchain the next value to be scanned in can either be from the new test vector if enable is high or from the last register of the subchain when enable is low Since we assume that the subchains are the same length maintaining consistent data in each subchain does not become an issue This option eliminates the performance problem created by gating the clock but does not re duce the potential maximum number of transitions when shifting Since all subchains are shifting regardless of the enable signal there will still be as many transitions as if one continuous chain were used There is the need for additional routing for the feedback loop and the multiplexer but these additions are still fairly small 5 Conclusion Scan based designs have been proven to be a significant security risk to the contents of a chip Without proper security in place encryption algorithms can be weakened and IP can be stolen We have proposed the Lock amp Key technique as a countermeasure to the method that has been used to expose vital information through the scan chain Unless the the user is trusted our technique will cause the scan chain to operate unpredictably and make
19. p 179 188 2004 P C Kocher Timing Attacks on Implementations of Diffie Hellman RSA DSS and Other Systems Lecture Notes in Computer Science vol 1109 pp 104 113 1996 R Karri K Wu and P Mishra Fault Based Side Channel Cryptanalysis Tolerant Architecture for Rijndael Symmetric Block Cipher in IEEE Intl Symposium on Defect and Fault Tolerance in VLSI Systems 2001 pp 427 435 R Karri K Wu P Mishra and Y Kim Concurrent Error Detection Schemes for Fault Based Side Channel Cryptanalysis of Symmetric Block Ciphers IEEE Transactions on Computer Aided Design of Integrated Cir cuits and Systems vol 21 no 12 pp 1509 1517 Dec 2002 R Zimmermann A Curiger H Bonnenberg H Kaeslin N Felber and W Fichtner A 177 Mbit s VLSI Implementation of the International Data Encryption Algorithm IEEE Journal of Solid State Circuits vol 29 no 3 Mar 1994 Synopsys DFT Compiler User Manual for Synopsys Toolset Version 2004 06 Synopsys Inc 2004 R Sanakaralingam B Pouya and N A Touba Reducing Power Dissipation During Test Using Scan Chain Disable in Proc of VLSI Test Symposium 2001 pp 319 234 J Saxena K M Butler and L Whetsel An Analysis of Power Reduction Techniques in Scan Testing in Proc Intl Test Conf 2001 pp 670 677
20. s in insecure mode and will seed the LFSR with an unpredictable random seed essentially locking the scan chains from being used correctly Since the choice of subchain is pseudo random due to the LFSR it is difficult to predict the response on SO if both the seed and the configuration of the LFSR are unknown Even if the configuration of the LFSR taps are known if the LFSR is large enough it is difficult to know the subchain order without first realizing the initial seed The need for a test key also compounds any attempt made by an unauthorized party to use the scan chain Although conceptually similar to scan chain scrambling proposed in 11 this method does not have the requirement of connecting the output of each subchain to the input of all other subchains which will significantly reduce area overhead Also the response shifted out from SO is dependent on the seed and LFSR configuration adding an additional obstacle for the hacker The possibility of using this method with multiple scan test also provides the advantage of conforming to many design for test tools used in industry 4 1 Design of lock amp key There are many possible configurations for the LFSR Although we want the ability to ensure security of the scan chain we also want the design of the Lock amp Key method to be design in dependent To prevent the decoder from becoming design dependent an LFSR with a primitive polynomial configuration will allow the selection of m
21. sers a chip must reveal as little as possible while still be usable by the end user and give a test engineer as much access to the chip as possible Recently scan test has been proven a security risk to the intellectual property on the chip 1 11 12 13 Yang et al 1 were able to simulate an attack on the scan chain of a DES cryptochip to reveal the secret key with using only three plaintexts Although the scan chains have only been exploited to find the secret key of a cryptochip it is just as easy to uncover proprietary intellectual property IP through scan chains Scan chains allow high controllability and observability to vital registers revealing a lot more than the fabrication defects in a chip In order to prevent IP theft security measures must be implemented during the design phase of the manufacturing process In this paper we propose Lock amp Key security in order to prevent aggressive users from maliciously attacking the scan chains to reveal vital information about the chip Our low overhead security solution against scan chain side channel attacks minimizes the controllability and observability of the scan chain when an unauthorized user makes an attempt to access them by switching into insecure mode We divide the scan chain into smaller subchains of equal length and randomly select the subchain when an unwanted user attempts to manipulate the scan chains This prevents malicious users from predicting where in the scan chain the
22. stimuli on SI goes and where the response from SO comes from This paper is organized as follows In Section 2 we will discuss the differences and the potential compromises that are necessary for testability and security and how these two relate to hacking Section 3 will discuss some prior work performed in the field of chip security We will then propose and discuss our method of Lock amp Key security in Section 4 Finally we will conclude our discussion in Section 5 2 Testability security and hacking Testability and security inherently contradict each other The testability of a chip can be defined by the amount of controllability and observability the test engineer is granted The higher degree of controllability and observability allowed the easier it is to test the CUT The test is not only easier to perform but the result of the test becomes more reliable due to a higher fault coverage Security ensures that anything in a circuit is safely stored within it The most common manner of providing security is to hide the information behind some form of recognition that would be able to tell a valid user from an attacker Modern day security in all realms use this method to protect vital belongings whether it is a security code for a home retinal scanner for a lab or encryption key for information Security relies on making information obscure and difficult to figure out When trying to relate testability and security together in chip desi
23. the responses back into the SFFs TC is again enabled to scan out the response while at the same time scanning in a new test pattern to check for new faults the previous pattern was not able to detect Using this method of test sequential logic essentially becomes combinational logic during test Creating test patterns that achieve high fault coverage is a much easier task for combinational logic than it is for sequential logic significantly speeding up the test pattern generation process 2 Security has become a concern in the design and test of chips within recent years 3 4 5 This has become more apparent with the advent of cryptochips 6 Cryptochips perform encryption and decryption algorithms at the circuit level Many researchers have been able to show that these chips are highly vulnerable to various power analysis 7 timing 8 and fault injection 9 10 attacks if not specifically designed with countermeasures in mind If not considered carefully strong encryption algorithms that would take years to crack by brute force can otherwise be crippled in a manner of weeks days or even hours through these side channel attacks Currently the main objective in testing has been to control and observe a chip as much as possible in order to achieve high fault coverage on the CUT As useful as these properties are for testing they are completely contradictory to the objectives of security on a chip In order to protect a chip from malicious u
24. thod of testing chips due to the high fault coverage and low overhead Including scan while designing the chip requires one additional pin to the primary I O for the test control pin TC 2 Internally there is little impact on the design since the standard flip flops FFs are exchanged with scan flip flops SFFs which are then linked to one another creating a scan chain TC selects between functional and test mode operation SFFs carry the additional overhead of a single two to one multiplexer when compared to the standard flip flop TC controls each multiplexer choosing between the normal mode input of the flip flop or the output of the previous scan flip flop in the chain Due to the additional multiplexer normal mode performance could potentially be hindered since the output of the combinational logic blocks are not directly connected to the input of the FFs The flip flop registers make up the I O to the combinational logic blocks in the chip so test engineers are able to manipulate the values that are input controllability and view the output observability of each block This is performed by multiplexing one primary input pin and one primary output pin as the scan in SI pin and scan out SO pin respectively Using the SI pin while TC is enabled a test pattern is scanned in to the scan chain as dictated by the system clock 2 When the entire pattern is scanned in TC is disabled and the chip is run in normal mode for one cycle storing
25. y be more of a threat than some may give them credit 3 The Business class hackers are essentially performing business espionage They are trying to get a step ahead of their competition even if it is unethical behavior 4 Government hackers for the most part participate in these actions out of the security of their nation If there is a system claiming to be unbreakable they intend to break it for their own security The different classes of hackers tend to correlate with the amount of effort they are willing to put into a job and the amount of effort that is necessary to secure the device under attack If the hacker is only a beginner it can be assumed that unless the attack is available online or in a book the hacker will give up with little effort The chip designer then has little to worry about when designing a circuit A simple encoding scheme may suffice The next level of the hacker hierarchy may require much more effort to deter the hacker A strong encryption algorithm must be used Protecting IP from the business hacker is very difficult due to the high availability of money and knowledge but if the hacking process takes too long their product will be released too late to compete with other businesses It is next to impossible to secure a system against government hacking due to the almost unlimited resources at their disposal The amount of overhead is quite different when trying to protect a chip from the many hacker classes With ea
Download Pdf Manuals
Related Search
Related Contents
Brodit ProClip 854846 TELÉMETRO DIGITAL LÁSER COMPACTO RX® -1200i Saeco Poemia Manual Espresso HD8425/09 別添3 Copyright © All rights reserved.
Failed to retrieve file