A Comprehensive Design-for-Test Infrastructure in the Context of Security-Critical Applications

被引:0
|
作者
Saeed, Samah Mohamed [1 ,2 ]
Sinanoglu, Ozgur [3 ,4 ]
机构
[1] Univ Washington, Inst Technol, Comp Engn, Tacoma, WA USA
[2] NYU, Polytech Sch Engn, Comp Sci & Engn, New York, NY USA
[3] NYU, Elect & Comp Engn, Abu Dhabi, U Arab Emirates
[4] Univ Calif San Diego, Comp Sci & Engn, La Jolla, CA USA
关键词
SCAN; ARCHITECTURE; COMPACT;
D O I
10.1109/MDAT.2016.2527708
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Editor's note: Testability is a perennial concern that requires ever-improved solutions; however, potentially resultant security vulnerabilities need to be considered as well. This article provides a compact look at a body of DfT work from lead practitioners in the field. The DfT strategies address predicting and controlling test data volume and reducing power. Potential impacts of DfT to security are considered, along with strategies for providing testability without sacrificing security. © 2016 IEEE.
引用
收藏
页码:57 / 64
页数:8
相关论文
共 41 条
  • [1] A Secure Design-for-Test Infrastructure for Lifetime Security of SoCs
    Backer, Jerry
    Ali, Sk Subidh
    Rosenfeld, Kurt
    Hely, David
    Sinanoglu, Ozgur
    Karri, Ramesh
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2015, : 37 - 40
  • [2] The Conflicted Usage of RLUTs for Security-Critical Applications on FPGA
    Debapriya Basu Roy
    Shivam Bhasin
    Jean-Luc Danger
    Sylvain Guilley
    Wei He
    Debdeep Mukhopadhyay
    Zakaria Najm
    Xuan Thuy Ngo
    [J]. Journal of Hardware and Systems Security, 2018, 2 (2) : 162 - 178
  • [3] Invited Tutorial: Considerations in the Design and Verification of Microprocessors for Safety-Critical and Security-Critical Applications
    Hardin, David S.
    [J]. 2008 FORMAL METHODS IN COMPUTER-AIDED DESIGN, 2008, : 1 - 8
  • [4] Scheduling security-critical multimedia applications in heterogeneous networks
    Zhou, Liang
    Vasilakos, Athanasios V.
    Xiong, Naixue
    Zhang, Yan
    Lian, Shiguo
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 429 - 435
  • [5] DESIGN-FOR-TEST TECHNIQUES SUIT DIVERSE APPLICATIONS
    HESS, RD
    BERG, WC
    HOFFMAN, GB
    [J]. EDN, 1987, 32 (08) : 189 - &
  • [6] From Security-by-Design to the Identification of Security-Critical Deviations in Process Executions
    Salnitri, Mattia
    Alizadeh, Mahdi
    Giovanella, Daniele
    Zannone, Nicola
    Giorgini, Paolo
    [J]. INFORMATION SYSTEMS IN THE BIG DATA ERA, 2018, 317 : 218 - 234
  • [7] Scheduling security-critical real-time applications on clusters
    Xie, Tao
    Qin, Xiao
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (07) : 864 - 879
  • [8] Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications
    Roy, Debapriya Basu
    Bhasin, Shivam
    Guilley, Sylvain
    Danger, Jean-Luc
    Mukhopadhyay, Debdeep
    Ngo, Xuan Thuy
    Najm, Zakaria
    [J]. SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 248 - 268
  • [9] A security model for an operating system for security-critical applications in small office and home environment
    Janacek, Jaroslav
    [J]. Communications - Scientific Letters of the University of Žilina, 2009, 11 (03):
  • [10] Systematic design and realization of security-critical inter-organizational workflows
    Breu, R
    Hafner, M
    Weber, B
    Nowak, A
    [J]. EADOPTION AND THE KNOWLEDGE ECONOMY: ISSUES, APPLICATIONS, CASE STUDIES, PTS 1 AND 2, 2004, 1 : 646 - 653