Submitted:
07 March 2025
Posted:
07 March 2025
You are already at the latest version
Abstract
Streaming Scan Networks used in chip architectures for DFT have been significantly improved and made efficient. We can send all the test data in one packetized format. However, as scan chains become more readily accessible, they bring some very real security vulnerabilities. For example, unauthorized test access can quickly be taken off the chain, or scan-based side-channel attacks could bring about severe intellectual property leaks (IP). In this paper, we'll investigate AI-driven methods to bolster the Security of SSNs. These include detecting threats, monitoring with statistical analysis, encrypted scan strategies, and integrated hardware security. The scan architecture’s integrity and confidentiality can be protected by AI-based anomaly detection and cryptographic protections without endangering test efficiency.
Keywords:
1. Introduction
2. Contents Reviewed and Recent Works
3. Case Studies
Theoretical Model: Integrating AI into SSN Security Frameworks
- 1.
- AI-Powered Test Controller: AI. Controller: The most crucial feature of the model is this test controller. It implements machine learning algorithms to recognize security threats and make test operations as efficient as possible, operating either on a microcontroller within SOC’s innermost recesses or remotely from the customer.
- -
- At runtime, it interacts with the SSN controller (the module that puts packets onto the net and claims or allocates packets at SSN nodes).
- -
- For example, in some secure models, before every test session, the AI controller will consider:
- -
- Are test patterns soaring from all directions legitimate (by comparing their hashes against more than one known value)?
- -
- What level of access is permitted for this particular change in situation according to unique policy databases?
- -
- Only when all these checks pass does the system usually scan.
- -
- During test scanning, the AI controller monitors continuous data flows - outgoing test stimuli, incoming responses from the chip at its physiological interfaces, time & power metadata, etc.
- 2.
- Encrypted and Authenticated SSN Communication
- -
- To implement this model, all traffic in the SSN is encrypted and authenticated.
- -
- This is achieved by integrating lightweight cryptographic engines into each SSN block’s entry or exit points (e.g., the chip’s Test Access Port, decompression blocks in every core).
- -
- Keys for encrypting are managed by secure elements like a PUF or key stored in OTP memory.
- -
- The AI controller manages key exchange or derivation protocols with the tester.
- -
- For example, using a PUF-derived root key, the controller can perform a quick version of the Diffie-Hellman key exchange with the tester so that that test data will be encrypted.
- -
- This means each test session has a unique key.
- 3.
- A Real-Time Engine for Anomaly Detection:
- Low-level electro signals (voltage, current, if there are sensors available)
- Mid-level test data streams (bits coming out of the scan)
- High-level logical events (which tests are running, what modules are being accessed)
- Security - a genuinely improved line of defense against anyone trying to penetrate your test interface. Put together with encryption, intelligent monitoring, and tight brackets on access; this can raise performance.
- Test quality - oddly enough, making tests more secure can also improve them, as features like anomaly detection might catch not only attacks but unexpected design bugs or rare failure modes missed by standard tests.
- AI Advancements in DFT Security: Future work might include applying more advanced AI methods, such as reinforcement learning and generative models, to identify Trojans and side-channel leaks [1] more effectively. Transfer learning techniques could reduce the repeated training needed on different SoC designs [2].
- New Threats and Attack Models: AI could allow attackers to predict scanning patterns or pursue clever fault injection attacks [3]. Quantum computing can make all conventional cryptographic methods obsolete. This means new post-quantum encryption techniques must be employed for SSN security [4]. AI-enhanced adaptive side-channel attacks can evolve with defenses on chips. Constant model updates and adversarial learning methods will be required for this challenge [5].
- Optimization and Trade-offs: Balancing security with DFT efficiency is still a dilemma. AI offers a means of optimizing encryption overhead outlays while reducing scan latencies and ensuring compatibility with already-established compression schemes [6]. Multiple objective optimization models may be a means to achieve high anomaly detection rates while still retaining test coverage and keeping down computational costs [7]. It may be necessary to utilize formal verification methods when creating AI security models so that they do not mistakenly register abnormalities that interfere with production test procedures [8].
- AI Standardization and Frameworks: Industry-wide cooperation is needed to develop security standards. This could lead to the acceptance of IEEE 1687.1 or something similar, representing a formal standard and implementation guide for AI-based security regimes on SSN [9]. Authentication compliance will also be pushed. This will be especially true in cases where security is critical, as with automotive or medical equipment [11].
- Test System Integration with AI: Future research must go beyond chip-level security input and look at the whole test ecosystem. This would encompass protecting the supply chain and AI-supported audits [12]. AI-driven cross-chip anomaly detection can detect systemic vulnerabilities on a large scale. This will raise the level of security for the entire hardware sector [13]. Whereas for widespread adoption. Incorporating security constraints in the RTL stage can further streamline AI integration into test methodologies [14].
Conclusions
References
- Rajski, J.; Trawka, M.; Tyszer, J.; Włodarczak, B. (2025). A nonlinear stream cipher for encryption of test patterns in streaming scan networks. IEEE Transactions on Circuits and Systems I: Regular Papers, 72(2), 535–547. [CrossRef]
- Côté, J.-F.; Kassab, M.; Janiszewski, W.; Rodrigues, R.; Meier, R.; Kaczmarek, B.; … & Pant, P. (2020). Streaming Scan Network (SSN): An efficient packetized data network for testing of complex SoCs. In 2020 IEEE International Test Conference (ITC) (pp. 1–10). IEEE. [CrossRef]
- Parikh, R.; Parikh, K. (2025). Mathematical foundations of AI-based secure physical design verification. Preprints. [CrossRef]
- Kumar, G.; Riaz, A.; Prasad, Y.; Ahlawat, S. (2023). On enhancing the security of streaming scan network architecture. In 2023 IEEE 32nd Asian Test Symposium (ATS) (pp. 1–6). IEEE. [CrossRef]
- Parikh, R.; Parikh, K. (2025). Survey on hardware security: PUFs, Trojans, and side-channel attacks. Preprints. [CrossRef]
- Parikh, R.; Parikh, K. (2025). A survey on AI-augmented secure RTL design for hardware Trojan prevention. Preprints. [CrossRef]
- Shukla, S.; Kumar, B. R.; Singh, V. (2023). SSSN: Secured streaming scan network. In 2023 IEEE 24th Latin-American Test Symposium (LATS) (pp. 1–6). IEEE. [CrossRef]
- Siemens Digital Industries Software. (n.d.). Using AI for advances in test [Solution brief]. Retrieved September 5, 2025, from https://resources.sw.siemens.com/en-US/solution-brief-using-ai-for-advances-in-test.
- Siemens Digital Industries Software. (2021). Tessent Streaming Scan Network: No-compromise packetized test [White paper]. https://resources.sw.siemens.com/en-US/white-paper-tessent-streaming-scan-network/.
- IEEE. (2013). IEEE Standard for Test Access Port and Boundary-Scan Architecture (IEEE Std 1149.1-2013). https://standards.ieee.org/standard/1149_1-2013.html.
- IEEE. (2014). IEEE Standard for Access and Control of Instrumentation Embedded within a Semiconductor Device (IEEE Std 1687-2014). https://standards.ieee.org/standard/1687-2014.html.
- Singh, A.; Basak, A.; Bhunia, S.; Forte, D. (2022). Scan-based side-channel attacks: Exploiting the test infrastructure for chip security breaches. Proceedings of the 59th Annual Design Automation Conference (DAC), 1–6. ACM. [CrossRef]
- Zhang, Y.; Li, X.; Wang, J. (2024). AI-driven security enhancement for scan chains: Mitigating side-channel attacks in DFT. arXiv Preprint, arXiv:2405.12347. https://arxiv.org/abs/2405.12347.
- Kumar, G.; Riaz, A.; Prasad, Y.; Ahlawat, S. (2023). On enhancing the security of streaming scan network architecture. In 2023 IEEE 32nd Asian Test Symposium (ATS) (pp. 1–6). IEEE. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
