ScanSAT: Unlocking Static and Dynamic Scan Obfuscation

Ozgur Sinanoglu, Lilas Alrahis, Muhammad Yasin, Nimisha Limaye, Hani Saleh

Research output: Contribution to journalArticlepeer-review


While financially advantageous, outsourcing key steps, such as testing, to potentially untrusted Outsourced Assembly and Test (OSAT) companies may pose a risk of compromising on-chip assets. Obfuscation of scan chains is a technique that hides the actual scan data from the untrusted testers; logic inserted between the scan cells, driven by a secret key, hides the transformation functions that map the scan-in stimulus (scan-out response) and the delivered scan pattern (captured response). While static scan obfuscation utilizes the same secret key, and thus, the same secret transformation functions throughout the lifetime of the chip, dynamic scan obfuscation updates the key periodically. In this paper, we propose ScanSAT: an attack that transforms a scan obfuscated circuit to its logic-locked version and applies the Boolean satisfiability (SAT) based attack, thereby extracting the secret key. We implement our attack, apply on representative scan obfuscation techniques, and show that ScanSAT can break both static and dynamic scan obfuscation schemes with 100% success rate. Moreover, ScanSAT is effective even for large key sizes and in the presence of scan compression.
Original languageEnglish (US)
Article number10.1109/TETC.2019.2940750
Pages (from-to)1-1
Number of pages14
JournalIEEE Transactions on Emerging Topics in Computing
StateE-pub ahead of print - Sep 13 2019


Dive into the research topics of 'ScanSAT: Unlocking Static and Dynamic Scan Obfuscation'. Together they form a unique fingerprint.

Cite this