Proceedings. 15th IEEE VLSI Test Symposium (Cat. No.97TB100125)
DOI: 10.1109/vtest.1997.599434
|View full text |Cite
|
Sign up to set email alerts
|

Test methodology for embedded cores which protects intellectual property

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
15
0

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(15 citation statements)
references
References 11 publications
0
15
0
Order By: Relevance
“…The ATPG tool, ATA-LANTA [7], has been utilized for generating scan-stimuli and identifying scan-untestable faults. In this section, the encryption levels attained by the proposed methodology along with the comparisons against the core encryption technique in [5] are provided. Table 2 demonstrates the encryption levels achieved by the proposed scheme.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…The ATPG tool, ATA-LANTA [7], has been utilized for generating scan-stimuli and identifying scan-untestable faults. In this section, the encryption levels attained by the proposed methodology along with the comparisons against the core encryption technique in [5] are provided. Table 2 demonstrates the encryption levels achieved by the proposed scheme.…”
Section: Resultsmentioning
confidence: 99%
“…The gates ( , ) that happen to be on the propagation path for such faults can still be concealed with the insertion of an observation point (at the output of ¿); these observation points help contain the encryption degrading impact of the primary inputs. The technique we propose can be contrasted with previous techniques, such as [5], which fail to hide any of the gates for the example given in Figure 2. …”
Section: Symbolic Controllability Measures For Observation Point Insementioning
confidence: 99%
See 2 more Smart Citations
“…Several DFT approaches were introduced to minimize the hardware cost of the serial scan ring around a core, by using existing functional flip-flops, mixing internal and external FFs, or using compaction and expansion [4] [13]. In realistic examples often a combination of serial and parallel access cells are used for a given core, where the data patterns are applied through the serial ring, whereas the clocks and control signals are asserted via parallel access.…”
Section: Serial Scan Accessmentioning
confidence: 99%