ITC 2017: INTERNATIONAL TEST CONFERENCE 2017
PROGRAM FOR WEDNESDAY, NOVEMBER 1ST
Days:
previous day
next day
all days

View: session overviewtalk overview

08:30-10:00 Session 4: Dealing with Jitter and Leveraging Light
Chair:
Bob Bartlet (Advantest Corporation, United States)
Discussant:
Sule Ozev (Arizona State University, United States)
08:30
Vahap Baris Esen (Katholieke Universiteit Leuven, Belgium)
Anthony Coyette (Katholieke Universiteit Leuven, Belgium)
Nektar Xama (Katholieke Universiteit Leuven, Belgium)
Wim Dobbelaere (On Semiconductor, Belgium)
Ronny Vanhooren (ON Semiconductor, Belgium)
Georges Gielen (Katholieke Universiteit Leuven, Belgium)
Nonintrusive Detection of Defects in Mixed-Signal Integrated Circuits Using Light Activation

ABSTRACT. Methods increasing controllability to solve the problem of low fault coverage are in practice limited due to the excessive area overhead and being intrusive. This paper presents a non-intrusive controllability method based on external activation.

09:00
Li Xu (Texas Instrumentation, United States)
Degang Chen (Iowa State University, United States)
Yuming Zhuang (Iowa State University, United States)
Kenneth Butler (Texas Instruments, United States)
Rajavelu Thinakaran (Texas Instruments, India)
Accurate ADC Testing with Significantly Relaxed Instrumentation Including Large Cumulative Jitter
SPEAKER: Yuming Zhuang

ABSTRACT. A new algorithm is proposed in this paper to accurately estimate the ADC performance with sampling clock jitter. This method does not require precise sampling clock and thus reduce the test cost.

09:30
Masahiro Ishida (ADVANTEST Corporation, Japan)
Kiyotaka Ichiyama (ADVANTEST Corporation, Japan)
A Jitter Separation and BER Estimation Method for Asymmetric Total Jitter Distributions

ABSTRACT. This paper proposes an FFT-based jitter separation and a model-based BER-curve estimation technique for asymmetric total jitter distributions. Experimental results show that the proposed method can analyze jitter and BER-curves more accurately than existing methods.

08:30-10:00 Session 5: Cell and Bridging ATPG
Chair:
Andreas Glowatz (Mentor Graphics, Germany)
Discussant:
Vivek Chickermane (Cadence Design Sstems, United States)
08:30
Arani Sinha (Intel, United States)
Sujay Pandey (Georgia Institute of Technology, United States)
Ayush Singhal (Intel, United States)
Alodeep Sanyal (Intel, United States)
Alan Schmaltz (Intel, United States)
DFM-aware Fault Model and ATPG for Intra-Cell and Inter-Cell Defects
SPEAKER: Arani Sinha

ABSTRACT. This paper motivates a new test paradigm – a design-for-manufacturability hotspot-aware fault model to target intra-cell and inter-cell defects, and introduces a cell characterization flow that can be used to create patterns for DFM-aware faults.

09:00
Masayuki Arai (Nihon University, Japan)
Shingo Inuyama (Tokyo Metropolitan University, Japan)
Kazuhiko Iwasaki (Tokyo Metropolitan University, Japan)
Layout-aware 2-Step Window-based Pattern Reordering for Fast Bridge/Open Test Generation
SPEAKER: Masayuki Arai

ABSTRACT. We propose fast test pattern generation scheme for bridge and open faults, considering critical area. The proposed scheme applies commercial ATPG tools and takes 2-step window-based reordering.

09:30
Irith Pomeranz (Purdue University, United States)
Selecting Target Bridging Faults for Uniform Circuit Coverage

ABSTRACT. This paper develops a procedure for bridging fault selection that addresses the need to provide a uniform coverage of the circuit in order to prevent areas with low coverage from resulting in test escapes.

08:30-10:00 Session 6: Security
Chair:
Jennifer Dworak (Southern Methodist University, United States)
08:30
Adib Nahiyan (University of Florida, United States)
Mehdi Sadi (University of Florida, United States)
Rahul Vittal (Univesity of Floroda, United States)
Gustavo Contreras (University of Florida, United States)
Domenic Forte (University of Florida, United States)
Mark Tehranipoor (University of Florida, United States)
Hardware Trojan Detection Through Information Flow Security Verification
SPEAKER: Adib Nahiyan

ABSTRACT. We propose a novel framework to detect hardware Trojan inserted by untrusted 3PIP vendors. Our proposed framework is based on information flow security (IFS) verification which can detect any violation of IFS policies by Trojans.

09:00
Rana Elnaggar (Duke University, United States)
Krishnendu Chakrabarty (Duke University, United States)
Mehdi Tahoori (Karlsruhe Institute of Technology, Germany)
Run-Time Hardware Trojan Detection Using Performance Counters
SPEAKER: Rana Elnaggar

ABSTRACT. We introduce a run-time hardware Trojan detection method that is applied to microprocessor cores. This approach detects Trojan activation by applying run-time anomaly detection to the streaming data from the performance counters of microprocessor core

09:30
Jiafan Wang (Texas A&M University ECE Department, United States)
Congyin Shi (Texas A&M University ECE Department, United States)
Adriana Sanabria-Borbon (Texas A&M University ECE Department, United States)
Edgar Sanchez-Sinencio (Texas A&M University ECE Department, United States)
Jiang Hu (Texas A&M University ECE Department, United States)
Thwarting Analog IC Piracy via Combinational Locking
SPEAKER: Jiang Hu

ABSTRACT. A combinational locking technique is introduced to enhance analog IC security against piracy. The key idea is reconfigurable current mirror design using Satisfiability Modulo Theories. Its effectiveness is confirmed by simulations on analog IC designs.

08:30-10:00 Session 7: Memory and 3D Test
Chair:
Anne Gattiker (IBM, United States)
Discussant:
Rob Aitken (ARM Ltd., United States)
08:30
Xiaoan Ding (University of Chicago, United States)
Xi Liang (University of Chicago, United States)
Yanjing Li (University of Chicago, United States)
Cross-Layer Refresh Mitigation for Efficient and Reliable DRAM Systems: A Comparative Study
SPEAKER: Xiaoan Ding

ABSTRACT. We present a new cross-layer approach to efficiently mitigate DRAM refresh overheads, which enables reliable, energy-efficient, and scalable DRAM systems.

09:00
Gherman Valentin (CEA, France)
Farjallah Emna (CEA, France)
Armani Jean-Marc (CEA, France)
Seif Marcelino (CEA, France)
Dilillo Luigi (LIRMM, France)
Improvement of the Tolerated Raw Bit-Error Rate in NAND Flash-based SSDs with the Help of Embedded Statistics

ABSTRACT. The tolerated bit error rate in Flash memories is improved with a statistical approach that estimates the remaining safe retention time of a page based on the number of retention errors and the retention age.

09:30
Raphael Robertazzi (IBM, United States)
Micheal Scheurman (IBM, United States)
Matt Wordeman (IBM, United States)
Shurong Tian (IBM, United States)
Christy Tyberg (IBM, United States)
Analytical Test of 3D Integrated Circuits

ABSTRACT. We will review results from a test site designed expressly to investigate 3D IC design, integration and test issues and discuss test methods used to support diagnostic test of 3D chips in a research environment.

10:30-12:00 Session 8: Interfaces, iJTAG and DDR testing
Chair:
Dave Armstrong (Advantest, United States)
Discussant:
Anita Pratti (Texas Instruments, United States)
10:30
Peter Sarson (ams AG, Austria)
Jeff Rearick (AMD, United States)
Use Models for Extending IEEE 1687 to Analog Test
SPEAKER: Peter Sarson

ABSTRACT. Through four use cases, we describe how IEEE 1687 can be extended to handle Analog chips, including enhancements to ICL and PDL to facilitate the description of the components and actions involved in analog tests.

11:00
Michael Laisne (Dialog Semiconductor, United States)
Hans Martin von Staudt (Dialog Semiconductor, United States)
Sourabh Bhalerao (Dialog Semiconductor, United States)
Mark Eason (Dialog Semiconductor, United States)
Single-Pin Test Control for Big A, little d Devices

ABSTRACT. The paper presents a unique single wire P1687.1 like input developed by the authors for purposes of test. The paper will show how the wire was implemented in silicon and show actual test results.

11:30
Sergei Odintsov (Tallinn University of Technology, Estonia)
Artur Jutman (Testonica Lab, Estonia)
Sergei Devadze (Testonica Lab, Estonia)
Marginal PCB Assembly Defect Detection on DDR3/4 Memory Bus

ABSTRACT. DDR3/4 memory interface calibration mechanisms may mask PCBA delay faults. Bus operating margin analysis can still reveal their presence. We propose a method to check the operating margin discrepancies reusing the existing in-system memory controller.

10:30-12:00 Session 9: Delay Test and Quality
Chair:
Mike Vachon (Cadence Design Systems, United States)
Discussant:
Janusz Rajski (Mentor Graphics, United States)
10:30
Nik Sumikawa (NXP, United States)
Matthew Nero (University of California, Santa Barbara, United States)
Li-C. Wang (University of California, Santa Barbara, United States)
Kernel-based Clustering for Quality Improvement and Excursion Detection
SPEAKER: Nik Sumikawa

ABSTRACT. This paper will introduce Kernel Based Clustering, a method for removing die in close proximity to fail clusters and detecting common clusters in terms of shape, region on the wafer and failure mode.

11:00
Ankush Srivastava (NXP Semiconductor India Pvt Ltd, India)
Adit Singh (Auburn University, United States)
Virendra Singh (Indian Institute of Technology (IIT) Bombay, India)
Kewal Saluja (University of Wisconsin, United States)
Exploiting Path Delay Test Generation to Develop Better TDF Tests for Small Delay Defects

ABSTRACT. This paper shows that Path Delay Fault (PDF) test generation can be exploited to not only generate TDF tests more efficiently, but the resulting TDF test sets are also more compact with better SDD coverage.

11:30
Irith Pomeranz (Purdue University, United States)
POSTT: Path-oriented Static Test Compaction for Transition Faults in Scan Circuits

ABSTRACT. This paper describes a static test compaction procedure for transition faults that preserves the lengths of the paths through which transition faults are detected in order to preserve the ability to detect small delay defects.

10:30-12:00 Session S3: Special Session: Emerging Topics in Security and Trust I
Chair:
Jennifer Dworak (Southern Methodist University, United States)
10:30
Brian Dupaix (Air Force Research Lab, United States)
Test Opportunities to Reduce Time and Expertise Required to Assess (TERA) for Trust
SPEAKER: Brian Dupaix

ABSTRACT. This talk describes how some of the artifacts from the component creation process can potentially be applied to produce quantifiable assessment results for trustworthiness of electronic components while simultaneously reducing the time required for evaluation.

11:00
Patrick Schaumont (Virginia Tech, United States)
Fault Injection Attacks and their Mitigation in Embedded Processors

ABSTRACT. In the Internet of Things, the cyber-world will use a huge number of small embedded computing elements to control and sense the real world. The integrity and trustworthiness of these embedded systems are crucial; their manipulation has direct consequences to the safety of the applications they support. We discuss the threat vector of fault injection attacks on these embedded systems. A fault injection attack is the deliberate insertion of a computation error or memory error. We highlight the use of fault injection as a versatile hacking tool to obtain device control and to extract secret data. The traditional technique, differential fault analysis, dates back almost two decades, and many effective variants have since been proposed. We show that fault attacks apply equally well to hardware as to software. We then discuss a generic countermeasure against fault injection attacks, based on micro-architecture enhancements and software support. The FAME (Fault Aware Microprocessor Extension) architecture uses sensors to capture fault injection and uses software to provide a user-defined fault response. We present a prototype ASIC design and preliminary testing data for fault attacks. We demonstrate that, compared to traditional redundancy based techniques, FAME has a lower overhead in area as well as in performance.

11:30
An Chen (Semiconductor Research Corporation, United States)
Opportunities in Emerging Technologies for Hardware Security
SPEAKER: An Chen

ABSTRACT. As the conventional CMOS scaling approaches fundamental limits, semiconductor research has focused on beyond-CMOS materials, devices, and architectures. For 35 years, the Semiconductor Research Corporation (SRC) has played a critical role in industry collaboration, research funding, and education. In the last decade, the Nanoelectronics Research Initiative (NRI) under SRC has explored numerous beyond-CMOS technologies and developed comprehensive methodologies to assess them. Although the research of emerging materials and devices has focused on their applications in the computing and memory space, some unique characteristics of these materials and devices may be utilized for hardware security primitives and solutions. These characteristics include switching polarity, hysteresis, or I-V curves that are tunable, randomness that is programmable and intrinsic to device mechanisms, logic switches that have built-in and variable retention, etc. These characteristics may be utilized effectively in logic encryption, camouflaging, true random number generator, physical unclonable functions, etc. Some promising emerging devices may provide a technology platform for energy-efficient, intelligent, and secure systems. Although emerging technologies have demonstrated feasibility for security applications and may enable more efficient solutions with enhanced functionalities, their reliability and robustness need to be carefully evaluated. It is important that these physical characteristics and implementations of security primitives are connected to system designs to be verified, assessed, and optimized. This presentation will discuss the opportunities and challenges of emerging technologies for hardware security and review relevant SRC programs, e.g., Trustworthy and Secure Semiconductors and Systems (T3S).

10:30-12:00 Session S4: Special Session: Machine Learning in Testing Applications

Organizer: Peilin Song, IBM Research

Chairs:
Xiaowei Li (Key Laboratory of Computer System and Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China, China)
Peilin Song (IBM, United States)
Discussant:
Xinli Gu (Huawei Technologies, Inc., United States)
10:30
Yu Huang (Mentor, A Siemens Business, United States)
The Emerging Applications of Machine Learning in Testing
SPEAKER: Yu Huang

ABSTRACT. Machine learning has already been applied in different fields of EDA. In the testing area, it has been applied in data mining for yield learning, root cause analysis for years. Some recent research has applied it to test scheduling and DFT planning. In the near future, we will see more research and development of its applications in diagnosis or even ATPG. In this talk, we will discuss the machine learning applications in testing and predict its trending.

11:00
Yiorgos Makris (UT Dallas, United States)
Enhanced Lithographic Hotspot Detection Through Design of Experiments

ABSTRACT. Continuous technology scaling and the introduction of advanced technology nodes in Integrated Circuit (IC) fabrication has exposed new manufacturability issues. Lithographic hotspots are one of such problems which are a result of complex process interactions. These hotspots are known to vary from design to design and foundries expect such hotspots to be predicted early and corrected in the design stage itself, as opposed to a process fix for every hotspot, which would be intractable. Various efforts have been made in the past to address this issue by using a known database of hotspots as a source of information. Most of these works use either Machine Learning (ML) or pattern matching techniques to identify and predict hotspots in new incoming designs. Often these methods suffer from high false-alarm rates and some of the main reasons for this are: (a) these methods are oblivious to the root cause of hotspots, and (b) non-availability of a large hotspot database to learn from. In this work, we try to address these issues by using a novel Design Of Experiments (DOE) approach. We analyze the effectiveness of proposed methods against the state-of-the-art on a 45nm process, using industry standard tools and designs.

11:30
Rob Aitken (ARM, United States)
Opportunities in Machine Learning and Test
SPEAKER: Rob Aitken

ABSTRACT. Machine learning (ML) has enjoyed a great resurgence in the last few years as algorithms have improved and compute technology has advanced to the point where complex neural nets can be processed quickly enough to be useful aids to applications as diverse as image recognition, preventative maintenance, and design verification. With such success, it seems reasonable to expect that ML can be applied to test as well. This talk looks at lessons from nearby domains and gives suggestions on potential benefits and pitfalls.

14:00-15:30 Session 10: DFT Architectures and Compression
Chair:
Peter Wohl (Synopsys, United States)
Discussant:
Hardik Bhagat (Globalfoundries, India)
14:00
Saurabh Gupta (Southern Methodist University, Dallas, Texas, USA, United States)
Al Crouch (Amida Technology Solutions, Inc, Austin, Texas, USA, United States)
Jennifer Dworak (Southern Methodist University, Dallas, Texas, USA, United States)
Daniel Engels (Southern Methodist University, Dallas, Texas, USA, United States)
Increasing IJTAG Bandwidth and Managing Security through Parallel Locking-SIBs
SPEAKER: Saurabh Gupta

ABSTRACT. A parallel IJTAG network provides high bandwidth access to the embedded instruments. A successful implementation requires designing parallel SIBs along with addressing new security challenges that arise with parallel Locking-SIBs.

14:30
Vivek Chickermane (Cadence Design Sstems, United States)
Krishna Chakravadhanula (Cadence Design Systems, United States)
Paul Cunningham (Cadence Design Systems, United States)
Brian Foutz (Cadence Design Systems, United States)
Dale Meehl (Cadence Design Systems, United States)
Louis Milano (Cadence Design Systems, United States)
Christos Papameletis (Cadence Design Systems, United States)
David Scott (Cadence Design Systems, United States)
Steev Wilcox (Cadence Design Systems, United States)
Advancing Test Compression to the Physical Dimension

ABSTRACT. Test Compression ratios are currently stalled at 100-200X. A new 2-dimensional physically-aware sequential CoDec design addresses the severe wiring congestion as well as the test coverage droop and pattern spike at the highest compression ratios.

15:00
Jerzy Tyszer (Poznan University of Technology, Poland)
Sylwester Milewski (Poznan University of Technology, Poland)
Nilanjan Mukherjee (Mentor Graphics, United States)
Janusz Rajski (Mentor Graphics, United States)
Jedrzej Solecki (Mentor Graphics, United States)
Justyna Zawada (Poznan University of Technology, Poland)
Full-Scan LBIST with Capture-per-Cycle Hybrid Test Points

ABSTRACT. The paper presents a novel LBIST scheme addressing test requirements of automotive electronics. It uses pseudorandom test patterns delivered in a test-per-clock fashion in conjunction with per-cycle-driven hybrid test points.

14:00-15:30 Session ITC-A: ITC Asia Best Papers
Chair:
Shi-Yu Huang (National Tsing Hua University, Taiwan, Taiwan)
Discussant:
Yu Huang (Mentor Graphics, United States)
14:00
Bing-Yang Lin (Mediatek, Taiwan)
Hsin-Wei Hung (NTHU, Taiwan)
Shu-Mei Tseng (NTHU, Taiwan)
Chi Chen (NTHU, Taiwan)
Cheng-Wen Wu (NTHU, Taiwan)
Highly Reliable and Low-Cost Symbiotic IOT Devices and Systems
SPEAKER: Bing-Yang Lin

ABSTRACT. IOT has seen countless potential applications that can improve our lives dramatically, but after years of efforts by numerous companies and organizations, the beautiful dreams are yet to be realized. The main obstacles are cost and energy consumption constraints of the devices and systems, which still cannot be contained. As a step forward in improving the reliability and reducing the cost and energy consumption of IOT devices and systems, at ITC-Asia17 we proposed a high-level model for efficient design-space exploration, which is called the symbiotic system (SS) model. Based on that, we also proposed a quorum-sensing model for SS to improve the reliability of IOT systems that contain subsystems. Preliminary experimental result shows that it is possible for an IOT system to achieve low cost, low energy consumption, and high reliability. In this extended work we discuss more evaluation results, and show that by using quorum-sensing-based peer-repair, up to 97% of the faulty devices can be repaired even when the raw yield is only 30%. It shows that by adopting the proposed approach, there is hope in eliminating production test of symbiotic IOT devices in the future.

14:30
Shuo-Lian Hong (National Cheng Kung University, Taiwan)
Kuen-Jong Lee (National Cheng Kung University, Taiwan)
A Run-Pause-Resume Silicon Debug Technique with Cycle Granularity for Multiple Clock Domain Systems
SPEAKER: Kuen-Jong Lee

ABSTRACT. A novel run-pause-resume (RPR) debug methodology that can achieve complete cycle-level granularity of debug resolution for multiple clock domain systems is proposed. With this methodology one can pause the normal operation of a system at any cycle of any clock domain and resume the system without causing any data invalidation problem. Bidirectional transactions among different clock domains are analyzed and supported with this methodology. A debug platform with both breakpointsetup software and clock-gating hardware is developed. The former allows the user to setup the breakpoint and calculate the exact time to transmit the pause control signal. The latter converts the pause signal to appropriate gating signals for the circuits under debug and the clock domain crossing interface. Experimental results show that the hardware area overhead is very small and 100% debug resolution is achieved. The experimented circuits include an industrial JPEG decoder system, several open-source cores and a system containing three clock domains.

15:00
Matthew Beckler (Carnegie Melon University, United States)
Shawn Blanton (CMU, United States)
GPU-Accelerated Fault Dictionary Generation for the TRAX Fault Model
14:00-15:30 Session S5: Special Session:Emerging Topics in Security and Trust II
Chair:
Ujjwal Guin (Auburn University, United States)
Discussant:
Naghmeh Karimi (University of Maryland Baltimore County (UMBC), United States)
14:00
Domenic Forte (University of Florida, United States)
Upgrade/Downgrade: A Perspective on Challenges and Opportunities in Overcoming the Legacy System Issue
SPEAKER: Domenic Forte

ABSTRACT. Legacy electronic systems are vital to commercial and government infrastructures, with many that were built in 1960’s and 1970’s still in use today. However, their long lifetimes cause a major problem for the organizations assigned to maintain them – obsolescence. Legacy electronic chips/software are typically no longer being fabricated/supported by the original component manufacturer/developer. In the case of hardware (HW), purchasing the original component from the market is time consuming and costly; a problem only exacerbated by the need to ensure that it isn’t fake or counterfeit. Although newer chips are likely to have better performance and less security issues/bugs, they are difficult to employ due to forward and backward compatibility issues between hardware, software (SW), and firmware (FW). Finally, reproducing the entire system is also nontrivial. As a result of company merges, migration of engineers between companies, and so forth, original hardware design files and/or software codes are often lost or unavailable. This presentation will provide a perspective on the challenges and opportunities that lay in overcoming the obsolescence issue through emerging technologies and advances in automation. It will also highlight the crucial roles that test, verification, validation, and hardware security communities can play in two different paths: (i) Upgrade where a legacy system’s HW and FW is automatically reverse engineered and re-produced from new elements with the goals of faithfully matching the functionality and parametric behavior of the original as well as improving security; and (ii) Downgrade where new chips are adapted to match the specification of previous generations and integrate them into legacy systems.

14:30
Jeyavijayan Rajendran (Texas A&M University, United States)
Supply-Chain Risks in Additive Manufacturing

ABSTRACT. As 3D printing becomes even more pervasive and manufacturing times and costs continue to shrink, more businesses and consumers invest in this revolutionary technology. One of the countless benefits of this technology is the ability to localize production and reduce logistic costs for parts and materials. Despite its countless benefits, this new manufacturing paradigm also raises concerns about the trustworthiness of the process, especially since contemporary business models have switched to the globalization of the manufacturing process and supply chain over multiple (potentially untrusted) parties. In this work, we assess the risks of 3D printing, present multiple attacks on the process and provide a comprehensive taxonomy of different applicable threats. We further evaluate different detection methods over two attack scenarios using finite element analysis and physical testing with an ultrasonic and tensile test. 

15:00
Krishnendu Chakrabarty (Duke University, United States)
Securing Chip-Scale Microbiology and Biochemistry: Attacks and Countermeasures for Microfluidic Biochips

ABSTRACT. Since microfluidics was introduced in the 1990s, there has been a considerable amount of work on biochip design and chip-scale adaptation of biomolecular protocols. However, security assessment and secure biochip design have not received much attention. Microfluidic biochips can be tampered with to modify the outcome of bioassays and to steal proprietary biomolecular protocols, thereby undermining the quality of and trust in laboratory analysis, healthcare, and the landscape of innovation in biotechnology. This presentation will identify threats, vulnerabilities, attacks, actors, and countermeasures for various microfluidic platforms. The speaker will also describe some recent proposals to secure microfluidic biochips from specific attacks.

14:00-15:30 Session TUT2: Automotive Embedded Tutorial
Chair:
Leroy Winemberg (NXP, United States)
Discussant:
Christophe Eychenne (Bosch, France)
14:00
V Prasanth (Texas Instruments, India)
David Foley (Texas Instruments, United States)
Srivaths Ravi (Texas Instruments, India)
Part 1: Demystifying Automotive Safety and Security for Semiconductor Developer
SPEAKER: V Prasanth

ABSTRACT. Increasing electronics, software and connectivity drive two consumer concerns – “functional safety” and “security” in the advanced automotive systems today. This embedded tutorial dissects these concerns and translates them into semiconductor development requirements.

14:45
Grigor Tshagharyan (Synopsys, Armenia)
Gurgen Harutyunyan (Synopsys, Armenia)
Yervant Zorian (Synopsys, United States)
Part 2: An Effective Functional Safety Solution for Automotive Systems-on-Chip

ABSTRACT. A functional safety solution based on multi-purpose built-in self-test and repair infrastructure for automotive SoCs is presented. This solution allows building a hierarchical network and managing it in multiple in-field test and repair modes.

16:30-17:30 Session K2: Security Keynote: Ultra-low Energy Security Circuit Primitives for IoT Platforms, Sanu Mathew, Intel

Low-area energy-efficient security primitives are key building blocks for enabling end-to-end content protection, user authentication and data security in IoT platforms. This talk describes the design of security circuit primitives that employ energy-efficient circuit techniques with optimal hardware-friendly arithmetic for seamless integration into area/battery constrained IoT systems: 1) A 2040-gate AES accelerator achieving 289Gbps/W efficiency in 22nm CMOS, 2) Hardened hybrid Physically Unclonable Function (PUF) circuit to generate a 100% stable encryption key. 3) All-digital TRNG to achieve >0.99 min-entropy with 3pJ/bit energy-efficiency. The talk will also discuss design issues related to side-channel leakage of key information, and how they may be addressed during design of encryption circuits. Finally, the talk will touch upon existing challenges of maintaining the integrity of security circuits, while still enabling testability and post-silicon validation.

 

Bio:

Sanu Mathew is a Senior Principal Engineer with the Circuits Research Labs at Intel Corporation, Hillsboro, Oregon, where he leads research & development of energy-efficient hardware accelerators for encryption & security. Sanu obtained his Ph.D. degree in Electrical and Computer Engineering from State University of New York at Buffalo in 1999. He holds 41 issued patents, with another 63 patents pending and has published over 77 conference/journal papers. He has been with Intel for the past 18 years.