Protecting chip settings using secured scan chains

作者: Benedikt Geukes , Bodo Hoppe , Matteo Michel , Juergen Wakunda

DOI:

关键词:

摘要: Some embodiments include a method for processing scan chain in an integrated circuit. The can include: receiving, the circuit, chain, wherein includes secret key pattern; separating pattern from chain; comparing to reference determining, based on pattern, that does not match and generating signal indicating pattern.

参考文章(20)
Benedikt Geukes, Matteo Michel, Carsten Schmitt, Manfred H. Walz, Verifying and detecting boundary scan cells to input/output mapping ,(2011)
Peter J. Vigil, Louis S. Lederer, James S. Blomgren, Self-testing multi-processor die with internal compare points ,(1996)
Pushpasheel Tawade, Rosa M. Y. Chow, Neil G. Jacobson, Sanjay Srivastava, Bin Dai, Emigdio M. Flores, Sungnien Jerry Mao, Identification of multi-device systems ,(2004)
Sumit Dasgupta, Prabhakar Goel, Thomas W. Williams, Level sensitive scan design (LSSD) system ,(1979)
J. Lee, M. Tehranipoor, C. Patel, J. Plusquellic, Securing Scan Design Using Lock and Key Technique defect and fault tolerance in vlsi and nanotechnology systems. pp. 51- 62 ,(2005) , 10.1109/DFTVS.2005.58
D. Mukhopadhyay, S. Banerjee, D. RoyChowdhury, B.B. Bhattacharya, CryptoScan: A Secured Scan Chain Architecture asian test symposium. pp. 348- 353 ,(2005) , 10.1109/ATS.2005.42