6 research outputs found

    Exploiting Nanoelectronic Properties of Memory Chips for Prevention of IC Counterfeiting

    Full text link
    This study presents a methodology for anticounterfeiting of Non-Volatile Memory (NVM) chips. In particular, we experimentally demonstrate a generalized methodology for detecting (i) Integrated Circuit (IC) origin, (ii) recycled or used NVM chips, and (iii) identification of used locations (addresses) in the chip. Our proposed methodology inspects latency and variability signatures of Commercial-Off-The-Shelf (COTS) NVM chips. The proposed technique requires low-cycle (~100) pre-conditioning and utilizes Machine Learning (ML) algorithms. We observe different trends in evolution of latency (sector erase or page write) with cycling on different NVM technologies from different vendors. ML assisted approach is utilized for detecting IC manufacturers with 95.1 % accuracy obtained on prepared test dataset consisting of 3 different NVM technologies including 6 different manufacturers (9 types of chips).Comment: 5 pages, 5 figures, accepted in IEEE NANO 202

    Detectability evaluation of attributes anomaly for electronic components using pulsed thermography

    Get PDF
    Counterfeit Electronic Components (CECs) pose a serious threat to all intellectual properties and bring fatal failure to the key industrial systems. This paper initiates the exploration of the prospect of CEC detection using pulsed thermography (PT) by proposing a detectability evaluation method for material and structural anomalies in CECs. Firstly, a numerical Finite Element Modelling (FEM) simulation approach of CEC detection using PT was established to predict the thermal response of electronic components under the heat excitation. Then, by experimental validation, FEM simulates multiple models with attribute deviations in mould compound conductivity, mould compound volumetric heat capacity and die size respectively considering experimental noise. Secondly, based on principal components analysis (PCA), the gradients of the 1st and 2nd principal components are extracted and identified as two promising classification features of distinguishing the deviation models. Thirdly, a supervised machine learning-based method was applied to classify the features to identify the range of detectability. By defining the 90% of classification accuracy as the detectable threshold, the detectability ranges of deviation in three attributes have been quantitively evaluated respectively. The promising results suggest that PT can act as a concise, operable and cost-efficient tool for CECs screening which has the potential to be embedded in the initial large scale screening stage for anti-counterfeit

    Secure Physical Design

    Get PDF
    An integrated circuit is subject to a number of attacks including information leakage, side-channel attacks, fault-injection, malicious change, reverse engineering, and piracy. Majority of these attacks take advantage of physical placement and routing of cells and interconnects. Several measures have already been proposed to deal with security issues of the high level functional design and logic synthesis. However, to ensure end-to-end trustworthy IC design flow, it is necessary to have security sign-off during physical design flow. This paper presents a secure physical design roadmap to enable end-to-end trustworthy IC design flow. The paper also discusses utilization of AI/ML to establish security at the layout level. Major research challenges in obtaining a secure physical design are also discussed

    Low-cost On-Chip Structures for Combating Die and IC Recycling

    No full text

    Uniquely Identifiable Tamper-Evident Device Using Coupling between Subwavelength Gratings

    Get PDF
    Reliability and sensitive information protection are critical aspects of integrated circuits. A novel technique using near-field evanescent wave coupling from two subwavelength gratings (SWGs), with the input laser source delivered through an optical fiber is presented for tamper evidence of electronic components. The first grating of the pair of coupled subwavelength gratings (CSWGs) was milled directly on the output facet of the silica fiber using focused ion beam (FIB) etching. The second grating was patterned using e-beam lithography and etched into a glass substrate using reactive ion etching (RIE). The slightest intrusion attempt would separate the CSWGs and eliminate near-field coupling between the gratings. Tampering, therefore, would become evident. Computer simulations guided the design for optimal operation of the security solution. The physical dimensions of the SWGs, i.e. period and thickness, were optimized, for a 650 nm illuminating wavelength. The optimal dimensions resulted in a 560 nm grating period for the first grating etched in the silica optical fiber and 420 nm for the second grating etched in borosilicate glass. The incident light beam had a half-width at half-maximum (HWHM) of at least 7 µm to allow discernible higher transmission orders, and a HWHM of 28 µm for minimum noise. The minimum number of individual grating lines present on the optical fiber facet was identified as 15 lines. Grating rotation due to the cylindrical geometry of the fiber resulted in a rotation of the far-field pattern, corresponding to the rotation angle of moiré fringes. With the goal of later adding authentication to tamper evidence, the concept of CSWGs signature was also modeled by introducing random and planned variations in the glass grating. The fiber was placed on a stage supported by a nanomanipulator, which permitted three-dimensional displacement while maintaining the fiber tip normal to the surface of the glass substrate. A 650 nm diode laser was fixed to a translation mount that transmitted the light source through the optical fiber, and the output intensity was measured using a silicon photodiode. The evanescent wave coupling output results for the CSWGs were measured and compared to the simulation results
    corecore