{"id":"https://openalex.org/W1999963159","doi":"https://doi.org/10.1109/test.2014.7035365","title":"DfST: Design for secure testability","display_name":"DfST: Design for secure testability","publication_year":2014,"publication_date":"2014-10-01","ids":{"openalex":"https://openalex.org/W1999963159","doi":"https://doi.org/10.1109/test.2014.7035365","mag":"1999963159"},"language":"en","primary_location":{"id":"doi:10.1109/test.2014.7035365","is_oa":false,"landing_page_url":"https://doi.org/10.1109/test.2014.7035365","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Test Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081952251","display_name":"Samah Mohamed Saeed","orcid":"https://orcid.org/0000-0002-8107-3644"},"institutions":[{"id":"https://openalex.org/I90965887","display_name":"SUNY Polytechnic Institute","ror":"https://ror.org/000fxgx19","country_code":"US","type":"education","lineage":["https://openalex.org/I90965887"]},{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Samah Mohamed Saeed","raw_affiliation_strings":["New York University Polytechnic School of Engineering","New York University, Polytechnic School of Engineering, USA"],"affiliations":[{"raw_affiliation_string":"New York University Polytechnic School of Engineering","institution_ids":["https://openalex.org/I90965887","https://openalex.org/I57206974"]},{"raw_affiliation_string":"New York University, Polytechnic School of Engineering, USA","institution_ids":["https://openalex.org/I57206974"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5081952251"],"corresponding_institution_ids":["https://openalex.org/I57206974","https://openalex.org/I90965887"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07379812,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11032","display_name":"VLSI and Analog Circuit Testing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11032","display_name":"VLSI and Analog Circuit Testing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/design-for-testing","display_name":"Design for testing","score":0.7683019638061523},{"id":"https://openalex.org/keywords/testability","display_name":"Testability","score":0.7390293478965759},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.705123782157898},{"id":"https://openalex.org/keywords/automatic-test-pattern-generation","display_name":"Automatic test pattern generation","score":0.5481796264648438},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.5214678049087524},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4703935384750366},{"id":"https://openalex.org/keywords/test","display_name":"Test (biology)","score":0.45699048042297363},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4419060945510864},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.41347646713256836},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3544686436653137},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17113080620765686},{"id":"https://openalex.org/keywords/electronic-circuit","display_name":"Electronic circuit","score":0.09745144844055176}],"concepts":[{"id":"https://openalex.org/C190874656","wikidata":"https://www.wikidata.org/wiki/Q5264347","display_name":"Design for testing","level":3,"score":0.7683019638061523},{"id":"https://openalex.org/C51234621","wikidata":"https://www.wikidata.org/wiki/Q2149495","display_name":"Testability","level":2,"score":0.7390293478965759},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.705123782157898},{"id":"https://openalex.org/C17626397","wikidata":"https://www.wikidata.org/wiki/Q837455","display_name":"Automatic test pattern generation","level":3,"score":0.5481796264648438},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.5214678049087524},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4703935384750366},{"id":"https://openalex.org/C2777267654","wikidata":"https://www.wikidata.org/wiki/Q3519023","display_name":"Test (biology)","level":2,"score":0.45699048042297363},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4419060945510864},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.41347646713256836},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3544686436653137},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17113080620765686},{"id":"https://openalex.org/C134146338","wikidata":"https://www.wikidata.org/wiki/Q1815901","display_name":"Electronic circuit","level":2,"score":0.09745144844055176},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/test.2014.7035365","is_oa":false,"landing_page_url":"https://doi.org/10.1109/test.2014.7035365","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Test Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1480960212","https://openalex.org/W1964344721","https://openalex.org/W2005090156","https://openalex.org/W2042812046","https://openalex.org/W2046867211","https://openalex.org/W2074295325","https://openalex.org/W2085362698","https://openalex.org/W2112832628","https://openalex.org/W2131535926","https://openalex.org/W2141715577","https://openalex.org/W2167213376"],"related_works":["https://openalex.org/W2947266479","https://openalex.org/W2369589212","https://openalex.org/W2107525390","https://openalex.org/W2151694129","https://openalex.org/W2157191248","https://openalex.org/W2164493372","https://openalex.org/W2169602749","https://openalex.org/W2114980936","https://openalex.org/W2157212570","https://openalex.org/W1579528621"],"abstract_inverted_index":{"While":[0],"manufacturing":[1],"test":[2,70,72,76],"necessitates":[3],"deep":[4],"access":[5],"into":[6],"the":[7,19,22,53,56,65,86,89,92,100],"Integrated":[8],"Circuit":[9],"(IC)":[10],"to":[11,34,42,107],"enhance":[12],"its":[13],"testability,":[14],"this":[15],"can":[16,111],"inadvertently":[17],"threaten":[18],"security":[20,54,87],"of":[21,55,88,94,102],"IC":[23,90],"in":[24,91],"security-critical":[25],"applications.":[26],"Although":[27],"black-box":[28],"testing":[29,66],"ensures":[30],"security,":[31],"it":[32],"fails":[33],"deliver":[35,49],"high-quality":[36],"test.":[37],"Therefore,":[38],"our":[39,103],"goal":[40],"is":[41],"come":[43],"up":[44],"with":[45],"DFT":[46,61,96],"techniques":[47,62],"that":[48,63,110],"testability":[50],"without":[51],"compromising":[52],"IC.":[57],"We":[58,98],"propose":[59,80],"various":[60],"tackle":[64],"challenges,":[67],"such":[68],"as":[69],"time,":[71],"data":[73],"volume,":[74],"and":[75],"power.":[77],"Furthermore,":[78],"we":[79],"different":[81],"scan":[82,105],"attacks,":[83],"which":[84],"circumvent":[85],"presence":[93],"advanced":[95],"techniques.":[97],"identify":[99],"limitations":[101],"proposed":[104],"attacks":[106],"develop":[108],"countermeasures":[109],"thwart":[112],"these":[113],"attacks.":[114]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
