Testing Methods for PUF-Based Secure Key Storage Circuits

被引:0
|
作者
Cortez, Mafalda [1 ]
Roelofs, Gijs [1 ]
Hamdioui, Said [1 ]
Di Natale, Giorgio [2 ]
机构
[1] Delft Univ Technol, Fac EE Math & CS, NL-2628 CD Delft, Netherlands
[2] Univ Montpellier 2, Giorgio Di Natale LIRMM, F-34392 Montpellier 5, France
关键词
PUF-based systems; Fuzzy Extractor; Secure testing; Scan-chain free testing; SCAN;
D O I
10.1007/s10836-014-5471-7
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Design for test is an integral part of any VLSI chip. However, for secure systems extra precautions have to be taken to prevent that the test circuitry could reveal secret information. This paper addresses secure test for Physical Unclonable Function based systems. It investigates two secure Built-In Self-Test (BIST) solutions for Fuzzy Extractor (FE) which is the main component of PUF-based systems. The schemes target high stuck-at-fault (SAF) coverage by performing scan-chain free functional testing, to prevent scan-chain abuse for attacks. The first scheme reuses existing FE blocks (for pattern generation and compression) to minimize the area overhead, while the second scheme tests all the FE blocks simultaneously to minimize the test time. The schemes are integrated in FE design and simulated; the results show that for the first test scheme, a SAF fault coverage of 95 % can be realized with no more than 47.1k clock cycles at the cost of a negligible area overhead of only 2.2 %; while for the second test scheme a SAF fault coverage of 95 % can be realized with 3.5k clock cycles at the cost of 18.6 % area overhead. Higher fault coverages are possible to realize at extra cost (i.e., either by extending the test time, or by adding extra hardware, or a combination of both).
引用
下载
收藏
页码:581 / 594
页数:14
相关论文
共 50 条
  • [21] A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
    Chen, Liquan
    Wang, Jinlong
    Yin, Bangwei
    Yu, Kunliang
    Han, Jinguang
    CHINA COMMUNICATIONS, 2023, 20 (05) : 198 - 216
  • [22] Cyber Security Protocol for Secure Traffic Monitoring Systems using PUF-based Key Management
    Pudi, Vikramkumar
    Bodapati, Srinivasu
    Kumar, Sachin
    Chattopadhyay, Anupam
    2020 6TH IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2020) (FORMERLY INIS), 2020, : 103 - 108
  • [23] Designing secure PUF-based authentication protocols for constrained environments
    Lee, Sang-Woong
    Safkhani, Masoumeh
    Quynh Le
    Ahmed, Omed Hassan
    Hosseinzadeh, Mehdi
    Rahmani, Amir Masoud
    Bagheri, Nasour
    SCIENTIFIC REPORTS, 2023, 13 (01):
  • [24] PUF-Based Secure Checker Protocol for Networked RFID Systems
    Ray, Biplob
    Chowdhury, Morshed
    Abawajy, Jemal
    2014 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS), 2014, : 78 - 83
  • [25] A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
    Liquan Chen
    Jinlong Wang
    Bangwei Yin
    Kunliang Yu
    Jinguang Han
    China Communications, 2023, 20 (05) : 198 - 216
  • [26] A Secure PUF-Based Unilateral Authentication Scheme for RFID System
    Maurya, Pramod Kumar
    Bagchi, Satya
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 103 (02) : 1699 - 1712
  • [27] A Secure PUF-Based Unilateral Authentication Scheme for RFID System
    Pramod Kumar Maurya
    Satya Bagchi
    Wireless Personal Communications, 2018, 103 : 1699 - 1712
  • [28] PUF-based key distribution in wireless sensor networks
    Zhang Z.
    Liu Y.
    Zuo Q.
    Harn L.
    Qiu S.
    Cheng Y.
    Computers, Materials and Continua, 2020, 64 (02): : 1261 - 1280
  • [29] A Low-overhead PUF-based Secure Scan Design
    Zhou, Wei
    Cui, Aijiao
    Chen, Cassi
    Qu, Gang
    2023 24TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED, 2023, : 210 - 215
  • [30] A novel PUF-Based key management scheme for DTMSN
    Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    J. Convergence Inf. Technol., 2012, 12 (372-381):