SCAR: Security Compliance Analysis and Resynthesis of Reconfigurable Scan Networks

被引:0
|
作者
Lylina, Natalia [1 ]
Wang, Chih-Hao [1 ]
Wunderlich, Hans-Joachim [1 ]
机构
[1] Univ Stuttgart, Inst Comp Architecture & Comp Engn, D-70569 Stuttgart, Germany
关键词
Design validation; integer linear programming (ILP); reconfigurable scan network; satisfiability (SAT); secure design for test (DfT); synthesis; ACCESS; ATTACKS; TIME;
D O I
10.1109/TCAD.2022.3158250
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Reconfigurable scan networks (RSNs) enable an efficient reliability management throughout the device lifetime. They can be used for controlling integrated instruments, such as aging monitors or built-in self-test (BIST) registers, as well as for collecting the evaluation results from them. At the same time, they may impose a security threat, since the additional connectivities introduced by the RSN can possibly be misused as a side channel. This article presents an approach for security compliance analysis and resynthesis (SCAR) of RSNs to integrate an RSN compliant with the security properties of the initial design. First, the reachability properties of the original design are accurately computed. The connectivities inside the RSN, which exceed the allowed connectivity of the initial design, are identified using the presented security compliance analysis. Next, all violations are resolved by automated Resynthesis with a minimized number of structural changes. As a result of SCAR, any information leakage due to the RSN integration is prevented, while the accessibility of the instruments through the RSN is preserved. The approach is able to analyze complex control dependencies and obtains a compliant RSN even for the largest available benchmarks.
引用
收藏
页码:5644 / 5656
页数:13
相关论文
共 50 条
  • [41] An Analysis of Security in Social Networks
    Luo, Weimin
    Liu, Jingbo
    Liu, Jing
    Fan, Chengyu
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 648 - +
  • [42] Physical Layer Security Enhancement with Reconfigurable Intelligent Surface-Aided Networks
    Zhang, Jiayi
    Du, Hongyang
    Sun, Qiang
    Ai, Bo
    Ng, Derrick Wing Kwan
    IEEE Transactions on Information Forensics and Security, 2021, 16 : 3480 - 3495
  • [43] Physical Layer Security Enhancement With Reconfigurable Intelligent Surface-Aided Networks
    Zhang, Jiayi
    Du, Hongyang
    Sun, Qiang
    Ai, Bo
    Ng, Derrick Wing Kwan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3480 - 3495
  • [44] Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors
    Portilla, J.
    Otero, A.
    de la Torre, E.
    Riesgo, T.
    Stecklina, O.
    Peter, S.
    Langendoerfer, P.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2010,
  • [45] Security Analysis of State-of-the-art Scan Obfuscation Technique
    Sao, Yogendra
    Ali, Sk Subidh
    2021 IEEE 39TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2021), 2021, : 599 - 602
  • [46] VOIP FOR TELEREHABILITATION: A RISK ANALYSIS FOR PRIVACY, SECURITY, AND HIPAA COMPLIANCE
    Cohn, Ellen R.
    INTERNATIONAL JOURNAL OF TELEREHABILITATION, 2010, 2 (02): : 1 - 1
  • [47] Ambiguity as a Barrier to Information Security Policy Compliance: A Content Analysis
    Buthelezi, Mokateko Portia
    Van der Poll, John Andrew
    Ochola, Elisha Oketch
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE & COMPUTATIONAL INTELLIGENCE (CSCI), 2016, : 1360 - 1367
  • [48] Video Content Analysis for Compliance Audit in Finance and Security Industry
    Liu, Bin
    Wu, Mingyu
    Tao, Minze
    Wang, Qin
    He, Luye
    Shen, Guoliang
    Chen, Kai
    Yan, Junchi
    IEEE ACCESS, 2020, 8 : 117888 - 117899
  • [49] Requirements specification of a Cloud Service for Cyber Security Compliance Analysis
    Furfaro, Angelo
    Gallo, Teresa
    Garro, Alfredo
    Sacca, Domenico
    Tundis, Andrea
    2016 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2016, : 205 - 212
  • [50] Vulnerability Analysis and Security Compliance Testing for Networked Surveillance Cameras
    He, Daojing
    Zhang, Yuxing
    Li, Tinghui
    Chan, Sammy
    Cheng, Yao
    Guizani, Nadra
    IEEE NETWORK, 2020, 34 (05): : 315 - 321