Abstract
It has become a great problem nowadays that the information contained in an IC chip is not provided with adequate security against the cunning attackers. The modern chip designs inbuilt with a design for testing (DfT) that enable testing process to become more easier, but it also acts as backdoor tool to the hackers to retrieve the sensitive data from the chip. So, in order for providing security for the information contained in the chip, we introduce a reconfigurable PUF design technique with the DfT. This security is achieved by providing a barrier against the hamming distance-based attack. In this paper, we compare the analysis of modified linear feedback shift registers (LFSRs), pseudorandom sequence generator, and physical unclonable function (PUF) in terms of randomness, hamming distance, and security. The result of comparison provides the PUF design have maximum security without effecting the testability of the circuits.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hely, D., Flottes, M.-L., Frederic, B., Rouzeyre, B., Berard, N., Renovell, M.: Scan design and secure chip. In: IOLTS, vol. 4, pp. 219–224 (2004)
John, P.K.: BIST architecture for multiple RAMs in SoC. Proc. Comput. Sci. 115, 159–165 (2017)
Haridas, N., Nirmala Devi, M.: Efficient linear feedback shift register design for pseudo exhaustive test generation. In: BIST 3rd IEEE International Conference Electronics Computer Technology (ICECT), vol. 1 (2011)
Shaer, L., et al.: A low power reconfigurable LFSR. In: 18th Mediterranean IEEE Electrotechnical Conference (MELECON) (2016)
Shiny, M.I., Nirmala, D.M.: LFSR based secured scan design testability techniques. Proc. Comput. Sci. 115, 174–181 (2017)
Suh, G.E., Clarke, D., Gassend, B., van Dijk, M., Devadas, S.: Efficient memory integrity verification and encryption for secure processors. In: Proceedings of the 36th annual IEEE/ACM International Symposium on Microarchitecture, p. 339. IEEE Computer Society (2003)
Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: Physical unclonable functions and public-key crypto for FPGA IP protection. In: FPL 2007 International Conference on Field Programmable Logic and Applications, 2007, pp. 189–195. IEEE (2007)
Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th annual Design Automation Conference, DAC ’07 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shiny, M.I., Reshma, R., Ross, S., John, S., Sreevidya, R., Moothedeth, S. (2019). Security Systems in Design for Testing. In: Wang, J., Reddy, G., Prasad, V., Reddy, V. (eds) Soft Computing and Signal Processing . Advances in Intelligent Systems and Computing, vol 898. Springer, Singapore. https://doi.org/10.1007/978-981-13-3393-4_51
Download citation
DOI: https://doi.org/10.1007/978-981-13-3393-4_51
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3392-7
Online ISBN: 978-981-13-3393-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)