SSSN: Secured Streaming Scan Network

Sonali Shukla, Bhavika Ranjeet Kumar, Virendra Singh
{"title":"SSSN: Secured Streaming Scan Network","authors":"Sonali Shukla, Bhavika Ranjeet Kumar, Virendra Singh","doi":"10.1109/LATS58125.2023.10154483","DOIUrl":null,"url":null,"abstract":"During last decade, IEEE standard 1687 or IJTAG has been utilized to test the embedded instruments on chips that support test and measurement applications. Recently, IJTAG has been incorporated into the newly developed testing architecture referred as a Streaming Scan Network (SSN) for efficient testing of the complex System-on-Chips (SoCs). IJTAG registers are used to configure the components of a Streaming Scan Host (SSH) node associated with each core in the SSN network. SSN supports packetized test data distribution for streaming of the test data through SSN bus. SSN provides efficient SoC testing by several times reduction in test time and test data volume with limited pin count. Although SSN outshines in providing testing benefits, it lacks security support. An unauthorized user can maliciously modify the configuration registers and extracts sensitive information. Presence of untrusted modules in the network also amplifies the security concerns as each packet may contain test data of multiple cores. Hence, an untrusted cores can simply sniff the data destined for other cores. Therefore, to address the security issues in SSN test architecture, one needs to protect the system against internal untrusted third-party intellectual property (3PIP) modules and unauthorized users. This work discusses the security vulnerabilities of SSN architecture by demonstrating an attack scenario. Keeping the flexibility of SSN intact, we propose a modified SSH architecture and an authorization unit to ensure security against data sniffing attacks and unauthorized accesses, respectively. A state-of-the-art scheme is compared against the proposed approach in terms of area overheads. Thus, this paper presents a multi-level methodology with very low area and testing overheads for secure SSN.","PeriodicalId":145157,"journal":{"name":"2023 IEEE 24th Latin American Test Symposium (LATS)","volume":"19 23","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE 24th Latin American Test Symposium (LATS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LATS58125.2023.10154483","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

During last decade, IEEE standard 1687 or IJTAG has been utilized to test the embedded instruments on chips that support test and measurement applications. Recently, IJTAG has been incorporated into the newly developed testing architecture referred as a Streaming Scan Network (SSN) for efficient testing of the complex System-on-Chips (SoCs). IJTAG registers are used to configure the components of a Streaming Scan Host (SSH) node associated with each core in the SSN network. SSN supports packetized test data distribution for streaming of the test data through SSN bus. SSN provides efficient SoC testing by several times reduction in test time and test data volume with limited pin count. Although SSN outshines in providing testing benefits, it lacks security support. An unauthorized user can maliciously modify the configuration registers and extracts sensitive information. Presence of untrusted modules in the network also amplifies the security concerns as each packet may contain test data of multiple cores. Hence, an untrusted cores can simply sniff the data destined for other cores. Therefore, to address the security issues in SSN test architecture, one needs to protect the system against internal untrusted third-party intellectual property (3PIP) modules and unauthorized users. This work discusses the security vulnerabilities of SSN architecture by demonstrating an attack scenario. Keeping the flexibility of SSN intact, we propose a modified SSH architecture and an authorization unit to ensure security against data sniffing attacks and unauthorized accesses, respectively. A state-of-the-art scheme is compared against the proposed approach in terms of area overheads. Thus, this paper presents a multi-level methodology with very low area and testing overheads for secure SSN.
SSSN:安全流扫描网络
在过去的十年中,IEEE标准1687或IJTAG已被用于测试芯片上的嵌入式仪器,支持测试和测量应用。最近,IJTAG已被纳入新开发的测试架构,称为流扫描网络(SSN),用于有效测试复杂的片上系统(soc)。IJTAG寄存器用于配置与SSN网络中的每个核心相关联的流扫描主机(Streaming Scan Host, SSH)节点的组件。SSN支持分组测试数据分发,通过SSN总线实现测试数据流。SSN提供了有效的SoC测试,在有限的引脚数下,测试时间和测试数据量减少了几倍。尽管SSN在提供测试好处方面表现突出,但它缺乏安全支持。未经授权的用户可以恶意修改配置寄存器并提取敏感信息。由于每个数据包可能包含多个核心的测试数据,因此网络中不可信模块的存在也加剧了安全问题。因此,不受信任的核心可以简单地嗅探发送给其他核心的数据。因此,要解决SSN测试体系结构中的安全问题,需要保护系统免受内部不受信任的第三方知识产权(3PIP)模块和未授权用户的侵害。本工作通过演示攻击场景来讨论SSN体系结构的安全漏洞。为了保持SSN的灵活性,我们提出了一个修改的SSH架构和一个授权单元,以确保对数据嗅探攻击和未经授权访问的安全性。在面积管理费用方面,将最先进的方案与建议的方法进行比较。因此,本文提出了一种具有非常低的面积和测试开销的多级安全SSN方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信