6 research outputs found
Exploiting Nanoelectronic Properties of Memory Chips for Prevention of IC Counterfeiting
This study presents a methodology for anticounterfeiting of Non-Volatile
Memory (NVM) chips. In particular, we experimentally demonstrate a generalized
methodology for detecting (i) Integrated Circuit (IC) origin, (ii) recycled or
used NVM chips, and (iii) identification of used locations (addresses) in the
chip. Our proposed methodology inspects latency and variability signatures of
Commercial-Off-The-Shelf (COTS) NVM chips. The proposed technique requires
low-cycle (~100) pre-conditioning and utilizes Machine Learning (ML)
algorithms. We observe different trends in evolution of latency (sector erase
or page write) with cycling on different NVM technologies from different
vendors. ML assisted approach is utilized for detecting IC manufacturers with
95.1 % accuracy obtained on prepared test dataset consisting of 3 different NVM
technologies including 6 different manufacturers (9 types of chips).Comment: 5 pages, 5 figures, accepted in IEEE NANO 202
Detectability evaluation of attributes anomaly for electronic components using pulsed thermography
Counterfeit Electronic Components (CECs) pose a serious threat to all intellectual properties and bring fatal failure to the key industrial systems. This paper initiates the exploration of the prospect of CEC detection using pulsed thermography (PT) by proposing a detectability evaluation method for material and structural anomalies in CECs. Firstly, a numerical Finite Element Modelling (FEM) simulation approach of CEC detection using PT was established to predict the thermal response of electronic components under the heat excitation. Then, by experimental validation, FEM simulates multiple models with attribute deviations in mould compound conductivity, mould compound volumetric heat capacity and die size respectively considering experimental noise. Secondly, based on principal components analysis (PCA), the gradients of the 1st and 2nd principal components are extracted and identified as two promising classification features of distinguishing the deviation models. Thirdly, a supervised machine learning-based method was applied to classify the features to identify the range of detectability. By defining the 90% of classification accuracy as the detectable threshold, the detectability ranges of deviation in three attributes have been quantitively evaluated respectively. The promising results suggest that PT can act as a concise, operable and cost-efficient tool for CECs screening which has the potential to be embedded in the initial large scale screening stage for anti-counterfeit
Secure Physical Design
An integrated circuit is subject to a number of attacks including information leakage, side-channel attacks, fault-injection, malicious change, reverse engineering, and piracy. Majority of these attacks take advantage of physical placement and routing of cells and interconnects. Several measures have already been proposed to deal with security issues of the high level functional design and logic synthesis. However, to ensure end-to-end trustworthy IC design flow, it is necessary to have security sign-off during physical design flow. This paper presents a secure physical design roadmap to enable end-to-end trustworthy IC design flow. The paper also discusses utilization of AI/ML to establish security at the layout level. Major research challenges in obtaining a secure physical design are also discussed
Uniquely Identifiable Tamper-Evident Device Using Coupling between Subwavelength Gratings
Reliability and sensitive information protection are critical aspects of integrated circuits. A novel technique using near-field evanescent wave coupling from two subwavelength gratings (SWGs), with the input laser source delivered through an optical fiber is presented for tamper evidence of electronic components. The first grating of the pair of coupled subwavelength gratings (CSWGs) was milled directly on the output facet of the silica fiber using focused ion beam (FIB) etching. The second grating was patterned using e-beam lithography and etched into a glass substrate using reactive ion etching (RIE). The slightest intrusion attempt would separate the CSWGs and eliminate near-field coupling between the gratings. Tampering, therefore, would become evident.
Computer simulations guided the design for optimal operation of the security solution. The physical dimensions of the SWGs, i.e. period and thickness, were optimized, for a 650 nm illuminating wavelength. The optimal dimensions resulted in a 560 nm grating period for the first grating etched in the silica optical fiber and 420 nm for the second grating etched in borosilicate glass. The incident light beam had a half-width at half-maximum (HWHM) of at least 7 µm to allow discernible higher transmission orders, and a HWHM of 28 µm for minimum noise. The minimum number of individual grating lines present on the optical fiber facet was identified as 15 lines. Grating rotation due to the cylindrical geometry of the fiber resulted in a rotation of the far-field pattern, corresponding to the rotation angle of moiré fringes. With the goal of later adding authentication to tamper evidence, the concept of CSWGs signature was also modeled by introducing random and planned variations in the glass grating.
The fiber was placed on a stage supported by a nanomanipulator, which permitted three-dimensional displacement while maintaining the fiber tip normal to the surface of the glass substrate. A 650 nm diode laser was fixed to a translation mount that transmitted the light source through the optical fiber, and the output intensity was measured using a silicon photodiode. The evanescent wave coupling output results for the CSWGs were measured and compared to the simulation results