首页 > 最新文献

2020 IEEE European Test Symposium (ETS)最新文献

英文 中文
Tightening the Mesh Size of the Cell-Aware ATPG Net for Catching All Detectable Weakest Faults 收紧单元感知ATPG网的网格尺寸以捕获所有可检测的最弱故障
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131567
Min-Chun Hu, Zhan Gao, Santosh Malagi, J. Swenton, J. Huisken, K. Goossens, Cheng-Wen Wu, E. Marinissen
Cell-aware test (CAT) explicitly targets faults caused by cell-internal short and open defects and has been shown to significantly reduce test escape rates. CAT library cell characterization is typically done for only two defect resistance values: one representing hard opens and another one representing hard shorts. In this paper, similar to fishermen tightening the mesh size of their nets to catch small fish, we perform library characterization as efficiently as possible for a set of resistances representing increasingly weaker defects, and then adjust our ATPG flow to explicitly target faults caused by the weakest still-detectable variant of each potential defect. We implemented this novel approach in an experimental ATPG tool flow script, using functions of Cadence's Modus as building blocks. To assess the effectiveness of our approach, we formulate a new dedicated test metric: the weakest fault coverage wfc. Compared to conventional CAT targeting hard defects only, experimental results show that our new approach enhances detection of weakest faults and significantly reduces wfc escapes =1-wfc, while maintaining its original (hard-defect) fault coverage fc, of course at the expense of (acceptable) increases in the required number of test patterns and associated test generation time.
细胞感知测试(CAT)明确针对由细胞内部短路和开放缺陷引起的故障,并已被证明可以显着降低测试逃逸率。CAT库单元表征通常只针对两个缺陷电阻值进行:一个代表硬打开,另一个代表硬短路。在本文中,类似于渔民收紧网眼尺寸以捕获小鱼,我们尽可能有效地对一组代表越来越弱缺陷的阻力进行库表征,然后调整我们的ATPG流以明确地针对由每个潜在缺陷的最弱仍可检测的变体引起的故障。我们在实验性的ATPG工具流脚本中实现了这种新颖的方法,使用Cadence的Modus功能作为构建块。为了评估我们方法的有效性,我们制定了一个新的专用测试度量:最弱故障覆盖率wfc。与仅针对硬缺陷的传统CAT相比,实验结果表明,我们的新方法增强了对最弱故障的检测,并显着降低了wfc逃逸=1-wfc,同时保持了其原始(硬缺陷)故障覆盖率fc,当然代价是所需的测试模式数量和相关测试生成时间(可接受的)增加。
{"title":"Tightening the Mesh Size of the Cell-Aware ATPG Net for Catching All Detectable Weakest Faults","authors":"Min-Chun Hu, Zhan Gao, Santosh Malagi, J. Swenton, J. Huisken, K. Goossens, Cheng-Wen Wu, E. Marinissen","doi":"10.1109/ETS48528.2020.9131567","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131567","url":null,"abstract":"Cell-aware test (CAT) explicitly targets faults caused by cell-internal short and open defects and has been shown to significantly reduce test escape rates. CAT library cell characterization is typically done for only two defect resistance values: one representing hard opens and another one representing hard shorts. In this paper, similar to fishermen tightening the mesh size of their nets to catch small fish, we perform library characterization as efficiently as possible for a set of resistances representing increasingly weaker defects, and then adjust our ATPG flow to explicitly target faults caused by the weakest still-detectable variant of each potential defect. We implemented this novel approach in an experimental ATPG tool flow script, using functions of Cadence's Modus as building blocks. To assess the effectiveness of our approach, we formulate a new dedicated test metric: the weakest fault coverage wfc. Compared to conventional CAT targeting hard defects only, experimental results show that our new approach enhances detection of weakest faults and significantly reduces wfc escapes =1-wfc, while maintaining its original (hard-defect) fault coverage fc, of course at the expense of (acceptable) increases in the required number of test patterns and associated test generation time.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128225161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Dynamic Authentication-Based Secure Access to Test Infrastructure 基于动态身份验证的测试基础设施安全访问
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131571
M. Portolan, Vincent Reynaud, P. Maistri, R. Leveugle
The complexity of modern Systems-on-Chips is steadily increasing, which poses hard challenges for testing. In order to be able to face those challenges, several standards have been proposed through history, such as the latest IEEE 1687 on Reconfigurable Scan Networks (RSNs), which allows dynamic configuration of the test infrastructure for an easier access to embedded instruments and data. This ease of access, however, may constitute a serious threat from the point of view of security, as it may be used by an attacker as an entry point to the internal state of the circuit, especially if the test infrastructure is reused for life-time testing. Some approaches exist to protect the access, but their performances and security levels are limited by the legacy view of test as a static process. In this paper, we propose an innovative solution that exploits the dynamic nature of the IEEE 1687 standard to obtain an Authentication-based Secure Access framework able to provide a trusted and personalized interface to the test infrastructure depending on user-defined security levels.
现代片上系统的复杂性正在稳步增长,这给测试带来了严峻的挑战。为了能够面对这些挑战,历史上已经提出了几个标准,例如最新的IEEE 1687关于可重构扫描网络(rsn),它允许动态配置测试基础设施,以便更容易地访问嵌入式仪器和数据。然而,从安全性的角度来看,这种访问的便利性可能构成严重的威胁,因为它可能被攻击者用作进入电路内部状态的入口点,特别是如果测试基础结构被重用用于终身测试的话。存在一些方法来保护访问,但是它们的性能和安全级别受到作为静态过程的测试的遗留视图的限制。在本文中,我们提出了一个创新的解决方案,利用IEEE 1687标准的动态特性来获得一个基于身份验证的安全访问框架,该框架能够根据用户定义的安全级别为测试基础设施提供可信和个性化的接口。
{"title":"Dynamic Authentication-Based Secure Access to Test Infrastructure","authors":"M. Portolan, Vincent Reynaud, P. Maistri, R. Leveugle","doi":"10.1109/ETS48528.2020.9131571","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131571","url":null,"abstract":"The complexity of modern Systems-on-Chips is steadily increasing, which poses hard challenges for testing. In order to be able to face those challenges, several standards have been proposed through history, such as the latest IEEE 1687 on Reconfigurable Scan Networks (RSNs), which allows dynamic configuration of the test infrastructure for an easier access to embedded instruments and data. This ease of access, however, may constitute a serious threat from the point of view of security, as it may be used by an attacker as an entry point to the internal state of the circuit, especially if the test infrastructure is reused for life-time testing. Some approaches exist to protect the access, but their performances and security levels are limited by the legacy view of test as a static process. In this paper, we propose an innovative solution that exploits the dynamic nature of the IEEE 1687 standard to obtain an Authentication-based Secure Access framework able to provide a trusted and personalized interface to the test infrastructure depending on user-defined security levels.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128651318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Blank Page 空白页
Pub Date : 2020-05-01 DOI: 10.1109/ets48528.2020.9131589
{"title":"Blank Page","authors":"","doi":"10.1109/ets48528.2020.9131589","DOIUrl":"https://doi.org/10.1109/ets48528.2020.9131589","url":null,"abstract":"","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131219025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design Obfuscation versus Test 设计混淆与测试
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131590
Farimah Farahmandi, O. Sinanoglu, R. D. Blanton, S. Pagliarini
The current state of the integrated circuit (IC) ecosystem is that only a handful of foundries are at the forefront, continuously pushing the state of the art in transistor miniaturization. Establishing and maintaining a FinFET-capable foundry is a billion dollar endeavor. This scenario dictates that many companies and governments have to develop their systems and products by relying on 3rd party IC fabrication. The major caveat within this practice is that the procured silicon cannot be blindly trusted: a malicious foundry can effectively modify the layout of the IC, reverse engineer its IPs, and overproduce the entire chip. The Hardware Security community has proposed many countermeasures to these threats. Notably, obfuscation has gained a lot of traction - here, the intent is to hide the functionality from the untrusted foundry such that the aforementioned threats are hindered or mitigated. In this paper, we summarize the research efforts of three independent research groups towards achieving trustworthy ICs, even when fabricated in untrusted offshore foundries. We extensively address the use of logic locking and its many variants, as well as the use of high-level synthesis (HLS) as an obfuscation approach of its own.
集成电路(IC)生态系统的现状是,只有少数几家代工厂走在前列,不断推动晶体管小型化的最新技术。建立和维护一个具有finfet能力的晶圆厂是一项耗资数十亿美元的努力。这种情况决定了许多公司和政府必须依靠第三方IC制造来开发他们的系统和产品。这种做法的主要警告是,所获得的硅不能盲目信任:恶意的代工厂可以有效地修改IC的布局,对其ip进行逆向工程,并过量生产整个芯片。硬件安全社区针对这些威胁提出了许多对策。值得注意的是,混淆已经获得了很多关注——在这里,其目的是对不受信任的代工厂隐藏功能,从而阻止或减轻上述威胁。在本文中,我们总结了三个独立研究小组的研究成果,以实现可信赖的集成电路,即使是在不可信的离岸代工厂制造。我们广泛地讨论了逻辑锁定及其许多变体的使用,以及高级综合(HLS)作为其自身的混淆方法的使用。
{"title":"Design Obfuscation versus Test","authors":"Farimah Farahmandi, O. Sinanoglu, R. D. Blanton, S. Pagliarini","doi":"10.1109/ETS48528.2020.9131590","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131590","url":null,"abstract":"The current state of the integrated circuit (IC) ecosystem is that only a handful of foundries are at the forefront, continuously pushing the state of the art in transistor miniaturization. Establishing and maintaining a FinFET-capable foundry is a billion dollar endeavor. This scenario dictates that many companies and governments have to develop their systems and products by relying on 3rd party IC fabrication. The major caveat within this practice is that the procured silicon cannot be blindly trusted: a malicious foundry can effectively modify the layout of the IC, reverse engineer its IPs, and overproduce the entire chip. The Hardware Security community has proposed many countermeasures to these threats. Notably, obfuscation has gained a lot of traction - here, the intent is to hide the functionality from the untrusted foundry such that the aforementioned threats are hindered or mitigated. In this paper, we summarize the research efforts of three independent research groups towards achieving trustworthy ICs, even when fabricated in untrusted offshore foundries. We extensively address the use of logic locking and its many variants, as well as the use of high-level synthesis (HLS) as an obfuscation approach of its own.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130081585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defect Characterization and Test Generation for Spintronic-based Compute-In-Memory 基于自旋电子学的内存计算缺陷表征与测试生成
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131582
S. Nair, Christopher Münch, M. Tahoori
Spin Transfer Torque Magnetic Random Access Memory (STT-MRAM), as one of the most promising emerging memory technology for on-chip memory, offers many advantageous features such as high density, non-volatility, scalability, high endurance and CMOS compatibility. Additionally, its resistive storage concept can be utilized for Compute-in-Memory (CiM), where bit-wise logical operations can be performed within the memory without the need for transferring the data from the memory to the processor and back. However, these new CiM operations are impacted by defects, resulting in faults which are different from the conventional memory faults. Hence, these CiM specific faults need to be modeled and appropriate test strategies need to be derived to ensure correct functionality of the CiM enabled memories. In this paper, we first perform extensive defect injection in the CiM bit-cell and build fault models based on the impact of the defects. We also compare CiM specific faults to normal memory faults based on this technology. From this model, we derive an efficient test algorithm to fully cover CiM related faults, which cannot be found with conventional memory test algorithms.
自旋转移转矩磁随机存取存储器(STT-MRAM)作为片上存储器中最有前途的新兴存储技术之一,具有高密度、非易失性、可扩展性、高耐用性和CMOS兼容性等优点。此外,它的电阻式存储概念可以用于内存计算(CiM),在内存中可以执行按位逻辑操作,而不需要将数据从内存传输到处理器并返回。但是,这些新的CiM操作会受到缺陷的影响,导致与传统内存故障不同的故障。因此,需要对这些CiM特定的错误进行建模,并且需要派生适当的测试策略,以确保启用CiM的内存具有正确的功能。本文首先在CiM位单元中进行了广泛的缺陷注入,并基于缺陷的影响建立了故障模型。并将CiM特定故障与普通内存故障进行比较。基于该模型,我们推导出一种有效的测试算法,可以完全覆盖CiM相关的故障,而传统的内存测试算法无法发现这些故障。
{"title":"Defect Characterization and Test Generation for Spintronic-based Compute-In-Memory","authors":"S. Nair, Christopher Münch, M. Tahoori","doi":"10.1109/ETS48528.2020.9131582","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131582","url":null,"abstract":"Spin Transfer Torque Magnetic Random Access Memory (STT-MRAM), as one of the most promising emerging memory technology for on-chip memory, offers many advantageous features such as high density, non-volatility, scalability, high endurance and CMOS compatibility. Additionally, its resistive storage concept can be utilized for Compute-in-Memory (CiM), where bit-wise logical operations can be performed within the memory without the need for transferring the data from the memory to the processor and back. However, these new CiM operations are impacted by defects, resulting in faults which are different from the conventional memory faults. Hence, these CiM specific faults need to be modeled and appropriate test strategies need to be derived to ensure correct functionality of the CiM enabled memories. In this paper, we first perform extensive defect injection in the CiM bit-cell and build fault models based on the impact of the defects. We also compare CiM specific faults to normal memory faults based on this technology. From this model, we derive an efficient test algorithm to fully cover CiM related faults, which cannot be found with conventional memory test algorithms.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130514476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Avoiding Mixed-Signal Field Returns by Outlier Detection of Hard-to-Detect Defects based on Multivariate Statistics 基于多元统计的难以检测缺陷的离群值检测避免混合信号场返回
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131602
Nektar Xama, Jakob Raymaekers, M. Andraud, Jhon Gomez, Wim Dobbelaere, Ronny Vanhooren, Anthony Coyette, G. Gielen
With tightening automotive IC production test requirements, test escape rates need to decrease down to the 10 PPB level. To achieve this for mixed-signal ICs, advanced multivariate statistical techniques are needed, as the defects in the test escapes become increasingly more difficult to detect. Therefore, this paper proposes applying a cascade of advanced statistical techniques to identify measurements that can be used as predictors to flag future potential failures at test time with minimal misclassification of good devices. The approach uses measurement data from the ATE wafer probe tests and is also able to identify the likely location of the defect using only these measurements. The cascade has four steps: 1) remove bias and spatial patterns within the data, 2) divide the different tests into relevant groups, 3) reduce the dimensionality of each group, and 4) perform multiple regression to find the predictor values and use these values to compute an outlier score for each chip under test. As there is a risk of overfitting the outlier score, the number of predictors used is kept to a minimum. The effectiveness of the proposed methodology is demonstrated using test data from an industrial production chip with eight field-return cases. Predictors have been found that retroactively allowed the identification of these chips, with an average of 5% false classification of good devices, i.e. devices not returned from the field. In addition, the selected predictors corresponded to where the defects are located according to failure analysis of the field returns.
随着汽车集成电路生产测试要求的日益严格,测试逃逸率需要降低到10 PPB的水平。为了在混合信号ic中实现这一点,需要先进的多元统计技术,因为测试逃逸中的缺陷变得越来越难以检测。因此,本文建议应用一系列先进的统计技术来识别测量,这些测量可以用作预测因子,在测试时标记未来潜在的故障,同时最小化好设备的错误分类。该方法使用来自ATE晶圆探头测试的测量数据,并且还能够仅使用这些测量来识别缺陷的可能位置。级联有四个步骤:1)消除数据中的偏差和空间模式,2)将不同的测试分为相关组,3)降低每组的维数,4)执行多元回归以找到预测值,并使用这些值计算每个被测芯片的异常值。由于存在过拟合异常值得分的风险,因此使用的预测因子的数量保持在最低限度。采用工业生产芯片的8个现场返回案例的测试数据证明了所提出方法的有效性。已经发现,预测器追溯性地允许识别这些芯片,平均有5%的良好设备错误分类,即设备未从现场返回。此外,根据现场返回的失效分析,所选择的预测因子对应于缺陷所在的位置。
{"title":"Avoiding Mixed-Signal Field Returns by Outlier Detection of Hard-to-Detect Defects based on Multivariate Statistics","authors":"Nektar Xama, Jakob Raymaekers, M. Andraud, Jhon Gomez, Wim Dobbelaere, Ronny Vanhooren, Anthony Coyette, G. Gielen","doi":"10.1109/ETS48528.2020.9131602","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131602","url":null,"abstract":"With tightening automotive IC production test requirements, test escape rates need to decrease down to the 10 PPB level. To achieve this for mixed-signal ICs, advanced multivariate statistical techniques are needed, as the defects in the test escapes become increasingly more difficult to detect. Therefore, this paper proposes applying a cascade of advanced statistical techniques to identify measurements that can be used as predictors to flag future potential failures at test time with minimal misclassification of good devices. The approach uses measurement data from the ATE wafer probe tests and is also able to identify the likely location of the defect using only these measurements. The cascade has four steps: 1) remove bias and spatial patterns within the data, 2) divide the different tests into relevant groups, 3) reduce the dimensionality of each group, and 4) perform multiple regression to find the predictor values and use these values to compute an outlier score for each chip under test. As there is a risk of overfitting the outlier score, the number of predictors used is kept to a minimum. The effectiveness of the proposed methodology is demonstrated using test data from an industrial production chip with eight field-return cases. Predictors have been found that retroactively allowed the identification of these chips, with an average of 5% false classification of good devices, i.e. devices not returned from the field. In addition, the selected predictors corresponded to where the defects are located according to failure analysis of the field returns.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126092653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hardware Trojan Attacks in Analog/Mixed-Signal ICs via the Test Access Mechanism 基于测试访问机制的模拟/混合信号ic中的硬件木马攻击
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131560
M. Elshamy, G. D. Natale, Antonios Pavlidis, M. Louërat, H. Stratigopoulos
We present a Hardware Trojan (HT) attack scenario for analog circuits. The characteristic of this HT is that it does not reside inside the victim analog circuit. Instead, it resides on an independent digital circuit on the same die where it is triggered, yet its payload is applied only to the analog circuit after being transferred via the common test infrastructure and the test interface of the analog circuit. This HT attack cannot be detected or prevented in the analog domain and it exploits the dense digital circuit to hide effectively its footprint.
提出了一种针对模拟电路的硬件木马(HT)攻击方案。该HT的特点是它不驻留在受害模拟电路内。相反,它驻留在触发它的同一芯片上的独立数字电路上,但其有效载荷在通过公共测试基础设施和模拟电路的测试接口传输后仅应用于模拟电路。这种高温攻击在模拟域无法被检测或阻止,它利用密集的数字电路有效地隐藏了其足迹。
{"title":"Hardware Trojan Attacks in Analog/Mixed-Signal ICs via the Test Access Mechanism","authors":"M. Elshamy, G. D. Natale, Antonios Pavlidis, M. Louërat, H. Stratigopoulos","doi":"10.1109/ETS48528.2020.9131560","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131560","url":null,"abstract":"We present a Hardware Trojan (HT) attack scenario for analog circuits. The characteristic of this HT is that it does not reside inside the victim analog circuit. Instead, it resides on an independent digital circuit on the same die where it is triggered, yet its payload is applied only to the analog circuit after being transferred via the common test infrastructure and the test interface of the analog circuit. This HT attack cannot be detected or prevented in the analog domain and it exploits the dense digital circuit to hide effectively its footprint.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116359249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
G-PUF: An Intrinsic PUF Based on GPU Error Signatures G-PUF:基于GPU错误签名的内在PUF
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131562
Bruno E. Forlin, R. Husemann, L. Carro, C. Reinbrecht, S. Hamdioui, M. Taouil
Physically Unclonable Functions (PUFs) are security primitives that provide trustworthy hardware for key-generation and device authentication. Among them, in contrast to dedicated PUFs, intrinsic PUFs are created from existing hardware components that exploit their variability through software. In this work we focus on GPUs and present G-PUF, a PUF implemented entirely in software on CUDA and hence does not require hardware modifications. Our results show that G-PUF has comparable characteristics to SRAM and DRAM PUFs in terms of uniformity 55.61% and reliability 90.09%.
物理不可克隆函数(puf)是为密钥生成和设备身份验证提供可靠硬件的安全原语。其中,与专用puf相比,内在puf是由现有硬件组件创建的,通过软件利用它们的可变性。在这项工作中,我们专注于gpu和G-PUF,这是一个完全在CUDA软件中实现的PUF,因此不需要硬件修改。结果表明,G-PUF的均匀性为55.61%,可靠性为90.09%,与SRAM和DRAM puf具有可比性。
{"title":"G-PUF: An Intrinsic PUF Based on GPU Error Signatures","authors":"Bruno E. Forlin, R. Husemann, L. Carro, C. Reinbrecht, S. Hamdioui, M. Taouil","doi":"10.1109/ETS48528.2020.9131562","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131562","url":null,"abstract":"Physically Unclonable Functions (PUFs) are security primitives that provide trustworthy hardware for key-generation and device authentication. Among them, in contrast to dedicated PUFs, intrinsic PUFs are created from existing hardware components that exploit their variability through software. In this work we focus on GPUs and present G-PUF, a PUF implemented entirely in software on CUDA and hence does not require hardware modifications. Our results show that G-PUF has comparable characteristics to SRAM and DRAM PUFs in terms of uniformity 55.61% and reliability 90.09%.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125422819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient Prognostication of Pattern Count with Different Input Compression Ratios 不同输入压缩比下模式计数的有效预测
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131586
Fong-Jyun Tsai, Chong-Siao Ye, Yu Huang, Kuen-Jong Lee, Wu-Tung Cheng, S. Reddy, M. Kassab, J. Rajski
A novel method to efficiently and accurately prognosticate the pattern count at different input compression ratios with the Embedded Deterministic Test (EDT) compression technology is proposed. With this method the total ATPG run time can be significantly reduced compared to the currently used trial-and-error method.
提出了一种利用嵌入式确定性测试(Embedded Deterministic Test, EDT)压缩技术高效准确地预测不同输入压缩比下的模式数的新方法。与目前使用的试错法相比,这种方法可以显著缩短ATPG的总运行时间。
{"title":"Efficient Prognostication of Pattern Count with Different Input Compression Ratios","authors":"Fong-Jyun Tsai, Chong-Siao Ye, Yu Huang, Kuen-Jong Lee, Wu-Tung Cheng, S. Reddy, M. Kassab, J. Rajski","doi":"10.1109/ETS48528.2020.9131586","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131586","url":null,"abstract":"A novel method to efficiently and accurately prognosticate the pattern count at different input compression ratios with the Embedded Deterministic Test (EDT) compression technology is proposed. With this method the total ATPG run time can be significantly reduced compared to the currently used trial-and-error method.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125157379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Functional-Like Transition Delay Fault Test-Pattern Generation using a Bayesian-Based Circuit Model 基于贝叶斯电路模型的类函数过渡延迟故障测试模式生成
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131591
Ching-Yuan Chen, C. Cheng, Jiun-Lang Huang, K. Chakrabarty
For high-performance integrated circuits with tight timing budgets, full-scan based transition delay fault (TDF) testing is mandatory to ensure high test quality. However, the discrepancy between the scan test mode and the functional mode is problematic. For example, the elevated switching activity during scan test application may degrade circuit performance and lead to overkill. In this paper, we address this problem by generating functional-like TDF test patterns. First, a Bayesian-based circuit model is constructed; the result is an enumeration of circuit states that closely mimics the functional mode. During test generation, the model guides the backtrace and fault propagation procedures more effectively than the conventional SCOAP or COP measures because reconvergent fanout is implicitly included in the model. Experimental results on processor benchmarks, including a MIPS32 and a RISC-V processor, show that the TDF test set generated using the Bayesian-based circuit model not only is more functional-like, but also achieves higher fault coverage.
对于时间预算紧张的高性能集成电路,基于全扫描的转换延迟故障(TDF)测试是保证高测试质量的必要条件。但是,扫描测试模式与功能模式之间的差异是有问题的。例如,扫描测试应用过程中的高开关活动可能会降低电路性能并导致过载。在本文中,我们通过生成类似于函数的TDF测试模式来解决这个问题。首先,构建了基于贝叶斯的电路模型;其结果是一个电路状态的枚举,与功能模式非常相似。在测试生成过程中,该模型比传统的SCOAP或COP方法更有效地指导回溯和故障传播过程,因为该模型隐式地包含了再收敛扇出。在MIPS32和RISC-V处理器的基准测试上的实验结果表明,使用基于贝叶斯的电路模型生成的TDF测试集不仅更接近功能,而且具有更高的故障覆盖率。
{"title":"Functional-Like Transition Delay Fault Test-Pattern Generation using a Bayesian-Based Circuit Model","authors":"Ching-Yuan Chen, C. Cheng, Jiun-Lang Huang, K. Chakrabarty","doi":"10.1109/ETS48528.2020.9131591","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131591","url":null,"abstract":"For high-performance integrated circuits with tight timing budgets, full-scan based transition delay fault (TDF) testing is mandatory to ensure high test quality. However, the discrepancy between the scan test mode and the functional mode is problematic. For example, the elevated switching activity during scan test application may degrade circuit performance and lead to overkill. In this paper, we address this problem by generating functional-like TDF test patterns. First, a Bayesian-based circuit model is constructed; the result is an enumeration of circuit states that closely mimics the functional mode. During test generation, the model guides the backtrace and fault propagation procedures more effectively than the conventional SCOAP or COP measures because reconvergent fanout is implicitly included in the model. Experimental results on processor benchmarks, including a MIPS32 and a RISC-V processor, show that the TDF test set generated using the Bayesian-based circuit model not only is more functional-like, but also achieves higher fault coverage.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122252616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 IEEE European Test Symposium (ETS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1