• 検索結果がありません。

11 WRTLT pptx 最近の更新履歴 Hideo Fujiwara

N/A
N/A
Protected

Academic year: 2018

シェア "11 WRTLT pptx 最近の更新履歴 Hideo Fujiwara"

Copied!
38
0
0

読み込み中.... (全文を見る)

全文

(1)

SR-Quasi-Equivalent:

Yet Another Approach to

Secure and Testable Scan Design

Katsuya Fujiwara*, Hideo Fujiwara**, and Hideo Tamamoto*

* Akita University

** Osaka Gakuin University

(2)

Outline

1. Background and Motivation 2. Previous Works

3. Objective of the Study 4. SR-Equivalent Circuits

5. SR-Quasi-Equivalent Circuits 6. Application to Scan Design

7. Cardinality of SR-Quasi-Equivalents 8. Conclusion

(3)

3

Background and Motivation

 

Reliability

 

Scan Design:

most popular DFT

 

Protection of

information

Scan Design:

increases

vulnerability of

chip

3

Quality 

 

 

 

 

scan

reset Scan-in

Combinational Logic Circuit   (Kernel)

Contradiction between Testability and 

Security   Solution? 

x

(4)

Previous Works

  Recent works focus on secure scan design:

D. Hely, et al. 2004, 2007 – scrambling

B. Yang, et al. 2004, 2006 – MKR

J. Lee, et al. 2006, 2007 – lock & key

S. Paul, et al. 2007 – Vlm-scan

G. Sengar, et al. 2007 – flipped-scan-chain

U. Chandran, et al. 2009 –

  All approaches (except Sengar) add extra hardware outside of scan registers.

Which means:

high area overhead

timing overhead or performance degradation

increased complexity of testing

limited security for the registers part

(5)

5

Objective of the Study

  Proposed a secure scan design approach (ASP-DAC 2010, 2011, WRTLT 2010)

◦  Satisfies both testability and security

◦  Replaces original scan registers with modified scan registers (called SR-equivalent circuits) only

Which leads to:

◦  Little area overhead

◦  No performance overhead

  Introduce a wider class of circuits called SR-quasi-equivalents

◦  Still satisfy both testability and security

◦  Cover the class of SR-equivalents Which leads to:

◦  Higher cardinality than SR-equivalents

◦  More secure than SR-equivalents

  Clarify the cardinality of each equivalent class in SR-quasi-equivalents to estimate the security level

(6)

SR-Equivalent Circuits

k-stage shift register, SR

k-stage SR-equivalent circuit, C

A circuit C with a single input x, a single output z, and k flip-flops is called functionally equivalent to a k-stage shift register

(or SR-equivalent)

if the input value applied to x at any time t appears at z after k clock cycles, i.e., z(t+k) = x(t) for any time t.

x y1 y2 yk z

y1 y2 yk

x z

(7)

7

Example: SR-equivalent circuit R

1

y1 y2 y3

x z

x y1 y2 y3 z

x(t) y1(t) y2(t) y3(t) x(t+1)

x(t+2)

Symbolic simulation

(8)

Example: SR-equivalent circuit R

1

y1 y2 y3

x z

x y1 y2 y3 z

x(t) y1(t) y2(t) y3(t) z(t) = y2(t)y3(t) x(t+1) x(t) y1(t) y1(t)y2(t) z(t+1) = y2(t) x(t+2) x(t+1) x(t) x(t)y1(t) z(t+2) = y1(t) x(t+2) x(t+1) x(t+1)x(t) z(t+3) = x(t)

The input value applied to x at time t

(9)

9

y1 y2 y3

x z

y1 y2 y3

x z

y1 y2 y3

x z

y1 y2 y3

x z

y1 y2 y3

x z

Inversion-Inserted SR (I2SR)

Linear Feed-Forward SR (LF2SR)

Inversion-Inserted Linear Feed-Forward SR (I2LF2SR)

Linear Feedback SR (LFSR)

Inversion-InsertedLinear Feedback SR (I2LFSR)

Five Types of Linear Circuits

(10)

How to Control/Observe SR-Equivalents

k-stage shift register, SR

k-stage SR-equivalent circuit, C

State-Justification: (Scan-in)

x y1 y2 yk z

y1 y2 yk

x z

To generate an input sequence to transfer the circuit C into a given desired state.

State-Observation: (Scan-out)

To identify the initial state by observing the output sequence from the state.

To utilize the SR-equivalent circuit C as a shift register SR, we need to consider the following two problems.

(11)

11

How to Control SR-Equivalent Circuits , R 2

To find input sequence x(t),x(t+1),x(t+2) for final state (y1(t+3),y2 (t+3),y3 (t+3))

Equations for state-justification

y1 y2 y3

x z

x(t) = 1y1(t+3)y3(t+3) x(t+1) = 1y2(t+3)

x(t+2) = y1(t+3)

x y1 y2 y3 z

x(t) y1(t) y2(t) y3(t) z(t)=1y1(t)y3(t) x(t+1) x(t) 1y1(t) x(t)y2(t) z(t+1)=1y2(t) x(t+2) x(t+1) 1x(t) x(t+1)1y1(t) z(t+2)=y1(t)

x(t+2)

=y1(t+3) 1

x(t+1)

=y2(t+3) x(t+2)

1x(t)

=y3(t+3) z(t+3)=x(t)

(12)

How to Control SR-Equivalent Circuits , R 2

For instance, the transfer sequence for (y1(t+3),y2 (t+3),y3 (t+3)) = (1, 1,0) is (x(t), x(t+1), x(t+2)) = (0, 0, 1).

On the other hand, for a shift register

the transfer sequence for final state (1, 1, 0) is (0, 1, 1). Since the attacker does not know the above equations,

he cannot find out the transfer sequence for final state (1, 1, 0). x(t) = 1y1(t+3)y3(t+3)

x(t+1) = 1y2(t+3) x(t+2) = y1(t+3)

y1 y2 y3

x z

(13)

13

How to Observe SR-Equivalent Circuits , R

2

To identify initial state (y1(t), y2 (t), y3 (t)) from output sequence z(t), z(t+1), z(t+2)

Equations for state-observation

x y1 y2 y3 z

x(t) y1(t) y2(t) y3(t) z(t+t)=1y1(t)y3(t) x(t+1) x(t) 1y1(t) x(t)y2(t) z(t+1)=1y2(t)

x(t+2) x(t+1) 1x(t) x(t+1)1y1(t) z(t+2)=y1(t) x(t+2) 1x(t+1) x(t+2)1x(t) z(t+3)=x(t)

y1(t) = z(t+2) y2(t) = 1z(t+1) y3(t) = 1z(t)z(t+2)

y1 y2 y3

x z

(14)

How to Observe SR-Equivalent Circuits , R

2

y1(t) = z(t+2) y2(t) = 1z(t+1)

y3(t) = 1z(t)z(t+2)

For instance, suppose the output sequence is 110 ,i.e., (z(t), z(t+1), z(t+2)) = (1, 1, 0),

then (y1(t), y2 (t), y3 (t)) = (0, 0, 0).

So, the initial state (0, 0, 0) is identified from the output sequence.

On the other hand, in case of a shift register, the initial state is (0, 1, 1). Since the attacker does not know the above equations,

he cannot identify the initial state as (0, 0, 0).

y1 y2 y3

x z

(15)

15

SR-Quasi-Equivalent Circuits

A circuit C with a single input x, a single output z, and k flip-flops is called functionally quasi-equivalent to a k-stage shift register

(or SR-quasi-equivalent)

if the input value applied to x at any time t appears at z

after k clock cycles with exclusive-OR of some inputs and/or constant 1, i.e.,

z(t+k) = x(t) c0 c1x(t+1) c2x(t+2) …⊕ ckx(t+k)

where c0 , c1, c2, … , ck are 0 or 1.

(c0 , c1, c2, … , ck ) is called characteristic coefficient

x y1 y2 yk z

(16)

SR-Quasi-Equivalent Circuits

Any SR-equivalent circuit is an SR-quasi-equivalent circuit such that its characteristic coefficient is (0, 0, …, 0).

x y1 y2 yk z

If a circuit is SR-equivalent, z(t+k) = x(t).

z(t+k) = x(t) c0 c1x(t+1) c2x(t+2) …⊕ ckx(t+k) Hence, (c0 , c1, … , ck ) = (0, 0, … , 0).

(17)

17

Example of SR-Quasi-Equivalent Circuits , R 3

y1 y2 y3

x z

Symbolic simulation

x y1 y2 y3 z!

x(t) y1(t) y2(t) y3(t) z(t)=y3(t)

x(t+1) x(t) 1 y1(t) x(t) y2(t) z(t+1)=x(t) y2(t)

x(t+2) x(t+1) 1 x(t) x(t+1) 1 y1(t) z(t+2)=x(t+1) 1 y1(t) x(t+3) x(t+2) 1 x(t+1) x(t+2) 1 x(t) z(t+3)=x(t+2) 1 x(t)

z(t+3) = x(t) 1 0 x(t+1) 1 x(t+2) 0 x(t+3) Characteristic coefficient = 1010

(18)

Equations for State-Justification

x y1 y2 y3 z

x y1 y2 y3 z!

x(t) y1(t) y2(t) y3(t) z(t)=y3(t)

x(t+1) x(t) 1 y1(t) x(t) y2(t) z(t+1)=x(t) y2(t)

x(t+2) x(t+1) 1 x(t) x(t+1) 1 y1(t) z(t+2)=x(t+1) 1 y1(t) x(t+3) x(t+2)!

=y1(t+3)

1 x(t+1)

=y2(t+3)

x(t+2) 1 x(t)

=y3(t+3) z(t+3)=x(t+2) 1 x(t)

x(t) = 1 y1(t+3) y3(t+3) x(t+1) = 1 y2(t+3)

x(t+2) = y (t+3)

To find input sequence x(t), x(t+1), x(t+2) for final state (y1(t+3), y2 (t+3), y3 (t+3))

(19)

19

A transfer sequence of length k to any desired final state can be expressed by the final state only.

x(t) = 1y1(t+3)y3(t+3) x(t+1) = 1y2(t+3)

x(t+2) = y1(t+3)

Equations for State-Justification

x y1 y2 y3 z

It does not depend on the initial state.

Hence, state-justification is easy, i.e., easy to scan-in.

(20)

Equations for State-Observation

x y1 y2 y3 z!

x(t) y1(t) y2(t) y3(t) z(t)=y3(t)

x(t+1) x(t) 1 y1(t) x(t) y2(t) z(t+1)=x(t) y2(t)

x(t+2) x(t+1) 1 x(t) x(t+1) 1 y1(t) z(t+2)=x(t+1) 1 y1(t) x(t+3) x(t+2) 1 x(t+1) x(t+2) 1 x(t) z(t+3)=x(t+2) 1 x(t)

y1(t) = z(t+2) x(t+1) 1 y2(t) = z(t+1) x(t)

y (t) = z(t)

y1 y2 y3

x z

To identify initial state (y1(t), y2 (t), y3 (t)) from input/output sequence

x(t), x(t+1), x(t+2) / z(t), z(t+1), z(t+2)

(21)

21

y1(t) = z(t+2) x(t+1) 1 y2(t) = z(t+1) x(t)

y3(t) = z(t)

Equations for State-Observation

x y1 y2 y3 z

Any present state (initial state) can be identified from the input- output sequence of length k and the connection information of the circuit, where the input sequence is arbitrary.

Hence, state-observation is easy, i.e., easy to scan-out.

(22)

SR-equivalence vs. SR-quasi-equivalence

SR-equivalent SR-quasi-equivalent

State-

Justification (Scan-in)

A transfer sequence of length k to the final state can be generated from the circuit structure, independently of the initial state.

Same as SR-equivalent

State-

Observation (Scan-out)

Any initial state can be identified from the

output sequence of

length k and the circuit structure.

Any initial state can be identified from the input- output sequence of length k and the circuit

structure.

(23)

23

Application to Scan Design 1/3

Scan-designed circuit

Scan Chain

Combinational Logic Circuit (Kernel)

Scan Chain

……

Standard scan register

y1 y2 y3

x 0 1 0 1 0 1 z

(24)

Standard scan register

y1 y2 y3

x z

0 1

0 1

0 1

y1 y2 y3

x z

0 1

0 1

0 1

Application to Scan Design 2/3

(25)

25

Replacement of scan chain by modified scan chain

Scan Chain Secret Register

Secret Register

Standard Scan Chain

Standard Scan Chain Modified Scan

Chain

(SR-quasi-equivalent)

Application to Scan Design 3/3

(26)

Security Level of Proposed Scan Design 1/3

We assume:

-  the attacker does not know the detailed information in the gate-level design

-  the attacker knows the presence of test pins (scan in/out, scan, and reset) and modified scan chains

-  the attacker does not know the structure of modified scan chains (the connection information, position of XOR and NOT, and the size)

A circuit C with a single input, a single output, and k flip-flops is called scan-secure if the attacker cannot determine the structure of C.

(27)

27

Security Level of Proposed Scan Design 2/3

Let C1 and C2 be SR-quasi-equivalent circuits. C1 and C2 have the same

characteristic coefficient C1 and C2 are functionally equivalent

Suppose

C1 and C2 have different structures but the same characteristic coefficient.

C1 and C2 are functionally equivalent

C1 and C2 cannot be distinguished merely from the input/output relation.

C1 and C2 are scan-secure

(28)

Security Level of Proposed Scan Design 3/3

The security level of the secure scan architecture is determined by the probability that an attacker can identify the structure of the SR- quasi-equivalent circuit.

Hence the attack probability approximates to the reciprocal of the cardinality of the class of SR-quasi-equivalents.

The attacker can identify the characteristic coefficient of SR-quasi- equivalents though the time complexity is exponential.

We need to clarify the cardinality of each equivalent class in SR-quasi- equivalents to estimate the attack probability.

(29)

29

Equivalent class I2SR

00…00 2k - 1

00…01

~ 01…11

0

~ 0

10…00 2k

10…01

~ 11…11

0

~ 0

Total 2k+1-1

z(t+k) = x(t) (SR-equivalents)

z(t+k) = x(t) 1

Cardinality of SR-Quasi-Equivalents 1/5

Characteristic coefficient

y1 y2 y3

x z

Inversion-Inserted SR

(I

2

SR)

(30)

Equivalent class LF2SR

00…00 2k(k-1)/2 - 1

00…01

~ 01…11

2k(k-1)/2

~ 2k(k-1)/2

10…00 0

10…01

~ 11…11

0

~ 0

Total 2k(k+1)/2 - 1

Cardinality of SR-Quasi-Equivalents 2/5

y1 y2 y3

x z

Linear Feed-Forward SR

(LF

2

SR)

(31)

31

Equivalent class I2LF2SR

00…00 (2k(k-1)/2 -1)(2k -1) 00…01

~ 01…11

2k(k-1)/2 (2k–1)

~

2k(k-1)/2 (2k–1)

10…00 (2k(k-1)/2 -1) 2k

10…01

~ 11…11

2k(k-1)/2 2k

~ 2k(k-1)/2 2k

Total (2k(k+1)/2 -1)(2k+1-1)

Cardinality of SR-Quasi-Equivalents 3/5

y1 y2 y3

x z

Inversion-Inserted

Linear Feed-Forward SR

(I

2

LF

2

SR)

(32)

Equivalent class I2LFSR

00…00 (2k(k-1)/2 -1)(2k -1) 00…01

~ 01…11

0

~ 0

10…00 (2k(k-1)/2 -1) 2k

10…01

~ 11…11

0

~ 0

Total (2k(k-1)/2 -1)(2k+1-1)

Cardinality of SR-Quasi-Equivalents 4/5

y1 y2 y3

x z

Inversion-Inserted

Linear Feedback SR

(I

2

LFSR)

(33)

33

Equivalent class LFSR

00…00 2k(k-1)/2 -1

00…01

~ 01…11

0

~ 0

10…00 0

10…01

~ 11…11

0

~ 0

Total 2k(k-1)/2 -1

Cardinality of SR-Quasi-Equivalents 5/5

y1 y2 y3

x z

Linear Feedback SR

(LFSR)

(34)

Covering Relation among Classes

I2SR

LF2SR

LFSR

I2LF2SR I2LFSR

SR equivalents SR quasi-equivalents

2

k(k-1)/2

-1 (2

k(k-1)/2

-1)(2

k

-1)

(2

k(k-1)/2

-1) 2

k

(2

k(k+1)/2

-1)(2

k+1

-1)

2

k(k+1)/2

- 1

2

k+1

-1

(35)

35

All circuits in I2SR, LF2SR, and I2LF2SR are SR-quasi-equivalent.

Easy to design SR-quasi-equivalent circuits

I2SR

LF2SR

I2LF2SR

Which means:

It is very easy to design an SR-quasi-equivalent circuit.

(2

k(k+1)/2

-1)(2

k+1

-1)

2

k(k+1)/2

- 1

2

k+1

-1

We can use any of them to organize the secure and testable scan chains.

(36)

The complexity of identifying the structure of SR-quasi-equivalents is proportional to the cardinality of the class of SR-quasi-

equivalents.

Even if we limit the class to I2LF2SR, the cardinality of k-stage SR-quasi- equivalent I2LF2SRs is

(2 k(k+1)/2 - 1)( 2 k+1 - 1).

Hence, the complexity or the difficulty of identifying the structure of SR-quasi-equivalent circuits increases more than exponentially as the number of flip-flops increases.

So, it is very hard and intractable to identify the structure of a given SR-quasi-equivalent circuit from the information on input/output relation only.

Security Level of Proposed Scan Design 4/4

(37)

37

Conclusion

  Introduced a new class of circuits called SR-quasi- equivalents

◦  Still satisfy both testability and security

◦  Cover the class of SR-equivalents Which leads to:

◦  Higher cardinality than SR-equivalents

◦  More secure than SR-equivalents

  Clarified the cardinality of each equivalent class in SR- quasi-equivalents to estimate the security level

(38)

Thank you

参照

関連したドキュメント

It is suggested by our method that most of the quadratic algebras for all St¨ ackel equivalence classes of 3D second order quantum superintegrable systems on conformally flat

Reynolds, “Sharp conditions for boundedness in linear discrete Volterra equations,” Journal of Difference Equations and Applications, vol.. Kolmanovskii, “Asymptotic properties of

Kilbas; Conditions of the existence of a classical solution of a Cauchy type problem for the diffusion equation with the Riemann-Liouville partial derivative, Differential Equations,

This paper develops a recursion formula for the conditional moments of the area under the absolute value of Brownian bridge given the local time at 0.. The method of power series

Answering a question of de la Harpe and Bridson in the Kourovka Notebook, we build the explicit embeddings of the additive group of rational numbers Q in a finitely generated group

Then it follows immediately from a suitable version of “Hensel’s Lemma” [cf., e.g., the argument of [4], Lemma 2.1] that S may be obtained, as the notation suggests, as the m A

Applications of msets in Logic Programming languages is found to over- come “computational inefficiency” inherent in otherwise situation, especially in solving a sweep of

Our method of proof can also be used to recover the rational homotopy of L K(2) S 0 as well as the chromatic splitting conjecture at primes p > 3 [16]; we only need to use the