首页 > 最新文献

2020 IEEE European Test Symposium (ETS)最新文献

英文 中文
Device-Aware Test for Emerging Memories: Enabling Your Test Program for DPPB Level 新兴存储器的设备感知测试:启用DPPB级别的测试程序
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131559
Lizhou Wu, M. Fieback, M. Taouil, S. Hamdioui
This paper introduces a new test approach: device-aware test (DAT) for emerging memory technologies such as MRAM, RRAM, and PCM. The DAT approach enables accurate models of device defects to obtain realistic fault models, which are used to develop high-quality and optimized test solutions. This is demonstrated by an application of DAT to pinhole defects in STT-MRAMs and forming defects in RRAMs.
针对MRAM、RRAM和PCM等新兴存储技术,提出了一种新的测试方法:设备感知测试(device-aware test, DAT)。DAT方法使器件缺陷的精确模型能够获得真实的故障模型,用于开发高质量和优化的测试解决方案。这是通过应用数据对stt - mram针孔缺陷和成形缺陷的rram证明。
{"title":"Device-Aware Test for Emerging Memories: Enabling Your Test Program for DPPB Level","authors":"Lizhou Wu, M. Fieback, M. Taouil, S. Hamdioui","doi":"10.1109/ETS48528.2020.9131559","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131559","url":null,"abstract":"This paper introduces a new test approach: device-aware test (DAT) for emerging memory technologies such as MRAM, RRAM, and PCM. The DAT approach enables accurate models of device defects to obtain realistic fault models, which are used to develop high-quality and optimized test solutions. This is demonstrated by an application of DAT to pinhole defects in STT-MRAMs and forming defects in RRAMs.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122927186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling Static Noise Margin for FinFET based SRAM PUFs 基于FinFET的SRAM puf静态噪声裕度建模
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131583
S. Masoumian, G. Selimis, Roel Maes, G. Schrijen, S. Hamdioui, M. Taouil
In this paper, we develop an analytical PUF model based on a compact FinFET transistor model that calculates the PUF stability (i.e. PUF static noise margin (PSNM)) for FinFET based SRAMs. The model enables a quick design space exploration and may be used to identify critical parameters that affect the PSNM. The analytical model is validated with SPICE simulations. In our experiments, we analyze the impact of process variation, technology, and temperature on the PSNM. The results show that the analytical model matches very well with the simulation model. From the experiments we conclude the following: (1) nFET variations have a larger impact on the PSNM than pFET (1.5% higher PSNM in nFET variations than pFET variations at 25°C), (2) high performance SRAM cells are more skewed (1.3% higher PSNM) (3) the reproducibility increases with smaller technology nodes (0.8% PSNM increase from 20 to 14 nm) (4) increasing the temperature from −10°C to 120°C leads to a PSNM change of approximately 1.0% for an extreme nFET channel length.
在本文中,我们基于紧凑的FinFET晶体管模型开发了一个分析PUF模型,该模型计算了基于FinFET的sram的PUF稳定性(即PUF静态噪声裕度(PSNM))。该模型能够快速探索设计空间,并可用于识别影响PSNM的关键参数。通过SPICE仿真对分析模型进行了验证。在实验中,我们分析了工艺变化、技术和温度对PSNM的影响。结果表明,解析模型与仿真模型吻合较好。从实验我们得出结论如下:(1)场效应电晶体变化有更大的影响比pFET PSNM PSNM场效应电晶体的变化(1.5%高于pFET变化25°C),(2)高性能SRAM细胞更倾斜(PSNM高出1.3%)(3)再现性增加较小的技术节点(0.8% PSNM从20增加到14海里)(4)增加温度从−10°C到120°C会导致PSNM变化约1.0%的极端场效应电晶体通道长度。
{"title":"Modeling Static Noise Margin for FinFET based SRAM PUFs","authors":"S. Masoumian, G. Selimis, Roel Maes, G. Schrijen, S. Hamdioui, M. Taouil","doi":"10.1109/ETS48528.2020.9131583","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131583","url":null,"abstract":"In this paper, we develop an analytical PUF model based on a compact FinFET transistor model that calculates the PUF stability (i.e. PUF static noise margin (PSNM)) for FinFET based SRAMs. The model enables a quick design space exploration and may be used to identify critical parameters that affect the PSNM. The analytical model is validated with SPICE simulations. In our experiments, we analyze the impact of process variation, technology, and temperature on the PSNM. The results show that the analytical model matches very well with the simulation model. From the experiments we conclude the following: (1) nFET variations have a larger impact on the PSNM than pFET (1.5% higher PSNM in nFET variations than pFET variations at 25°C), (2) high performance SRAM cells are more skewed (1.3% higher PSNM) (3) the reproducibility increases with smaller technology nodes (0.8% PSNM increase from 20 to 14 nm) (4) increasing the temperature from −10°C to 120°C leads to a PSNM change of approximately 1.0% for an extreme nFET channel length.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124208647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Variation-Aware Defect Characterization at Cell Level 细胞水平上的变异感知缺陷表征
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131600
Zahra Paria Najafi-Haghi, Marzieh Hashemipour-Nazari, H. Wunderlich
Small Delay Faults (SDFs) are an indicator of reliability threats even if they do not affect the behavior of a system at nominal speed. Various defects may evolve over time into a complete system failure, and defects have to be distinguished from delays due to process variations which also change the circuit timing but are benign. Based on Monte-Carlo electrical simulation at cell level, in this work it is shown that a few measurements at different operating points of voltage and frequency are sufficient to identify a defect cell even if its behavior is completely within the specification range. The developed classifier is based on statistical learning and can be annotated to each element of a cell library to support manufacturing test, diagnosis and optimizing the burn-in process or yield.
小延迟故障(sdf)是可靠性威胁的指示器,即使它们不影响系统在标称速度下的行为。随着时间的推移,各种缺陷可能演变成一个完整的系统故障,并且必须将缺陷与由工艺变化引起的延迟区分开来,工艺变化也会改变电路定时,但这是良性的。基于在电池水平上的蒙特卡罗电模拟,在这项工作中表明,在电压和频率的不同工作点上进行一些测量足以识别缺陷电池,即使其行为完全在规范范围内。所开发的分类器基于统计学习,可以注释到细胞库的每个元素,以支持制造测试、诊断和优化老化过程或产量。
{"title":"Variation-Aware Defect Characterization at Cell Level","authors":"Zahra Paria Najafi-Haghi, Marzieh Hashemipour-Nazari, H. Wunderlich","doi":"10.1109/ETS48528.2020.9131600","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131600","url":null,"abstract":"Small Delay Faults (SDFs) are an indicator of reliability threats even if they do not affect the behavior of a system at nominal speed. Various defects may evolve over time into a complete system failure, and defects have to be distinguished from delays due to process variations which also change the circuit timing but are benign. Based on Monte-Carlo electrical simulation at cell level, in this work it is shown that a few measurements at different operating points of voltage and frequency are sufficient to identify a defect cell even if its behavior is completely within the specification range. The developed classifier is based on statistical learning and can be annotated to each element of a cell library to support manufacturing test, diagnosis and optimizing the burn-in process or yield.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126509768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Minimal Witnesses for Security Weaknesses in Reconfigurable Scan Networks 可重构扫描网络安全弱点的最小见证
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131566
Pascal Raiola, Tobias Paxian, B. Becker
Reconfigurable Scan Networks (RSNs) allow flexible access to embedded instruments for post-silicon validation and debug or diagnosis. However, the increased observability and controllability can be exploited by an attacker to manipulate or read out sensitive data, if no adequate precautions are taken by the designer. For large RSNs taking those precautions without algorithmic support is virtually impossible. This work proposes a method to automatically generate “minimal witnesses” demonstrating security weaknesses w.r.t. data flow in RSNs. The method provides condensed information to the designer on how to prevent data flow attacks, e.g. by locally modifying the RSN or by preventing active scan paths which contain those minimal witnesses. Experimental results confirm the applicability of the proposed method to diverse benchmark sets, including large designs. Additionally, the benefit of generating “minimal witnesses” for security weaknesses is shown.
可重构扫描网络(rsn)允许灵活访问嵌入式仪器,用于硅后验证和调试或诊断。然而,如果设计人员没有采取足够的预防措施,攻击者可以利用增加的可观察性和可控性来操纵或读出敏感数据。对于大型rsn来说,在没有算法支持的情况下采取这些预防措施实际上是不可能的。这项工作提出了一种自动生成“最小证人”的方法,该方法可以在rsn中的数据流中显示安全弱点。该方法为设计人员提供了关于如何防止数据流攻击的简明信息,例如,通过本地修改RSN或通过阻止包含这些最小证人的活动扫描路径。实验结果证实了该方法适用于各种基准集,包括大型设计。此外,还显示了为安全性弱点生成“最小见证”的好处。
{"title":"Minimal Witnesses for Security Weaknesses in Reconfigurable Scan Networks","authors":"Pascal Raiola, Tobias Paxian, B. Becker","doi":"10.1109/ETS48528.2020.9131566","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131566","url":null,"abstract":"Reconfigurable Scan Networks (RSNs) allow flexible access to embedded instruments for post-silicon validation and debug or diagnosis. However, the increased observability and controllability can be exploited by an attacker to manipulate or read out sensitive data, if no adequate precautions are taken by the designer. For large RSNs taking those precautions without algorithmic support is virtually impossible. This work proposes a method to automatically generate “minimal witnesses” demonstrating security weaknesses w.r.t. data flow in RSNs. The method provides condensed information to the designer on how to prevent data flow attacks, e.g. by locally modifying the RSN or by preventing active scan paths which contain those minimal witnesses. Experimental results confirm the applicability of the proposed method to diverse benchmark sets, including large designs. Additionally, the benefit of generating “minimal witnesses” for security weaknesses is shown.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128534130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IEEE Std. P1687.1 for Access Control of Reconfigurable Scan Networks 可重构扫描网络访问控制的IEEE Std. P1687.1
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131555
E. Larsson, Zehang Xiang, P. Murali
We address access control of reconfigurable scan networks, like IEEE Std. 1687 networks. We propose an on-chip test block to perform: (1) test for faulty scan-chains, (2) localization of faulty scan-chains and (3) repair by excluding faulty scan-chains, and an access control block to (1) control so scan-chains (instruments) are only accessed in allowed combinations, (2) detection of access attempts to instrument in not allowed combinations, and (3) monitoring how theses attempts are made. The key features are two-fold. First, in respect to operation and maintenance. If the physical implementation of an IEEE Std. 1687 network changes due to faults, the instrument connectivity language (ICL) and procedural description language (PDL) need to be updated. To avoid keeping track and updating ICL and PDL for each individual integrated circuit (IC), proposed test block, placed at each IC, makes adjustments of PDL according to the faults of the particular IC. Second, a centralized access control block with key information about the network to detect and handle unauthorized access.
我们解决了可重构扫描网络的访问控制,如IEEE标准1687网络。我们提出了一个片上测试块来执行:(1)对故障扫描链进行测试,(2)对故障扫描链进行定位,(3)通过排除故障扫描链进行修复,以及一个访问控制块来(1)控制扫描链(仪器)仅在允许的组合中访问,(2)检测在不允许的组合中访问仪器的尝试,以及(3)监控这些尝试是如何进行的。其主要特点有两个方面。首先,在操作和维护方面。如果IEEE Std. 1687网络的物理实现因故障而改变,则需要更新仪器连接语言(ICL)和过程描述语言(PDL)。为了避免跟踪和更新每个单独集成电路(IC)的ICL和PDL,建议在每个IC上放置测试块,根据特定IC的故障对PDL进行调整。第二,一个集中的访问控制块,包含网络的关键信息,以检测和处理未经授权的访问。
{"title":"IEEE Std. P1687.1 for Access Control of Reconfigurable Scan Networks","authors":"E. Larsson, Zehang Xiang, P. Murali","doi":"10.1109/ETS48528.2020.9131555","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131555","url":null,"abstract":"We address access control of reconfigurable scan networks, like IEEE Std. 1687 networks. We propose an on-chip test block to perform: (1) test for faulty scan-chains, (2) localization of faulty scan-chains and (3) repair by excluding faulty scan-chains, and an access control block to (1) control so scan-chains (instruments) are only accessed in allowed combinations, (2) detection of access attempts to instrument in not allowed combinations, and (3) monitoring how theses attempts are made. The key features are two-fold. First, in respect to operation and maintenance. If the physical implementation of an IEEE Std. 1687 network changes due to faults, the instrument connectivity language (ICL) and procedural description language (PDL) need to be updated. To avoid keeping track and updating ICL and PDL for each individual integrated circuit (IC), proposed test block, placed at each IC, makes adjustments of PDL according to the faults of the particular IC. Second, a centralized access control block with key information about the network to detect and handle unauthorized access.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128849975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Failure and Attack Detection by Digital Sensors 数字传感器的故障和攻击检测
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131580
Md Toufiq Hasan Anik, Rachit Saini, J. Danger, S. Guilley, Naghmeh Karimi
Timely notification of abnormal behaviors is essential in strategic systems requiring a high level of safety and security. Sensing environmental conditions to ensure that the device is not operating out-of-specifications is highly useful in detecting anomalies caused by failures or malevolent actions. Digital sensors consider the operating environmental conditions as a whole, i.e. they are sensitive to temperature, voltage and process altogether, without precise knowledge about each. This paper proposes a low-cost digital sensor that can detect system failures accurately in the designer's preferable range of operating conditions. Our experimental results show the high accuracy of this sensor in detecting circuits failure which occurred due to change of the operating temperature and supply voltage.
在需要高度安全和保障的战略系统中,及时通知异常行为是必不可少的。感知环境条件以确保设备没有超出规格,这对于检测由故障或恶意行为引起的异常非常有用。数字传感器将操作环境条件作为一个整体来考虑,即它们对温度、电压和过程都很敏感,而对每一个都没有精确的了解。本文提出了一种低成本的数字传感器,可以在设计人员理想的工作条件范围内准确检测系统故障。实验结果表明,该传感器对工作温度和电源电压变化引起的电路故障具有较高的检测精度。
{"title":"Failure and Attack Detection by Digital Sensors","authors":"Md Toufiq Hasan Anik, Rachit Saini, J. Danger, S. Guilley, Naghmeh Karimi","doi":"10.1109/ETS48528.2020.9131580","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131580","url":null,"abstract":"Timely notification of abnormal behaviors is essential in strategic systems requiring a high level of safety and security. Sensing environmental conditions to ensure that the device is not operating out-of-specifications is highly useful in detecting anomalies caused by failures or malevolent actions. Digital sensors consider the operating environmental conditions as a whole, i.e. they are sensitive to temperature, voltage and process altogether, without precise knowledge about each. This paper proposes a low-cost digital sensor that can detect system failures accurately in the designer's preferable range of operating conditions. Our experimental results show the high accuracy of this sensor in detecting circuits failure which occurred due to change of the operating temperature and supply voltage.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121532704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Half Title 半标题
Pub Date : 2020-05-01 DOI: 10.1109/ets48528.2020.9131561
Anonymous
{"title":"Half Title","authors":"Anonymous","doi":"10.1109/ets48528.2020.9131561","DOIUrl":"https://doi.org/10.1109/ets48528.2020.9131561","url":null,"abstract":"","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"30 25","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141207530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anomaly Detection in Embedded Systems Using Power and Memory Side Channels 基于电源和内存侧通道的嵌入式系统异常检测
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131596
Jiho Park, Virinchi Roy Surabhi, P. Krishnamurthy, S. Garg, R. Karri, F. Khorrami
We propose multi-modal anomaly detection in embedded systems using time-correlated measurements of power consumption and memory accesses. Time series of power consumption of the processor and memory accesses between L2 cache and memory bus under known-good conditions are used to train one-class support vector machine (SVM) and isolation forest classifiers. These side channels have complementary anomaly detection capabilities. Experiments on a high-fidelity processor emulator show that the method accurately detects anomalies.
我们提出在嵌入式系统中使用功耗和内存访问的时间相关测量的多模态异常检测。利用已知良好条件下处理器功耗和L2缓存与内存总线之间内存访问的时间序列来训练一类支持向量机(SVM)和隔离森林分类器。这些侧信道具有互补的异常检测能力。在高保真处理器仿真器上的实验表明,该方法能够准确地检测出异常。
{"title":"Anomaly Detection in Embedded Systems Using Power and Memory Side Channels","authors":"Jiho Park, Virinchi Roy Surabhi, P. Krishnamurthy, S. Garg, R. Karri, F. Khorrami","doi":"10.1109/ETS48528.2020.9131596","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131596","url":null,"abstract":"We propose multi-modal anomaly detection in embedded systems using time-correlated measurements of power consumption and memory accesses. Time series of power consumption of the processor and memory accesses between L2 cache and memory bus under known-good conditions are used to train one-class support vector machine (SVM) and isolation forest classifiers. These side channels have complementary anomaly detection capabilities. Experiments on a high-fidelity processor emulator show that the method accurately detects anomalies.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114633427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs 外包的风险:第三方ip核中隐藏的SCA木马威胁加密ic
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131594
David Knichel, Thorben Moos, A. Moradi
Side-channel analysis (SCA) attacks - especially power analysis - are powerful ways to extract the secrets stored in and processed by cryptographic devices. In recent years, researchers have shown interest in utilizing on-chip measurement facilities to perform such SCA attacks remotely. It was shown that simple voltage-monitoring sensors can be constructed from digital elements and put on multi-tenant FPGAs to perform remote attacks on neighbouring cryptographic co-processors. A similar threat is the unsuspecting integration of third-party IP-Cores into an IC design. Even if the function of an acquired IP-Core is not security critical by itself, it may contain an on-chip sensor as a Trojan that can eavesdrop on cryptographic operations across the whole device. In contrast to all FPGA-based investigations reported in the literature so far, we examine the efficiency of such on-chip sensors as a source of information leakage in an ASIC-based case study for the first time. To this end, in addition to a cryptographic core (lightweight block cipher PRESENT) we designed and implemented a voltage-monitoring sensor on an ASIC fabricated by a 40 nm commercial standard cell library. Despite the physical distance between the sensor and the PRESENT core, we show the possibility of fully recovering the secret key of the PRESENT core by processing the sensor's output. Our results imply that the hidden insertion of such a sensor - for example by a malicious third party IP-Core vendor - can endanger the security of embedded systems which deal with sensitive information, even if the device cannot be physically accessed by the adversary.
侧信道分析(SCA)攻击——尤其是功率分析——是提取存储在加密设备中并由其处理的秘密的强大方法。近年来,研究人员对利用片上测量设备远程执行此类SCA攻击表现出了兴趣。结果表明,简单的电压监测传感器可以由数字元件构成,并置于多租户fpga上,对邻近的加密协处理器进行远程攻击。类似的威胁是将第三方ip核毫无防备地集成到IC设计中。即使获得的ip核的功能本身不是安全关键,它也可能包含片上传感器作为特洛伊木马,可以窃听整个设备的加密操作。与迄今为止文献中报道的所有基于fpga的调查相反,我们首次在基于asic的案例研究中研究了这种片上传感器作为信息泄漏源的效率。为此,除了加密核心(轻量级分组密码PRESENT)外,我们还在40 nm商用标准单元库制造的ASIC上设计并实现了电压监测传感器。尽管传感器和PRESENT核心之间存在物理距离,但我们展示了通过处理传感器的输出完全恢复PRESENT核心密钥的可能性。我们的研究结果表明,这种传感器的隐藏插入-例如由恶意的第三方IP-Core供应商-可能危及处理敏感信息的嵌入式系统的安全,即使设备不能被对手物理访问。
{"title":"The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs","authors":"David Knichel, Thorben Moos, A. Moradi","doi":"10.1109/ETS48528.2020.9131594","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131594","url":null,"abstract":"Side-channel analysis (SCA) attacks - especially power analysis - are powerful ways to extract the secrets stored in and processed by cryptographic devices. In recent years, researchers have shown interest in utilizing on-chip measurement facilities to perform such SCA attacks remotely. It was shown that simple voltage-monitoring sensors can be constructed from digital elements and put on multi-tenant FPGAs to perform remote attacks on neighbouring cryptographic co-processors. A similar threat is the unsuspecting integration of third-party IP-Cores into an IC design. Even if the function of an acquired IP-Core is not security critical by itself, it may contain an on-chip sensor as a Trojan that can eavesdrop on cryptographic operations across the whole device. In contrast to all FPGA-based investigations reported in the literature so far, we examine the efficiency of such on-chip sensors as a source of information leakage in an ASIC-based case study for the first time. To this end, in addition to a cryptographic core (lightweight block cipher PRESENT) we designed and implemented a voltage-monitoring sensor on an ASIC fabricated by a 40 nm commercial standard cell library. Despite the physical distance between the sensor and the PRESENT core, we show the possibility of fully recovering the secret key of the PRESENT core by processing the sensor's output. Our results imply that the hidden insertion of such a sensor - for example by a malicious third party IP-Core vendor - can endanger the security of embedded systems which deal with sensitive information, even if the device cannot be physically accessed by the adversary.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114893796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Linking Chip, Board, and System Test via Standards 通过标准连接芯片、板和系统测试
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131595
M. Portolan, J. Rearick, Martin Keim
This paper introduces a standards-based framework which enables two types of test re-use: direct re-use of test patterns written for low-level components of a system, and access by high-level tests of test features embedded within the low-level components. The underlying mechanism for both is the encapsulation, retargeting, and transformation of test procedures through successive layers of hardware interfaces, as codified in two standards being developed by IEEE Working Groups (P1687.1 and P2654). Examples demonstrate the steps in the process and illustrate both the challenges and opportunities of this approach.
本文介绍了一个基于标准的框架,它支持两种类型的测试重用:直接重用为系统的低级组件编写的测试模式,以及通过高级测试访问嵌入在低级组件中的测试特性。两者的底层机制都是封装、重新定位,以及通过硬件接口的连续层对测试过程进行转换,正如IEEE工作组(P1687.1和P2654)正在开发的两个标准所编写的那样。示例演示了流程中的步骤,并说明了这种方法的挑战和机遇。
{"title":"Linking Chip, Board, and System Test via Standards","authors":"M. Portolan, J. Rearick, Martin Keim","doi":"10.1109/ETS48528.2020.9131595","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131595","url":null,"abstract":"This paper introduces a standards-based framework which enables two types of test re-use: direct re-use of test patterns written for low-level components of a system, and access by high-level tests of test features embedded within the low-level components. The underlying mechanism for both is the encapsulation, retargeting, and transformation of test procedures through successive layers of hardware interfaces, as codified in two standards being developed by IEEE Working Groups (P1687.1 and P2654). Examples demonstrate the steps in the process and illustrate both the challenges and opportunities of this approach.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122372973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2020 IEEE European Test Symposium (ETS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1