Skip to main content

Security Systems in Design for Testing

  • Conference paper
  • First Online:
Soft Computing and Signal Processing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 898))

Abstract

It has become a great problem nowadays that the information contained in an IC chip is not provided with adequate security against the cunning attackers. The modern chip designs inbuilt with a design for testing (DfT) that enable testing process to become more easier, but it also acts as backdoor tool to the hackers to retrieve the sensitive data from the chip. So, in order for providing security for the information contained in the chip, we introduce a reconfigurable PUF design technique with the DfT. This security is achieved by providing a barrier against the hamming distance-based attack. In this paper, we compare the analysis of modified linear feedback shift registers (LFSRs), pseudorandom sequence generator, and physical unclonable function (PUF) in terms of randomness, hamming distance, and security. The result of comparison provides the PUF design have maximum security without effecting the testability of the circuits.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hely, D., Flottes, M.-L., Frederic, B., Rouzeyre, B., Berard, N., Renovell, M.: Scan design and secure chip. In: IOLTS, vol. 4, pp. 219–224 (2004)

    Google Scholar 

  2. John, P.K.: BIST architecture for multiple RAMs in SoC. Proc. Comput. Sci. 115, 159–165 (2017)

    Article  Google Scholar 

  3. Haridas, N., Nirmala Devi, M.: Efficient linear feedback shift register design for pseudo exhaustive test generation. In: BIST 3rd IEEE International Conference Electronics Computer Technology (ICECT), vol. 1 (2011)

    Google Scholar 

  4. Shaer, L., et al.: A low power reconfigurable LFSR. In: 18th Mediterranean IEEE Electrotechnical Conference (MELECON) (2016)

    Google Scholar 

  5. Shiny, M.I., Nirmala, D.M.: LFSR based secured scan design testability techniques. Proc. Comput. Sci. 115, 174–181 (2017)

    Article  Google Scholar 

  6. Suh, G.E., Clarke, D., Gassend, B., van Dijk, M., Devadas, S.: Efficient memory integrity verification and encryption for secure processors. In: Proceedings of the 36th annual IEEE/ACM International Symposium on Microarchitecture, p. 339. IEEE Computer Society (2003)

    Google Scholar 

  7. Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: Physical unclonable functions and public-key crypto for FPGA IP protection. In: FPL 2007 International Conference on Field Programmable Logic and Applications, 2007, pp. 189–195. IEEE (2007)

    Google Scholar 

  8. Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th annual Design Automation Conference, DAC ’07 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. I. Shiny .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shiny, M.I., Reshma, R., Ross, S., John, S., Sreevidya, R., Moothedeth, S. (2019). Security Systems in Design for Testing. In: Wang, J., Reddy, G., Prasad, V., Reddy, V. (eds) Soft Computing and Signal Processing . Advances in Intelligent Systems and Computing, vol 898. Springer, Singapore. https://doi.org/10.1007/978-981-13-3393-4_51

Download citation

Publish with us

Policies and ethics