4.7 Article

ScanSAT: Unlocking Static and Dynamic Scan Obfuscation

Journal

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING
Volume 9, Issue 4, Pages 1867-1882

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TETC.2019.2940750

Keywords

Logic gates; Testing; Integrated circuit modeling; Companies; IP networks; Outsourcing; Obfuscated scan chains; scan obfuscation; scan locking; SAT attack; logic locking

Funding

  1. Khalifa University of Science and Technology [RC2-2018-020]
  2. New York University Abu Dhabi Center for Cybersecurity
  3. Intel Corporation

Ask authors/readers for more resources

This paper discusses scan chain obfuscation technique and introduces an attack method called ScanSAT that can break both static and dynamic scan obfuscation schemes with a 100% success rate. The attack is effective even for large key sizes and in the presence of scan compression.
While financially advantageous, outsourcing key steps, such as testing, to potentially untrusted Outsourced Assembly and Test (OSAT) companies may pose a risk of compromising on-chip assets. Obfuscation of scan chains is a technique that hides the actual scan data from the untrusted testers; logic inserted between the scan cells, driven by a secret key, hides the transformation functions that map the scan-in stimulus (scan-out response) and the delivered scan pattern (captured response). While static scan obfuscation utilizes the same secret key, and thus, the same secret transformation functions throughout the lifetime of the chip, dynamic scan obfuscation updates the key periodically. In this paper, we propose ScanSAT: an attack that transforms a scan obfuscated circuit to its logic-locked version and applies the Boolean satisfiability (SAT) based attack, thereby extracting the secret key. We implement our attack, apply on representative scan obfuscation techniques, and show that ScanSAT can break both static and dynamic scan obfuscation schemes with 100 percent success rate. Moreover, ScanSAT is effective even for large key sizes and in the presence of scan compression.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available