Download here

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Immunity-aware programming wikipedia , lookup

Portable appliance testing wikipedia , lookup

Fault tolerance wikipedia , lookup

Transcript
SOUTH EUROPEAN TEST SEMINAR - SETS 2017
AIM AND SCOPE
The aim of the seminar is to bring together Ph.D. stu- dents and researchers from universities and
companies to establish a forum for discussion and presenting the latest research results. Topics
include, but are not restricted to the following:
- Design for Testability, BIST and Embedded Test - Test Design for Reliability and Fault Tolerance - ATPG and Fault Simulation / Emulation - Defect-Oriented, Mixed Signal and Analog Test - Low Power Design and Test - Fault Diagnosis PROGRAM
1. MONDAY, MARCH 20 TH
Seminar Room: Opening Session 19:00
Welcome Introduction: Lorena Anghel
2. TUESDAY, MARCH 21 ST
08:00- 10:00 Morning Talks : Security Related Topics
Session Moderator: Giorgio Dinatale, LIRMM
Dr. Michael Kochte, U. of Stuttgart
i.
ii.
Ahmed Atteya, U. of Stuttgart
Specification and Verification of Access
Protection in Reconfigurable Scan Networks
Secure Filter for Reconfigurable Scan Network
Matthias Sauer, U. Freiburg
Sensitized Path PUF: A Lightweight Embedded
Physical Unclonable Function
Mael Gay – U. Passau
Small scale AES toolbox: Algebraic and
propositional formulas, circuitimplementations and fault equations."
17:00-19:00 Afternoon Talks: Scan, Compression, Functional Testing
Session Moderator: Hans-Joachim Wundelich, U. of Stuttgart
Mathieu Da Silva, LIRMM
Scan Chain Encryption for the Test, Diagnosis
and Debug of Secure Circuits
iii.
Harshad Dhotre (University of Bremen)
Automated Optimization of Scan Chain
Structure for Test Compression-Based Designs
iv.
Sebastian Huhn (DFKI Bremen,
University of Bremen)
VecTHOR: Architecture of TAP controller with
embedded compression and retargeting
framework
v.
Riccardo CANTORO, Politecnico di
Torino
Recent advancements in SBST
3. WEDNESDAY, MARCH 22 ND
08:00- 10:00 Morning talks: Emerging Technologies Applications
Session Moderator: Mehdi Tahoori, Karlsruhe Institute of Technology
i.
Ioana Vatajelu, TIMA
Embedded Tutorial: Emerging Technologies
based Neuromorphic Structures
Laura Roriguez, U. of Stuttgart
Neural-Network-based Fault Classification
Zahra Paria Najafi Haghi, U. of Stuttgart
Design Optimization and Fault Models in QCAbased Circuits
Samir Ben Dodo, KIT
Hardware Security Primitives based on
Sprintonics
17:00-19:00 Afternoon Talks: Fault Tolerant Design Related Topics
Session Moderator: Session Moderator: Sybille Hellebrand, U. Paderborn
ii.
Wenjing Rao, ECE department, University
of Illinois at Chicago, USA
iii.
Modeling and Constructing a guaranteed kFault Tolerance System
Matthias Kampmann, U. Paderborn
Efficient Output Masking for Faster-than-atSpeed Test
Florian Negebauer – U. Passau
Framework for quantifying and managing
accuracy in stochastic circuit design
Robust Printed Electronics Circuit Design
Dennis Weller, KIT
2
THURSDAY, MARCH 23RD
08:00-10:00 Morning Talks: Test At Speed Test related Topics
Session Moderator: Stephan Eggersgluss, U. Bremen
Chang Liu, U. of Stuttgart
Aging Monitor Reuse for Small Delay Fault
Testing
Alexander Sprenger, U. Paderborn
X-Reduction using Stochastic Compaction for
FAST
Marco RESTIFO, Politecnico di Torino
Advanced Functional Schema for optimized
Test and Stress of Automotive SoC
Felix Neubauer: U. Feiburg
iSAT3: Accurate Reasoning for Floating-Point
Arithmetic
16:00-17:20 Afternoon Talks: Miscellaneous Test Issues
Session Moderator: Ilia Polian, U. Passau
Stefan Holst, Assistant Professor, Kyushu
iv.
Institute of Technology
Analysis and Mitigation of IR-Drop Induced
Scan Shift-Errors
v.
vi.
Marcello Traiola, LIRMM
Test of Approximate Circuits
Pascal Raiola
SAT-based Combinational and Sequential
Dependency Computation
4. FRIDAY, MARCH 24 TH
CLOSING ACTIVITIES
3
ABSTRACTS
1. SECURITY RELATED TOPICS
Dr. Michael Kochte, U. of Stuttgart
Specification and Verification of Access Protection in Reconfigurable Scan Networks
A large amount of on-chip infrastructure, such as design-for-test, debug, monitoring, or calibration, is
required for the efficient manufacturing, debug, and operation of complex hardware systems. The access
to such infrastructure poses severe system safety and security threats since it may constitute a sidechannel exposing internal state, sensitive data, or IP to attackers.
Reconfigurable scan networks (RSNs) have been proposed as a scalable and flexible scan-based access
mechanism to on-chip infrastructure. While secure RSN architectures have been recently considered in
literature, the increasing number and variety of integrated infrastructure as well as diverse access
constraints over the system lifetime demand for systematic methods for the specification and formal
verification of access protection and security properties in RSNs.
This work presents a novel method to specify and verify fine-grained access permissions and restrictions
to instruments attached to an RSN. The permissions and restrictions are transformed into predicates
that are added to an overall model of a given RSN to formally prove which access properties hold or do
not hold.
Ahmed Atteya, U. of Stuttgart
Secure Filter for Reconfigurable Scan Network
Reconfigurable Scan Networks (RSNs) can be used to access, test, and configure different instruments
on modern SOCs. However due to the complexity of their structures, new methods need to be developed
to ensure the security of the SOCs and prevent attackers from being able to access or configure secured
parts of the RSN. In this work, a new technique is presented for creating filters for RSNs that is able to
detect and prevent attempts of access to protected registers. As well as ensuring that only well formed
accesses are performed.
Matthias Sauer, U. Freiburg
Sensitized Path PUF: A Lightweight Embedded Physical Unclonable Function
Physical unclonable functions (PUFs) can be used for a number of security applications, including secure
on-chip generation of secret keys. We introduce an embedded PUF concept called sensitized path PUF
(SP-PUF) that is based on extracting entropy out of inherent timing variability of modules already
present in the circuit. The new PUF sensitizes paths of nearly identical lengths and generates response
bits by racing transitions through different paths against each other. SP-PUF has lower area overhead
and higher speed than earlier embedded PUFs and requires no helper data stored in non-volatile
memory beyond standard error-correction information for fuzzy extraction. Compared with standalone
PUFs, the new solution intrinsically and inseparably intertwines PUF behavior with functional circuitry,
thus complicating invasive attacks or simplifying their detection.
Mael Gay – U. Passau
Small scale AES toolbox: Algebraic and propositional formulas, circuit-implementations and
fault equations."
Cryptography is one of the key technologies ensuring security in the digital domain. As such, its
primitives and implementations have been extensively analyzed both from a theoretical, cryptoanalytical perspective, as well as regarding their capabilities to remain secure in the face of various
attacks.
4
One of the most common cyphers, the Advanced Encryption Standard (AES) [1] (thus far) appears to be
secure in the absence of an active attacker. This renders the research and development of new or
improved attacks difficult because it is unlikely that the entire cipher will be broken right away. To
resolve this issue, [2] presented a small scale version of the AES with a variable number of rounds,
number of rows, number of columns and data word size, and a complexity ranging from trivial up to the
original AES.
In this paper we present a collection of various implementations of the relevant small scale AES versions
based on hardware, algebraic representations and their translation into propositional formulas.
Additionally, we present fault attack equations for each version.
5
2. SCAN, COMPRESSION, FUNCTIONAL TESTING
Mathieu Da Silva, LIRMM
Scan Chain Encryption for the Test, Diagnosis and Debug of Secure Circuits
Crypto-processors are the target of scan attacks. An attacker exploits facilities offered by scan chains to
retrieve embedded secret data closely related to the key. However, scan design is the most popular and
efficient method to test circuit. The goal is to preserve test efficiency, diagnostic and debug while
counteracting security threats. The solution proposed is to use the secret key already stored in the circuit
under test in order to encrypt test patterns by adding extra blocks ciphers. Both control and observed
test data are thus unusable without the knowledge of the key.
Harshad Dhotre (University of Bremen)
Automated Optimization of Scan Chain Structure for Test Compression-Based Designs
The physical defects caused due to impurities or process flaws during the manufacturing of an Integrated
Circuit (IC) results in stuck-at, stuck-open, bridging and delay faults.
These faults may cause malfunctioning of an IC and causing failure of system. These faults are modeled
and detected with help of Design for Testability (DFT) techniques. The Embedded Deterministic Test
(EDT) based designs are used in some IC’s to compress the scan test patterns and decrease the Test Data
Volume (TDV) thereby reduce test time and corresponding costs. The Automatic Test Pattern Generation
(ATPG) tool attempts to find an input assignment or patterns for a circuit such that the faults are
detected for the EDT based design. The faults which cannot be detected due to insufficient encoding
capacity of EDT and linear dependency are called as EDT Aborts (EAB). The EAB faults cause a notable
coverage loss in some designs.
A new approach is proposed to form scan chains which results in reduced number of EAB faults and
increase in the test coverage considering timing constraints or routing. This approach places the scan
cells corresponding to care bits at appropriate positions reducing linear dependency during pattern
generation. The previous approaches in industries to change scan chain architecture were to reduce
power and increase speed but not in improving test coverage or reduce EAB faults. The new approach
was used on some industrial projects as benchmarks and the results were found to be better than the
previous by default architecture. The approach is totally automated and can be integrated into the
existing design flow.
Sebastian Huhn (DFKI Bremen, University of Bremen)
VecTHOR: Architecture of TAP controller with embedded compression and retargeting
framework
System-on-Chip (SoC) designs are widely used in the semiconductor industry which typically contain
several nested sub-modules at once. These SoC designs necessitate board as well as in-field testing
capabilities and, furthermore, debugging techniques have also to be applicable. Generally, a dedicated
test access mechanism is embedded into the design to allow access to certain sub-modules. For instance,
the IEEE 1149.1 Std. specifies a commonly used test interface. In this scenario, strong memory
limitations exist on the test equipment that restrict the testing respectively debugging capabilities of
complex designs. Furthermore, due to the typical slow transfer speed of those interfaces, the test
application time should be also taken into account.
To tackle both challenges, i.e., reducing the test data volume as well as the test application time, a
standardized IEEE-1149.1-compliant TAP controller is extended by a dynamically configurable codebased compression architecture. This extension sill ensures the full legacy support and allocates only
slightly more hardware resources. Besides this architecture, a suitable software framework is required
that processes existing test sequences to take advantage of the proposed compression technique.
Hereby, the actual configuration of the embedded dictionary is most important. To realize this
retargeting procedure, a heuristic retargeting algorithm is drawn and benchmark runs show that some
shortcomings exist while processing high-entropic test data. Thus, a formal optimization-based
approach is implemented which determines an optimal dictionary that leads to higher compression in
test data volume and a reduced test application time. However, this formal approach consumes a high
6
run-time for the retargeting procedure which limits the overall size of test data that can be processed.
Consequently, this work introduces a partitioning technique into the retargeting flow. By invoking this
scheme, test data of arbitrary size can be processed. Additionally, the embedded compression technique
is extended in the way that a reconfiguration is also supported within the data stream, not only once in
front of the data transfer. Thus, the formal engine determines optimal dictionary partitions being
configured partition-wise leading to better results especially for huge test data sizes.
Benchmarks have shown that this approach allows to reduce the test data volume measurably even for
high-entropic data. For instance, the volume of fully-specified test data for industrial designs were
reduced by up to 50% and the number of required test cycles were decreased by nearly a fifth at once.
Finally, results of the current work in progress is drafted which improves the retargeting process even
more by introducing a partitioning and multi-reconfiguration scheme.
Riccardo CANTORO, Politecnico di Torino
Recent advancements in SBST
Software-based self-test (SBST) is becoming a real solution for the in-field test of modern electronic
devices based on microprocessors. This technique consists in uploading a test program in the available
memory (e.g., flash, caches) and forcing the processor to execute it: when the behavior (or results) of the
program is deviated in presence of a fault, then the fault is detected. This talk discusses about state-ofthe art and future perspectives of SBST generation techniques, highlighting their main advantages and
limitations when applied to industrial design flows. Experimental results are presented on both
academic and industrial processors.
7
3. EMERGING TECHNOLOGIES APPLICATIONS
Ioana Vatajelu, TIMA
Embedded Tutorial: Emerging Technologies based Neuromorphic Structures
The power and reliability issues of today's memories limit the improvements attained by their
implementation in scaled technology nodes. Several emergent memory technologies attempt to address
the technical constraints of today's memories, amongst which, the most promising solutions are the
Spin-Transfer-Torque Magnetic Random Access Memories (STT-MRAMs) and the Resistive Random
Access Memories (RRAM). One of the great advantages of the emerging memories is that they favor
increasing system complexity and performance. New applications and computation paradigms, such as
neuromorphic computing, unfeasible a few years back due to technological limitations, can take profit
from this technology. Intensive research has been conducted recently related to resistive and magnetoresistive device physics and their implementation as dedicated hardware for neuromorphic computing,
however, little work has been conducted to evaluate the reliability of such circuits. In this talk I will
describe the main characteristics of neuromorphic synaptic weights and artificial neutrons and how they
can be implemented using the main emerging memory technologies.
Laura Roriguez, U. of Stuttgart
Neural-Network-based Fault Classification
In order to reduce the number of defective parts and increase yield, especially in early stages of
production, systematic defects must be identified and corrected as soon as possible. Machine learning
can be taken advantage of due to the enormous amount of data available from test and diagnosis. This
talk presents a technique to raise a warning and prioritize costly physical analysis. Relevant values
related to fault activation are extracted with simulation. Then, a neural network predicts the fault class
to which the underlying defect belongs.
Zahra Paria Najafi Haghi, U. of Stuttgart
Design Optimization and Fault Models in QCA-based Circuits
QCA (Quantum-dot Cellular Automata) is a promising emerging nanotechnology which has been
introduced as an alternative to traditional CMOS VLSI. QCA features such as faster speed, smaller size
and low power consumption have made it so interesting to researchers in recent years. QCA operation
is based on single electron effects in Quantum-dots, to transfer data within its cells. Till now current
CMOS technology has been successful in keeping pace with increasing number of transistors. But as the
size of circuits scales down to the Nano level, some new fundamental challenges will be faced which can
dominate the devices’ performances. Some technology challenges like power consumption due to
leakage current, which is a result of decreasing supply voltage, make transistor-based technologies
resistance to scaling. Quantum effects, non-deterministic behavior of small currents and design
complexity are other challenges which may hold back further progress of microelectronics using
conventional scaling. Thus the need for alternative technologies seems unavoidable.
Nanotechnology is a possible solution for these problems. Some of them are carbon nanotubes,
quantum-dot structures, molecular devices and microfluidic biochips. QCA in an emerging paradigm
which allows an operation in the frequency range of THz (adiabatically), and since quantum-dots can
theoretically be shrunk down to molecular size, has the potential to have an integration density about
900 times more than what we can reach in current transistor-based technologies. In this work we
analyze the design rules in QCA in detail and see different design configurations by giving an example.
The aim is to make some optimizations in configuration and find an efficient way for designing with QCA.
These different configurations may also be used as faulty models in testing a QCA design. On the other
hand, different fault models are discussed by describing the way of fault detection in QCA circuits.
Samir Ben Dodo, KIT
Hardware Security Primitives based on Sprintonics
8
With the growing adoption of the Internet of Things , security is becoming a major challenge especially
for battery operated devices. Spin Transfer Torque – Magnetic RAM technology is a promising candidate
for these low power devices with many beneficial attributes such as non-volatility, no leakage, high
density and CMOS-compatibly. For memory application, this technology is currently facing reliability
challenges with process variations and stochastic switching time. However, from the security
perspective, these random variations can be exploited as hardware security primitives. This presentation
will detail the benefits of process variations for Physical Unclonable Function and the advantages of
stochastic switching for True Random Number Generator. Potential directions to improve these
Spintronics security primitives will be discussed.
4. FAULT TOLERANT DESIGN RELATED TOPICS
Wenjing Rao, ECE department, University of Illinois at Chicago, USA
Modeling and Constructing a guaranteed k-Fault Tolerance System
This work focuses on a system that can be proven to tolerate k faults, based on self-repair using spare
elements. A repair is carried out by a “replacement chain” of Processing Elements (PE’s), starting with a
spare, each taking over the task of the next one, to eventually reaching a faulty PE. Based on a Task-PE
relationship model, a “replacement chain algebra” can be formulated. This makes it possible to calculate
precisely how a repair will affect all the other potential repairs in the future, and to determine whether
the system remains repairable for subsequent faults. Overall, two equivalent conditions (both necessary
and sufficient) can be proven for such a system to be guaranteed k-FT, supporting on-the-fly repair after
every fault occurrence. We further propose a physical implementation of the system, where each PE is
assigned to a Router in the neighborhood. A localized Auxiliary Network is used to provide assignments
flexibilities between each Router and its peripheral PE’s. Faulty PE’s are repaired via spare PE’s in the
array, and replacement chains are implemented by shifting the assignments between Routers and
PE’s. This architecture is isomorphic to the Task-PE model, thus can be designed to deliver a proven
level of fault tolerance properties, while being scalable in hardware and interconnect overheads.
Matthias Kampmann, U. Paderborn
Efficient Output Masking for Faster-than-at-Speed Test
Hidden small delay defects pose a reliability issue since they can sometimes escape even state-of-the-art
timing-aware at-speed tests. Faster-than-at-speed test (FAST) is an approach to overcome these
limitations by overclocking the circuit under test (CUT), thus making even small additional delays
visible. However, FAST also introduces a large number of unknown logic values (X-values) into the test
responses since some outputs might be sampled before they have completed their computation. The rate
of these X-values depends on the target frequency, making conventional X-tolerant compaction
impractical for FAST. To support X-tolerant compaction during FAST, this talk presents and evaluates a
special Design-for-FAST approach that analyzes the topology of the CUT to obtain a scan-chain
configuration exploiting the individual “X-profiles“ of the scan-flip- flops (SFFs). This allows to
implement a very simple and efficient X-masking strategy to drastically reduce the amount of X-values
arriving at the compaction circuit. Furthermore, the presented SFF clustering method is easily
integrateable into existing commercial synthesis tools.
Simulation results indicate that the proposed Design-for-FAST approach indeed reduces the X- values to
quite large extends but also requires to trade of the reduction in X-values against the fault efficiency.
Special algorithms to generate the mask data are presented to allow fine-grained control over fault
efficiency, reduction in X-values and mask data overhead. Overall, this talk shows that the presented
approach should relieve the requirements of the compaction circuit significantly.
Florian Negebauer – U. Passau
Framework for quantifying and managing accuracy in stochastic circuit design
Stochastic circuits (SCs) offer tremendous area- and power-consumption benefits at the expense of
computational inaccuracies. Managing accuracy is a central problem in SC design and has no counterpart
in conventional circuit synthesis. It raises a basic question: how to build a systematic design flow for
stochastic circuits? We present, for the first time, a systematic design approach to control the accuracy
of SCs and balance it against other design parameters. We express the (in)accuracy of a circuit processing
9
n-bit stochastic numbers by the numerical deviation of the computed value from the expected result, in
conjunction with a confidence level. Using the theory of Monte Carlo simulation, we derive expressions
for the stochastic number length required for a desired level of accuracy, or vice versa. We discuss the
integration of the theory into a design framework that is applicable to both combinational and sequential
SCs. We show that for combinational SCs, accuracy is independent of the circuit’s size or complexity, a
surprising result. We also show how the analysis can identify subtle errors in both combinational and
sequential designs.
Dennis Weller, KIT
Robust Printed Electronics Circuit Design
Nowadays, printed electronics are gaining more and more attention as an advantageous technology
deployed for smart sensors, "Internet of Things" (IoT), wearables and other domains. It enables the
production of electrical circuits with low costs and printable on flexible substrates without the need for
clean rooms in contrast to silicon technologies. However, there are still some challenges to be tackled,
like the comparable big feature size, low printing accuracy and poor printing quality using state of the
art ink-jet printers. In this talk, we overview the development of printed electronics based on electrolytegated inorganic materials which provide high mobility and low voltage operation, which is very
promising in IoT applications. Furthermore, we provide some examples how increased reliability of
printed designs can be achieved.
10
5. TEST AT SPEED TEST RELATED TOPICS
Chang Liu, U. of Stuttgart
Aging Monitor Reuse for Small Delay Fault Testing
Small delay faults receive more and more attention, since they may indicate a circuit reliability
marginality even if they do not violate the timing at the time of production. At-speed test and fasterthan-at-speed test (FAST) are rather expensive tasks to test for such faults.
The paper at hand avoids complex on-chip structures or expensive high-speed ATE for test response
evaluation if aging monitors which are integrated into the device under test anyway are reused. The
main challenge in reusing aging monitors for FAST consists in possible false alerts at higher frequencies.
While a particular test vector pair makes a delay fault observable at one monitor, it may also exceed the
time slack in the fault-free case at a different monitor which has to be masked. Therefore, a
multidimensional optimizing problem has to be solved for minimizing the masking overhead, the
number of test vectors and the number frequencies while maximizing delay fault coverage.
Marco RESTIFO, Politecnico di Torino
Advanced Functional Schema for optimized Test and Stress of Automotive SoC
Thermal and electrical stress phases are commonly applied to automotive devices at the end of
manufacturing test to give rise to early life latent failures. This paper proposes a new methodology to
optimize the stress procedures during the Burn-In phase. In the proposed method, stress of CPU, RAM
memory and FLASH memory are run in parallel using DMA and CACHE interventions. In the talk I will
report some experimental results gathered in an automotive microcontroller, with a comparison
between traditional and parallelized burn-in stress techniques.
Alexander Sprenger, U. Paderborn
X-Reduction using Stochastic Compaction for FAST
Test response compaction is a major challenge in faster-than-at-speed-test (FAST). As the test is run at
a higher clock rates, the signal values on long paths may not have stabilized at the respective observation
times. This results in a larger number of unknown logic values (X-values) to be handled by the
compaction scheme. Moreover, FAST typically uses several different frequencies, which leads to varying
X-rates during the test. Therefore, an X-tolerant compaction method specifically tailored to FAST is
needed.
It has been shown in the literature that a stochastic X-Compact scheme can reduce the number of X’s
while the fault efficiency is kept high. However, this requires a constant X-rate for the scan slices entering
the compactor. This presentation describes a solution for the general case. The stochastic compactor is
divided into several smaller compactors and the optimal assignment of scan chains to compactors is
determined by a clustering technique. For a “good” cluster the X-Rate at the inputs of the compactor
should vary as little as possible. This problem is NP-complete. This talk will focus on finding scan chain
clusters using Heuristics, for the stochastic X-compact scheme and showing results for the compaction
scheme.
Felix Neubauer: U. Freiburg
iSAT3: Accurate Reasoning for Floating-Point Arithmetic
The process of testing typically includes a modeling step of the system under test. Due to the different
types of systems - analog, digital or mixed-signal - this process can be challenging. Analog systems
normally work with continous (real) values while digital systems - e.g. modern computers - use Boolean
values and represent numbers with integer or floating-point arithmetic. Mixed-signal systems on the
other hand include analog as well as digital components. Thus the support of these different domains is
mandatory when they are modeled for testing purposes and the employed tool chain has to support
these domains. iSAT3 is an SMT solver, which supports a great variaty of different domains: Boolean,
integer and real. Additionally, iSAT3 was recently extended to be able to reason in the floating-point
11
domain. This talk presents the general workflow of iSAT3, the challenges of the floating-point domain as
well as an application in the field of dead code detection. Furthermore possible relations to the
testingfield are discussed.
12
6. MISCELLANEOUS TEST ISSUES
Stefan Holst, Assistant Professor, Kyushu Institute of Technology
Analysis and Mitigation of IR-Drop Induced Scan Shift-Errors
Excessive IR-drop during scan shift can corrupt test data due to hold-time violations.
We introduce new methods to assess the risk of corruption at each scan cycle and cell, and to handle
the problem by test data manipulation and masking.
Marcello Traiola, LIRMM
Test of Approximate Circuits
In the recent years Approximate Computing (AC) has emerged as new paradigm for energy efficient
design of Integrated Circuits (ICs). It addresses the problem of maintaining reliability and thus coping
with run-time errors exploiting an acceptable amount of overheads in terms of area, performances and
energy consumption. This work starts from the hypothesis that AC-based systems can intrinsically
accept the presence of faulty hardware (i.e., hardware that can produce errors). This paradigm is also
called “computing on unreliable hardware”. The hardware- induced errors have to be analyzed to
determine their propagation through the system layers and eventually determining their impact on the
final application. In other words, an AC-based system does not need to be built using defect-free ICs.
Under this assumption, we can relax test and reliability constraints of the manufactured ICs. One of the
ways to achieve this goal is to test only for a subset of faults instead of targeting all possible faults. In this
way, we can reduce the manufacturing cost since we eventually reduce the number test patterns and
thus the test time. We call this approach Approximate Test. The main advantage is the fact that we do not
need a prior knowledge of the workload (i.e., we are application independent). Therefore, the proposed
approach can be applied to any kind of IC, reducing the test time and increasing the yield. We present
preliminary results on a simple case study. The main goal is to show that by letting some faults
undetected we can save test time without having a huge impact on the application quality.
Pascal Raiola, U Freiburg
SAT-based Combinational and Sequential Dependency Computation
We present an algorithm for computing both functional dependency and unateness of combinational
and sequential Boolean functions represented as logic networks. The algorithm uses SAT-based
techniques from Combinational Equivalence Checking (CEC) and Automatic Test Pattern Generation
(ATPG) to compute the dependency matrix of multi-output Boolean functions. Additionally, the classical
dependency definitions are extended to sequential functions and a fast approximation is presented to
efficiently yield a sequential dependency matrix. Experiments show the applicability of the methods and
the improved robustness compared to existing approaches.
13