1 Introduction |
|
1 | (14) |
|
1.1 History of Counterfeiting |
|
|
2 | (1) |
|
|
3 | (1) |
|
1.3 Counterfeits: A Trillion Dollar Market and Beyond |
|
|
4 | (1) |
|
1.4 Counterfeit Electronics: An Emerging Threat |
|
|
5 | (7) |
|
1.4.1 Defense Industrial Base Assessment: Counterfeit Electronics |
|
|
9 | (3) |
|
|
12 | (2) |
|
|
14 | (1) |
2 Counterfeit Integrated Circuits |
|
15 | (22) |
|
|
17 | (1) |
|
2.2 Taxonomy of Counterfeit Types |
|
|
18 | (9) |
|
|
19 | (2) |
|
|
21 | (1) |
|
|
22 | (1) |
|
2.2.4 Out-of-Spec/Defective |
|
|
23 | (2) |
|
|
25 | (1) |
|
2.2.6 Forged Documentation |
|
|
25 | (1) |
|
|
26 | (1) |
|
2.3 Supply Chain Vulnerabilities |
|
|
27 | (2) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
2.3.5 System Integration/Lifetime |
|
|
29 | (1) |
|
|
29 | (1) |
|
2.4 Detection and Avoidance of Counterfeit ICs |
|
|
29 | (4) |
|
2.4.1 Current Status of Detection |
|
|
30 | (2) |
|
2.4.2 Current Status of Avoidance |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
34 | (3) |
3 Counterfeit Defects |
|
37 | (38) |
|
3.1 Taxonomy of Counterfeit Defects |
|
|
38 | (1) |
|
|
38 | (5) |
|
|
43 | (20) |
|
3.3.1 Leads, Balls and Columns |
|
|
44 | (6) |
|
|
50 | (6) |
|
|
56 | (3) |
|
|
59 | (4) |
|
3.4 Environmental Defects |
|
|
63 | (2) |
|
|
65 | (6) |
|
|
66 | (3) |
|
3.5.2 Manufacturing Defects |
|
|
69 | (2) |
|
|
71 | (1) |
|
|
72 | (3) |
4 Physical Tests for Counterfeit Detection |
|
75 | (20) |
|
4.1 Taxonomy of Counterfeit Detection Methods |
|
|
76 | (2) |
|
|
78 | (1) |
|
4.2.1 External Visual Inspection (EVI) |
|
|
78 | (12) |
|
|
81 | (2) |
|
4.2.3 Delid/Decapsulation |
|
|
83 | (1) |
|
4.2.4 Scanning Acoustic Microscopy (SAM) |
|
|
83 | (2) |
|
4.2.5 Scanning Electron Microscopy (SEM) |
|
|
85 | (2) |
|
4.2.6 X-Ray Fluorescence (XRF) Spectroscopy |
|
|
87 | (1) |
|
4.2.7 Fourier Transform Infrared (FTIR) Spectroscopy |
|
|
87 | (1) |
|
4.2.8 Energy Dispersive Spectroscopy (EDS) |
|
|
87 | (1) |
|
4.2.9 Temperature Cycling |
|
|
88 | (2) |
|
4.2.10 Hermetic Seal Test |
|
|
90 | (1) |
|
4.3 Limitations and Challenges |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
92 | (3) |
5 Electrical Tests for Counterfeit Detection |
|
95 | (14) |
|
|
96 | (1) |
|
|
96 | (1) |
|
5.1.2 Automatic Test Equipment (ATE) |
|
|
97 | (1) |
|
|
97 | (2) |
|
5.3 Key Electrical Parameters Testing |
|
|
99 | (4) |
|
|
103 | (1) |
|
5.5 Limitations and Challenges |
|
|
103 | (2) |
|
|
105 | (1) |
|
|
106 | (3) |
6 Counterfeit Test Coverage: An Assessment of Current Counterfeit Detection Methods |
|
109 | (24) |
|
6.1 Disparity in Capabilities and Expertise Among Test Labs |
|
|
110 | (1) |
|
|
111 | (4) |
|
|
111 | (1) |
|
|
112 | (1) |
|
|
112 | (1) |
|
6.2.4 Counterfeit Defects |
|
|
112 | (1) |
|
6.2.5 Confidence Level Matrix |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
113 | (1) |
|
6.2.8 Defect Mapping Matrix |
|
|
113 | (2) |
|
6.2.9 Challenges Associated with Input Acquisition |
|
|
115 | (1) |
|
|
115 | (2) |
|
6.3.1 Counterfeit Defect Coverage (CDC) |
|
|
115 | (1) |
|
6.3.2 Counterfeit Type Coverage (CTC) |
|
|
116 | (1) |
|
6.3.3 Not-Covered Defects (NCDs) |
|
|
117 | (1) |
|
6.3.4 Under-Covered Defects (UCDs) |
|
|
117 | (1) |
|
|
117 | (13) |
|
|
118 | (4) |
|
|
122 | (4) |
|
6.4.3 Comparison Between Static Assessment and Dynamic Assessment |
|
|
126 | (4) |
|
|
130 | (1) |
|
|
130 | (3) |
7 Advanced Detection: Physical Tests |
|
133 | (24) |
|
7.1 Limitation in 2D Characterization |
|
|
134 | (3) |
|
7.2 Four Dimensional Scanning Electron Microscopy |
|
|
137 | (8) |
|
|
138 | (4) |
|
7.2.2 Depth Extraction Stage |
|
|
142 | (3) |
|
7.3 Quantification of a 3D Surface: Improper Texture Variations |
|
|
145 | (2) |
|
|
147 | (4) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
153 | (4) |
8 Advanced Detection: Electrical Tests |
|
157 | (18) |
|
8.1 Two Phase Detection Approach for Recycled FPGAs |
|
|
158 | (9) |
|
8.1.1 Aging and Recycled FPGAs |
|
|
158 | (3) |
|
8.1.2 Two Phase Recycled FPGA Detection |
|
|
161 | (6) |
|
|
167 | (5) |
|
8.2.1 Impact of Aging on Path Delays |
|
|
168 | (1) |
|
8.2.2 Path Delay Fingerprinting |
|
|
168 | (2) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
171 | (1) |
|
8.3 Early Failure Rate (EFR) Analysis |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
173 | (2) |
9 Combating Die and IC Recycling |
|
175 | (28) |
|
|
178 | (11) |
|
|
178 | (1) |
|
9.1.2 Limitations of Simple RO-CDIR |
|
|
179 | (2) |
|
9.1.3 Design and Operation of NBTI-Aware RO-CDIR |
|
|
181 | (1) |
|
|
182 | (1) |
|
9.1.5 Simulation of the NBTI-Aware RO-CDIR |
|
|
183 | (2) |
|
9.1.6 Misprediction Rate Analysis |
|
|
185 | (3) |
|
|
188 | (1) |
|
|
188 | (1) |
|
9.2 Antifuse-Based CDIR Structures |
|
|
189 | (6) |
|
|
189 | (1) |
|
9.2.2 Clock AF-Based (CAF-Based) CDIR |
|
|
190 | (3) |
|
9.2.3 Signal AF-Based (SAF-Based) CDIR |
|
|
193 | (1) |
|
9.2.4 Area Overhead Analysis |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
195 | (4) |
|
9.3.1 Area Overhead Analysis |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
199 | (1) |
|
|
199 | (4) |
10 Hardware IP Watermarking |
|
203 | (20) |
|
10.1 Intellectual Property (IP) |
|
|
204 | (1) |
|
10.2 IP Reuse and IP Piracy |
|
|
205 | (1) |
|
10.3 Approaches to Secure IP |
|
|
206 | (1) |
|
10.4 Hardware Watermarking |
|
|
207 | (13) |
|
10.4.1 Constraint-Based Watermarking |
|
|
209 | (4) |
|
10.4.2 Additive Watermarking |
|
|
213 | (2) |
|
10.4.3 Module-Based Watermarking |
|
|
215 | (3) |
|
10.4.4 Power-Based Watermarking |
|
|
218 | (2) |
|
|
220 | (1) |
|
|
221 | (2) |
11 Prevention of Unlicensed and Rejected ICs from Untrusted Foundry and Assembly |
|
223 | (20) |
|
11.1 Fabless Business Model |
|
|
224 | (1) |
|
11.2 Fabless Supply Chain Vulnerabilities |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
226 | (1) |
|
|
226 | (1) |
|
11.4 Connecticut Secure Split-Test |
|
|
227 | (11) |
|
|
227 | (2) |
|
|
229 | (4) |
|
11.4.3 Experimental Results and Analysis of CSST |
|
|
233 | (5) |
|
|
238 | (2) |
|
|
240 | (3) |
12 Chip ID |
|
243 | (22) |
|
12.1 General Requirements of Chip ID |
|
|
244 | (1) |
|
|
245 | (8) |
|
12.2.1 Physically Unclonable Functions (PUFs) |
|
|
245 | (1) |
|
|
246 | (4) |
|
12.2.3 PUF Quality and Metrics |
|
|
250 | (1) |
|
12.2.4 PUF Applications in Hardware Security |
|
|
251 | (1) |
|
12.2.5 Challenges and Limitations |
|
|
251 | (2) |
|
|
253 | (7) |
|
12.3.1 Encrypted QR Codes |
|
|
253 | (1) |
|
|
254 | (2) |
|
|
256 | (1) |
|
12.3.4 Capacitive (Coating) Physical Unclonable Functions |
|
|
256 | (2) |
|
12.3.5 Challenges and Limitations |
|
|
258 | (2) |
|
12.4 Limitations of Chip IDs for Different Counterfeit Types |
|
|
260 | (1) |
|
|
261 | (1) |
|
|
262 | (3) |
Index |
|
265 | |