%PDF-1.4
%
1 0 obj
<>
endobj
2 0 obj
<>
endobj
3 0 obj
<>stream
IEEE
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;2018;37;9;10.1109/TCAD.2017.2772817
Obfuscation
scan-based attacks
secure scan
supply chain
testability
Secure Scan and Test Using Obfuscation Throughout Supply Chain
Xiaoxiao Wang
Dongrong Zhang
Miao He
Donglin Su
Mark Tehranipoor
endstream
endobj
4 0 obj
<>stream
x+ |
endstream
endobj
5 0 obj
<>stream
x0D+fA*&CkHњb[4V333(IkNd R&ވa154Xun
J^v:'BiM/a=L
~UFؚVe4Q<J̦l7i6EV^4ڡl[GNTv`;t
endstream
endobj
6 0 obj
<>stream
x+ |
endstream
endobj
7 0 obj
<>stream
x0D+fA(&CkHњb[4V333(IkNL4/FywcGTP*9J#}`o2| ajT2ּ2e,qTIPze,gAmM}縴."(e۪>?(tPh;D
endstream
endobj
8 0 obj
<>stream
x+ |
endstream
endobj
9 0 obj
<>stream
x0D+fALt-5Ŷhd6g2gӋ6W hXE[Muʯ(Mhu"ZޤhITثEhe2XFت,œ`tJS\55YڄpʛF;MCәrR;G
endstream
endobj
10 0 obj
<>stream
x+ |
endstream
endobj
11 0 obj
<>stream
x0D+fALtք-5Ŷhf6g2gp'9#)/FywcGTP*9J#}`o2\| ajT2ּ2e,qT8a(=2.AmM}(pp[yhmUas:ӑMx;@
endstream
endobj
12 0 obj
<>stream
x+ |
endstream
endobj
13 0 obj
<>stream
x0D+fALt-5Ŷh-f6g2gӋ6WɐW4A{'"J~inX% NRK؛-:;
{3LQh[Ձţx3lV|ߢ!2\pp[yhiTaȟq:SN?N4;A
endstream
endobj
14 0 obj
<>stream
x+ |
endstream
endobj
15 0 obj
<>stream
x0D+fA"&CkHњb[4V333(IkNL4/FywcGTP*9J#}`o2| ajT2ּ2e,qTIPze6[fgAmM}縴."(e۪>?(tQ$;E
endstream
endobj
16 0 obj
<>stream
x+ |
endstream
endobj
17 0 obj
<>stream
x0D+fALt-5Ŷhf6g2gPГ֜@
^S_(M[CUʏUhs"Fd8kIةWeyke*XFЩ,%qPze6]f |ښ>stream
x+ |
endstream
endobj
19 0 obj
<>stream
x0D+fA*&CkHњb[4V333(IkNL4/FywcGTP*9J#}`o2| ajT2ּ2e,qTIPze6]fgAmM}縴."(e۪>?(tO;C
endstream
endobj
20 0 obj
<>stream
x+ |
endstream
endobj
21 0 obj
<>stream
x0D+fA
&CkHњb[4V333(IkNL4/F$J`#*(y>7Zu05v*UakZ
8tG$f(=2-gAmM}縴."(e۪>?(tQ;F
endstream
endobj
22 0 obj
<>stream
x+ |
endstream
endobj
23 0 obj
<>stream
x0D+fALt-5Ŷh-f6g2gӋ6W&c\DIo5
֭+7]։Pj{[X'}Sa_v棕)`c:xOb*Oq[T8dYk"Ny+o^P4"2Ngt;r
endstream
endobj
24 0 obj
<>stream
x+ |
endstream
endobj
25 0 obj
<>stream
x0D+fALt-5Ŷh-f6g2gӋ6W#h>NE$V`+J(yh>7).Zuw0*eag>Z8G$f(<*EeMCe6."$EӨ.?)t~N;B
endstream
endobj
26 0 obj
<>stream
x+ |
endstream
endobj
27 0 obj
<>stream
x0D+fALt-5Ŷh-f6g2gӋ6Wb$Mމaj[0V~E %oB &E˷N^,"G+S2Vu`([U:·qȲ&EV4ڡhE'eΔu;s
endstream
endobj
28 0 obj
<>stream
x+ |
endstream
endobj
29 0 obj
<>stream
x0D+fALtք-5Ŷhf6g2gp'9"i_(I~[CUʏUhs"FdhIةWeyke*XFЩ,œ`i6KAmM}(pp[yhmUas:ӑT;I
endstream
endobj
30 0 obj
<>stream
x+ |
endstream
endobj
31 0 obj
<>stream
x0D+fALtք-5Ŷhf6g2gp'9b5ވa154Xun
J^v:'BiM/a=L
~UFؚVe4Q'[fe67iE"Ny+^P#rNg:t,;q
endstream
endobj
32 0 obj
<>
endobj
33 0 obj
<>/ProcSet[/PDF/Text]/Font<>/Properties<>>>/Annots[44 0 R 45 0 R 46 0 R]/CropBox[0 0 612 792]/Parent 47 0 R/Rotate 0/MediaBox[0 0 612 792]>>
endobj
34 0 obj
<>stream
h{[s\Ǒf#&$˲>''ÐO=oaOg]15unKXFq~OHv̚fxdgGA2TeLƟ_?r&j_5-#GJ?),f˷7g"Nl$4ooח7?YYK2by>=lDZ݅@",Bο|'Z-ۋۏh˲M|~BzoyAK%o'ܶ˷g:Ho^ek^zJ;uƤQ%O;3"%mf[!$']ِT'Ob-xuz|:i*{lmy-hImӳ/9EC]'(qt^7h2nOtn$2&/^ʨtgdaK