On a software-based self-test methodology and its application

Charles H.P. Wen, Li C. Wang, Kwang Ting Cheng, Kai Yang, Wei Ting Liu, Ji Jan Chen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

20 Scopus citations


Software-based self-test (SBST) was originally proposed for cost reduction in SOC test environment. Previous studies have focused on using SBST for screening logic defects. SBST is functional-based and hence, achieving a high fullchip logic defect coverage can be a challenge. This raises the question of SBST's applicability in practice. In this paper, we investigate a particular SBST methodology and study its potential applications. We conclude that the SBST methodology can be very useful for producing speed binning tests. To demonstrate the advantage of using SBST in at-speed functional testing, we develop a SBST framework and apply it to an open source microprocessor core, named OpenRISC 1200. A delay path extraction methodology is proposed in conjunction with the SBST framework. The experimental results demonstrate that our SBST can produce tests for a high percentage of extracted delay paths of which less than half of them would likely be detected through traditional functional test patterns. Moreover, the SBST tests can exercise the functional worst-case delays which could not be reached by even 1M of traditional verification test patterns. The effectiveness of our SBST and its current limitations are explained through these experimental findings.

Original languageEnglish
Title of host publicationProceedings - 23rd IEEE VLSI Test Symposium, VTS 2005
Number of pages7
StatePublished - 1 Dec 2005
Event23rd IEEE VLSI Test Symposium, VTS 2005 - Palm Springs, CA, United States
Duration: 1 May 20055 May 2005

Publication series

NameProceedings of the IEEE VLSI Test Symposium


Conference23rd IEEE VLSI Test Symposium, VTS 2005
CountryUnited States
CityPalm Springs, CA

Fingerprint Dive into the research topics of 'On a software-based self-test methodology and its application'. Together they form a unique fingerprint.

Cite this