Visible to the public Scan chain based IP fingerprint and identification

TitleScan chain based IP fingerprint and identification
Publication TypeConference Paper
Year of Publication2017
AuthorsChen, X., Qu, G., Cui, A., Dunbar, C.
Conference Name2017 18th International Symposium on Quality Electronic Design (ISQED)
ISBN Number978-1-5090-5404-6
Keywordscopy protection, delays, digital fingerprint, digital fingerprinting, fabrication, fault coverage, Fingerprint recognition, fingerprinting techniques, IC identification, identification technology, industrial property, integrated circuit design, integrated circuits, intellectual property, IP fingerprint, IP identification, IP networks, ip protection, Metrics, network on chip security, pubcrawl, resilience, Resiliency, Scalability, scan chain, security, Silicon

Digital fingerprinting refers to as method that can assign each copy of an intellectual property (IP) a distinct fingerprint. It was introduced for the purpose of protecting legal and honest IP users. The unique fingerprint can be used to identify the IP or a chip that contains the IP. However, existing fingerprinting techniques are not practical due to expensive cost of creating fingerprints and the lack of effective methods to verify the fingerprints. In the paper, we study a practical scan chain based fingerprinting method, where the digital fingerprint is generated by selecting the Q-SD or Q'-SD connection during the design of scan chains. This method has two major advantages. First, fingerprints are created as a post-silicon procedure and therefore there will be little fabrication overhead. Second, altering the Q-SD or Q'-SD connection style requires the modification of test vectors for each fingerprinted IP in order to maintain the fault coverage. This enables us to verify the fingerprint by inspecting the test vectors without opening up the chip to check the Q-SD or Q'-SD connection styles. We perform experiment on standard benchmarks to demonstrate that our approach has low design overhead. We also conduct security analysis to show that such fingerprints are robust against various attacks.

Citation Keychen_scan_2017