跳到主要內容

臺灣博碩士論文加值系統

(18.97.9.169) 您好!臺灣時間:2024/12/11 14:08
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:邱畊銘
研究生(外文):Geng-Ming Chiu
論文名稱:嵌入式矽智財核心之IEEE1500安全測試封套
論文名稱(外文):Secured IEEE 1500 Test Wrapper for Embedded IP Cores
指導教授:李建模
指導教授(外文):Chien-Mo Li
學位類別:碩士
校院名稱:國立臺灣大學
系所名稱:電子工程學研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2008
畢業學年度:96
語文別:中文
論文頁數:91
中文關鍵詞:矽智財系統晶片安全旁道攻擊可測試設計測試封套IEEE 1500標準
外文關鍵詞:IPSoCscan-based DFTside-channel attackIEEE 1500test wrappersecurity
相關次數:
  • 被引用被引用:0
  • 點閱點閱:323
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
本論文提出一個可防止掃描測試攻擊之安全測試封套,此技術使用安全機制來保護核心電路之主要輸入端與內部掃描鏈輸出入端。此安全架構只允許授權者執行所有測試運作,並需透過安全控制器來驗證測試圖樣是否相同於測試封套密鑰。而測試封套密鑰是由安全封套周邊單元所構成之線性回授位移暫存器(LFSR)所產生。另外此架構對於AES電路將增加約5%之面積成本,但可提供之高安全複雜度(2256)。在系統晶片內此安全架構將維持IEEE 1500標準測試封套之特性,且不需要更動系統晶片內嵌之核心電路。本論文實作安全測試封套之編譯與驗證之自動化軟體,其提升包覆測試封套核心電路之安全性,並可生成測試樣板來驗證安全測試封套之功能及核心電路。另外也實作一個使用者介面平台,整合安全測試封套與IEEE 1500標準測試封套之編譯與驗證軟體,提供指令模式之設計流程來輔助設計者設計與驗證封套架構。
This thesis presents a new secure test wrapper (STW) design for preventing scan-based attack. The technique provides a secure mechanism to protect primary inputs and scan in/out of internal scan chains in IP core. The secure architecture allows only authorized user to execute all test operation by using secure controller to verify whether test pattern is identical to test wrapper key. The test wrapper key is generated by linear-feedback shift register (LFSR) that is constructed from secure wrapper boundary cell. Experimental results on AES show that STW provides very high security (2256) for a small area overhead (approximately 5%). The architecture is compatible to IEEE 1500 standard and there is no need to modify the embedded IP core in System on Chip (SOC). An automatic compiler and validation tool for secure test wrapper is implemented. The user interface platform that includes compiler and validation tool of secure test wrapper and standard test wrapper is also implemented.
摘要 i
Abstract ii
目錄 iii
圖目錄 v
表目錄 vii
第一章 序論 1
1.1 論文背景與動機 1
1.2 技術與論文貢獻 3
1.3 論文組織 5
第二章 論文相關背景與研究 6
2.1 IEEE 1500標準測試封套概述 6
2.2.1 封套指令暫存器與封套串列協定 8
2.2.2 封套周邊暫存器與封套旁通暫存器 10
2.2.3 核心測試語言(Core Test Language) 12
2.3 相關研究 13
2.3.1 鏡子密鑰暫存器(mirror key registers, MKR)之安全掃描技術 15
2.3.2 擾亂掃描鏈之相關研究 16
2.3.3 嵌入額外硬體及測試密鑰之相關研究 17
2.3.4 其他相關研究 21
第三章 安全測試封套架構 24
3.1 安全測試封套之硬體架構 24
3.1.1 安全控制器之架構 27
3.1.2 安全封套單元之架構 30
3.1.3 支援接腳共用之安全封套單元 36
3.1.4 指令暫存器與封套介面訊號解碼之更新 39
3.1.5 安全測試封套之開鎖流程 40
3.2 安全測試封套之複雜度 42
3.3 安全測試封套之測試 47
3.3.1 安全控制器之測試 48
3.3.2 安全封套暫存器之測試 52
第四章 軟體實作與實驗結果 54
4.1 安全測試封套編譯與驗證軟體實作 54
4.1.1 種子解算器 55
4.1.2 安全測試封套編譯器 59
4.1.3 安全測試封套驗證軟體 62
4.1.4 安全測試封套之CTL產生器 64
4.2 整合測試封套編譯與驗證之設計流程 66
4.2.2 整合設計流程 68
4.2.1 使用者介面實作 70
4.2.3 整合設計之指令功能 72
4.3 安全測試封套之面積比較 73
4.2.1 AES電路之安全測試封套面積比較 74
4.2.2 ISCAS電路之安全測試封套面積比較 75
第五章 討論與未來工作 77
5.1 提升LFSR之複雜度 77
5.2 比較其他安全架構 78
5.3 未來工作 78
第六章 結論 80
參考文獻 81
附錄A 進階加密標準(AES)概述 85
[Adham 99] A. Adham et al., “ Preliminary Outline of IEEE P1500 Scalable Architecture for Testing Embedded Cores,“ Proc. IEEE VLSI Test Symposium, pp. 483-488, 1999.
[Biham 97] E. Biham and A. Shamir, “Differential Fault Analysis of Secret Key Cryptosystems,” Lecture Notes in Computer Science, vol. 1294, pp. 513-527, 1997.
[Bai 07] Bing-Chuan Bai, “Simultaneous Test Data Volume and Test Application Time Reduction for System-on-Chip,” Master thesis, National Taiwan Univ., Taipei, Taiwan, R.O.C., 2007.
[Daemen 98] J. Daemen and R. Rijmen, The Block Cipher Rijndael. Proc. Third Smart Card Research and Advanced Applications Conference, 1998.
[Daemen 99] J. Daemen and R. Rijmen, AES Proposal: Rijndael, Version 2, 1999.
[Daemen 02] J. Daemen and R. Rijmen, The Design of Rijndael: AES—The Advance Encryption Standard, Springer-Verlag, pp. 31-62, 2002.
[DaSilva 03] F. DaSilva, Y. Zorian, L. Whetsel, K. Arabi, R. Kapur, “Overview of the IEEE P1500 Standard,” Proc. IEEE International Test Conference, pp. 887-889, 2003.
[Goering 04] R. Goering, “Scan Design Called Portal for Hackers,” EE Times, 2004.
[Hafner 91] K. Hafner, H. C. Ritter, T. M. Schwair, S. Wallstab, M. Deppermann, J. Gessner, S. Koesters, W. D. Moeller, and G. Sanweg, “Design and test of an integrated cryptochip,” Proc. IEEE Design and Test of Computers, pp. 6-17, 1991.
[Hely 04] D. Hely, M-L. Flottes, F. Bancel, B. Rouzeyre, N. Berard, and M. Renovell, “Scan Design and Secure Chip,” Proc. International On-Line Test Symposium, pp. 219-226, 2004.
[Hely 05] D. Hely, M-L. Flottes, F. Bancel, and B. Rouzeyre, “Test Control for Secure Scan Designs,” Proc. European Test Symposium, pp. 190-195, 2005.
[Hely 06a] D. Hely, M-L. Flottes, F. Bancel, and B. Rouzeyre, “A Secure Scan Design Methodology,” Proc. Design Automation and Test in European Conference, pp. 1177-1178, 2006.
[Hely 06b] D. Hely, M-L. Flottes, F. Bancel, and B. Rouzeyre, “Secure Scan Techniques: a Comparison,” Proc. International On-Line Test Symposium, pp. 119-124, 2006.
[IEEE 1149.1] ”Standard Test Access Port and Boundary Scan Architecture,“ IEEE Std. 1149.1-2001.
[IEEE 1500] IEEE Computer Society, “IEEE Standard Testability Method for Embedded Core-based Integrated Circuits,” IEEE Std. 1500-2005, pp. 1-117.
[IEEE 1450.6] “IEEE Standard Test Interface Language (STIL) for Digital Test Vector Data-Core Test Language (CTL),” IEEE Std. 1450.6-2005.
[Kao 07] Tsung-Ping Kao, “IEEE 1500 Compatible Test Wrapper Design and Validation for At-Speed Delay Testing,” Master thesis, National Taiwan Univ., Taipei, Taiwan, R.O.C., 2007.
[Kapoor 04] R. Kapoor, “Security vs. test quality: Are they mutually exclusive?” Proc. International Test Conference, pp. 1414, 2004.
[Kapur 01] Rohit Kapur, Maurice Lousberg, Tony Taylor, Brion Keller, Paul Reuter, and Douglas Kay, “CTL the language for describing Core-based testing,” Proc. IEEE International Test Conference, pp. 131, 2001.
[Karri 01] R. Karri, K. Wu, and P. Mishra, ”Fault-Based Side-Channel Cryptanalysis Tolerant Architecture for Rijndael Symmetric Block Cipher,” Proc. IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, pp. 427-435, 2001.
[Kelsey 98] J. Kelsey, B. Schneier, D. Wagner, and C. Hall, “Side Channel Cryptanalysis of Product Ciphers,” Proc. of the European Symposium on Research in Computer Security, pp. 97-110, 1998.
[Kocher 99] P. Kocher, J. Jaffe, and B. Jun, ”Differential Power Analysis,” Lecture Notes in Computer Science, vol. 1666, pp. 388-397, 1999.
[Kocher 04] P. Kocher, R. Lee, G. McGraw, A. Raghunathan, and S. Ravi, “Security as a New Dimension in Embedded System Design,” Proc. of the 41st annual conference on Design automation, pp. 753-760, 2004.
[Kommerling 99] O. Kommerling and M. G. Kuhn, “Design Principle for Tamper Resistant Smartcard Processors,” USENIX Workshop on Smartcard Technology, pp. 9-20, 1999.
[Lee 05] J. Lee, M. Tehranipoor, C. Patel, and J. Plusquellic, “Securing Scan Design Using Lock and Key Technique,” Proc. Defect and Fault Tolerance in VLSI Systems, pp. 51-62, 2005.
[Lee 06] J. Lee, M. Tehranipoor, C. Patel, and J. Plusquellic, “A Low-Cost Solution for Protecting IPs against Scan-Based Side-Channel Attacks,” Proc. IEEE VLSI Test Symposium, pp. 94-99, 2006.
[Li 05] J. F. Li and C. S. Wu, “Design-for-Testability and Testing of P1500 Test Wrapper,” Proc. VLSI Design/CAD symposium, pp. 254-257, 2005.
[Liao 05] Yu-Te Liao, “A Two-Level Test Data Compression and Test Time Reduction Technique for SOC,” Master thesis, National Taiwan Univ., Taipei, Taiwan, R.O.C., 2005.
[Liu 07] C. Liu and Y. Huang, “Effects of Embedded Decompression and Compaction Architectures on Side-Channel Attack Resistance,” Proc. IEEE VLSI Test Symposium, pp. 461-468, 2007.
[Marinissen 99] E. J. Marinissen, Y. Zorian, R. Kapur, T. Taylor, and L. Whetsel, ”Overview of the IEEE P1500 Standard,” Proc. IEEE International Test Conference, pp. 887-889, 2003.
[Mukhopadhyay 05] D. Mukhopadhyay, S. Banerjee, D. RoyChowdhury, and B.B. Bhattacharya, “CryptoScan: A Secured Scan Chain Architecture,” Proc. Asian Test Symposium, pp. 348-353, 2005.
[Paul 07] S. Paul, R.S. Chakraborty, and S. Bhunia, “Vim-Scan: A Low Overhead Scan Design Approach for Protection of Secret Key in Scan-Based Secure Chips,” Proc. IEEE VLSI Test Symposium, pp. 455-460, 2007.
[Ravi 04] S. Ravi, A. Raghunathan, and S. Chakradhar, “Tamper Resistance Mechanisms for Secure Embedded Systems,” Proc. International Conference on VLSI Design, pp. 605-611, 2004.
[Renaudin 04] M. Renaudin, F. Bouesse, Ph. Proust, J.P. Tual, L. Sourqen, and F. Germain, “High security smartcards,” Proc. Design, Automation and Test in Europe Conference, pp. 228-232, 2004.
[Sengar 07] G. Sengar, D. Mukhopadhyay, and D.R. Chowdhury, “Secured Flipped Scan-Chain Model for Crypto-Architecture,” Proc. IEEE Trans. on Computer-Aided Design of Integrated Circuits and Systems, Vol. 26, no. 11, pp. 2080-2084, 2007.
[DesignCompiler] Synopsys Inc., “Design Compiler User Guide,” Sep. 2005.
[TetraMAX] Synopsys Inc., “TetraMAX ATPG User Guide,” Sep. 2005.
[Tiri 05] K. Tiri and I. Verbauwhede, “A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs,” Proc. Design Automation and Test in Europe, pp. 58-63, 2005.
[Trappe 05] W. Trappe and L. C. Washington, Introduction to cryptography with coding theory, Pearson Prentice Hall, 2005.
[Wu 02] C. W. Wu, “Core-based SOC Testing,” VLSI Testing and Design for Testability (Ⅱ), course handouts, 2002.
[Wang 03] Hsin-Chung Wang, Chih-Hsiu Lin, and An-Yeu Wu, “Design and Implementation of a Cost-efficient AES Cryptographic Engine,” Bulletin of Engineering School, National Taiwan University, no. 88, pp. 51-60, June 2003.
[Wu 06] Po-Lin Wu, “Implementation of an IEEE 1500 Test Wrapper Generation Validation and Power Estimation Tool,” Master thesis, National Taiwan Univ., Taipei, Taiwan, R.O.C., 2006.
[Yang 04] B. Yang, K. Wu, and R. Karri, “Scan-based Side-Channel Attack on Dedicated Hardware Implementations on Data Encryption Standard,” Proc. International Test Conference, pp. 339-344, 2004.
[Yang 05] B. Yang, K. Wu, and R. Karri, “Secure Scan: A Design-for-Test Architecture for Crypto Chips,” Proc. Design Automatic Conference, pp. 135-140, 2005.
[Zhou 05] YongBin Zhou, and DengGuo Feng, “Side channel attacks: ten years after its publication and the impacts on cryptographic module security testing,” http://eprint.iacr.org/2005/388, 2005.
[Zorian 05] Yervant Zorian, Avetik Yessayan, “IEEE 1500 Utilization in SOC Design and Test”, Proc. IEEE International Test Conference, pp. 543-552, 2005.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊