2015
DOI: 10.1109/tvlsi.2014.2313563
|View full text |Cite
|
Sign up to set email alerts
|

Diagnosis and Layout Aware (DLA) Scan Chain Stitching

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…The concept of a sensitive cell has been studied previously. Scan-chain reordering [ 36 , 37 ] and stitching [ 38 ] have been proposed to consider logic dependency and controllability between scan cells, where scan-chain diagnosis was improved using a circuit structure. In particular, using the fan-in and fan-out dependencies between scan cells, these methods distributed sensitive cells to other chains, thereby obtaining more clues from failure logs.…”
Section: Motivationsmentioning
confidence: 99%
“…The concept of a sensitive cell has been studied previously. Scan-chain reordering [ 36 , 37 ] and stitching [ 38 ] have been proposed to consider logic dependency and controllability between scan cells, where scan-chain diagnosis was improved using a circuit structure. In particular, using the fan-in and fan-out dependencies between scan cells, these methods distributed sensitive cells to other chains, thereby obtaining more clues from failure logs.…”
Section: Motivationsmentioning
confidence: 99%
“…Attack Infrastructure: Like other attacks on logic encryption, our proposed attack also requires an encrypted netlist and an activated IC. The attack assumes that the design contains flip-flops and the activated IC has DfT infrastructure [32], [33] (i.e. in full scan environment, all flip-flops get replaced by scan flip-flops, and are connected in a chain) for the purpose of infield testing and debugging.…”
Section: Proposed Scan Based Attack On Logic Encryptionmentioning
confidence: 99%