A New Method of Embedding Test Patterns into Test-per-Clock Bit Stream
-
摘要: 集成电路测试方案的关键在于测试向量产生器的设计.传统的测试方法在测试向量生成、测试应用的过程中,没有充分利用测试数据位流来构建测试向量,从而造成了测试时间和存储开销的增加.为了减少测试成本,提出了一种基于test-per-clock模式的内建自测试方法.通过对线性移位测试结构的分析,提出了一种递进式的反复测试生成方法:顺序求解输入位流,逆向精简,多次求解以获得更优值,最终将测试集以较小的代价嵌入到test-per-clock位流中.在测试应用时,只需存储求解后的最小输入流,通过控制线性移位的首位从而生成所需的测试集.实验结果表明,在达到故障覆盖率要求的前提下,能显著地减少测试应用时间和存储面积开销.
-
关键词:
- 内建自测试 /
- test-per-clock /
- 测试位流 /
- 测试生成 /
- 测试开销
Abstract: The key of IC testing lies in the test patterns generator (TPG) design. Traditional testing methods do not make full use of the test data bit stream to construct test patterns during the test generation and application process, which results in high test cost due to the enormous test data. Test-per-scan scheme exposes the drawback of long test application time with the test data volumes increasing. In order to reduce the test cost, a built-in self test (BIST) scheme based on test-per-clock testing is proposed. Based on the analysis of linear shift test structure, a corresponding forward-backward test patterns generation method is proposed, which efficiently embeds the test set into test-per-clock bit stream. In this method, test patterns are determined by the solution of input-stream with fault dropping, where the input-stream is composed by the first bits of these patterns. The solved minimum input-stream after repeatedly reduction is directly stored in the memory to control the linear shifter in the test application, so as to generate the whole required test set. The experimental results demonstrate that the proposed method, under the precondition of meeting the required fault coverage, can obviously shorten test application time and reduce storage area overhead compared with other approaches.-
Keywords:
- built-in self test /
- test-per-clock /
- test bit stream /
- test generation /
- test cost
-
-
期刊类型引用(6)
1. 童伟传,方友军,唐明. 基于数据挖掘的政务数据安全风险检测系统. 信息技术. 2023(02): 151-156 . 百度学术
2. 白荣华,魏强,郭瑞,刘金. 政务信息系统商用密码集约化平台设计与实现. 信息安全研究. 2023(05): 461-468 . 百度学术
3. 黎祥远. 攻防视角下的高校网络安全防护策略——基于网络安全攻防演练的研究. 华商论丛. 2023(01): 101-106 . 百度学术
4. 朱然,曾宇. 基于信任评估模型的物联网节点篡改共识仿真. 计算机仿真. 2021(04): 267-271 . 百度学术
5. 刘平. 国家公共文化云网络安全设计和实践. 百花. 2020(07): 31-34 . 百度学术
6. 张锐昕,王玉荣. 中国政府上网20年:发展历程、成就及反思. 福建师范大学学报(哲学社会科学版). 2019(05): 43-50+168 . 百度学术
其他类型引用(2)
计量
- 文章访问数:
- HTML全文浏览量: 0
- PDF下载量:
- 被引次数: 8