TY - GEN
T1 - ScanSaT
T2 - 24th Asia and South Pacific Design Automation Conference, ASPDAC 2019
AU - Alrahis, Lilas
AU - Yasin, Muhammad
AU - Saleh, Hani
AU - Mohammad, Baker
AU - Al-Qutayri, Mahmoud
AU - Sinanoglu, Ozgur
N1 - Publisher Copyright:
© 2019 Association for Computing Machinery.
PY - 2019/1/21
Y1 - 2019/1/21
N2 - While financially advantageous, outsourcing key steps such as testing to potentially untrusted Outsourced Semiconductor Assembly and Test (OSAT) companies may pose a risk of compromising on-chip assets. Obfuscation of scan chains is a technique that hides the actual scan data from the untrusted testers; logic inserted between the scan cells, driven by a secret key, hide the transformation functions between the scan-in stimulus (scan-out response) and the delivered scan pattern (captured response). In this paper, we propose ScanSAT: an attack that transforms a scan obfuscated circuit to its logic-locked version and applies a variant of the Boolean satisfiability (SAT) based attack, thereby extracting the secret key. Our empirical results demonstrate that ScanSAT can easily break naive scan obfuscation techniques using only three or fewer attack iterations even for large key sizes and in the presence of scan compression.
AB - While financially advantageous, outsourcing key steps such as testing to potentially untrusted Outsourced Semiconductor Assembly and Test (OSAT) companies may pose a risk of compromising on-chip assets. Obfuscation of scan chains is a technique that hides the actual scan data from the untrusted testers; logic inserted between the scan cells, driven by a secret key, hide the transformation functions between the scan-in stimulus (scan-out response) and the delivered scan pattern (captured response). In this paper, we propose ScanSAT: an attack that transforms a scan obfuscated circuit to its logic-locked version and applies a variant of the Boolean satisfiability (SAT) based attack, thereby extracting the secret key. Our empirical results demonstrate that ScanSAT can easily break naive scan obfuscation techniques using only three or fewer attack iterations even for large key sizes and in the presence of scan compression.
UR - http://www.scopus.com/inward/record.url?scp=85061141495&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85061141495&partnerID=8YFLogxK
U2 - 10.1145/3287624.3287693
DO - 10.1145/3287624.3287693
M3 - Conference contribution
AN - SCOPUS:85061141495
T3 - Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC
SP - 388
EP - 393
BT - ASP-DAC 2019 - 24th Asia and South Pacific Design Automation Conference
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 21 January 2019 through 24 January 2019
ER -