Skip Nav Destination
Close Modal
Search Results for
design file recovery
Update search
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
NARROW
Format
Topics
Journal
Article Type
Date
Availability
1-7 of 7 Search Results for
design file recovery
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
EDFA Technical Articles (2021) 23 (1): 12–18.
Published: 01 February 2021
... International® 2021 2021 ASM International hardware assurance design file recovery IC decomposition sample preparation verification 12 EDFAAO (2021) 1:12-18 httpsdoi.org/10.31399/asm.edfa.2021-1.p012 1537-0755/$19.00 ©ASM International® ELECTRONIC DEVICE FAILURE ANALYSIS | VOLUME 23 NO. 1 APPLIED...
Abstract
View article
PDF
Traditional post-fabrication testing can reliably verify whether or not an IC is working correctly, but it cannot tell the difference between an authentic and counterfeit chip or recognize design changes made with malicious intent. This article presents an IC decomposition workflow, based on FA tools and techniques, that provides a quantifiable level of assurance for components in a zero trust environment.
Journal Articles
EDFA Technical Articles (2021) 23 (4): 4–13.
Published: 01 November 2021
.... Dedicated image acquisition systems are used for scanning high resolution mosaics of entire IC layers for full design file recovery, but desktop systems are useful for fast observation and imaging areas of interest during delayering. Conductive silver paint and sputtered gold coatings on samples reduce...
Abstract
View article
PDF
Further development of SEM-based feature extraction tools for design validation and failure analysis is contingent on reliable sample preparation methods. This article describes how a delayering framework for 130 nm technology was adapted and used on a 45 nm SPI module consisting of 11 metal layers, 10 via layers, two layers of polysilicon, and an active silicon layer. It explains how different polishing and etching methods are used to expose each layer with sufficient contrast for SEM imaging and subsequent feature extraction. By combining polygon sets representing each layer, the full design of the device was reconstructed as shown in one of the images.
Journal Articles
EDFA Technical Articles (2012) 14 (2): 28–29.
Published: 01 May 2012
... the identity or to disguise the effects of salvaging. The modification can be as simple as the removal of old marking and then adding new marking or as complicated as recovery of a die and repackaging it. For an electronics equipment manufacturer, it is difficult to identify counterfeit parts among...
Abstract
View article
PDF
Counterfeit electronic parts have become a significant cause of concern in the electronics part supply chain. Several factors that contribute to the targeting of the electrical, electronic, and electromechanical (EEE) parts market by counterfeiters include parts obsolescence, extended lead times, the absence of verification tools, the availability of scrapped or salvaged parts, and the high costs associated with inspection/testing procedures. This article reports on the status of efforts by the G-19 Committee of SAE International to develop standards in response to increasing numbers of counterfeit parts in the supply chain.
Journal Articles
EDFA Technical Articles (2004) 6 (1): 13–21.
Published: 01 February 2004
... showing the pass/fail regions for state retention (as defined by system recovery without data loss), with operating voltage, RBB, and temp- erature as parameters on a 130 nm design. The data show that increas- ing Vss to reduce leakage will eventually result in state loss. A reduction in supply voltage...
Abstract
View article
PDF
ICs designed for portable devices often make use of reverse-body bias (RBB) modes to limit leakage currents. The added complexity of RBB support circuitry presents a challenge during IC characterization and debug. This article discusses the nature of the problem and explains how to identify irregularities in circuits operating in the body-biased condition using standard debug tools with simple modifications. It describes some of the bugs discovered in an actual examination and explains how they were diagnosed by analyzing I-V curve traces and infrared emission microscopy (IREM) images.
Journal Articles
EDFA Technical Articles (2014) 16 (1): 18–23.
Published: 01 February 2014
... recovery/recrystallization contribute simultaneously to the formation of adiabatic shear had almost no particle formation during sample bands in quench-hardened steels. 18 Electronic Device Failure Analysis Use of FIB to Study the Impact Properties of Materials Solomon Boakye-Yiadom and Nabil Bassim...
Abstract
View article
PDF
The sixth FIB-SEM workshop was held March 1, 2013, in Cambridge, Mass. This article provides a summary of the event along with highlights from the 18 paper presentations.
Journal Articles
EDFA Technical Articles (2005) 7 (1): 16–24.
Published: 01 February 2005
... the value as compared to the expect value. Therefore, the fail log really shows FFPPFFPPFFPPFFPPFFPP > ( P for pass; F for fail), because the pattern s expect file cares every other pair of 1 s. This indicates that there is at least one broken bit with a stuck-at (there may be more), and the broken bit...
Abstract
View article
PDF
Scan chains help detect and identify failures in integrated circuits, but they are also susceptible to failure themselves. When scan chains break, it does not necessarily render them useless. Normally, scan chains can be debugged and diagnosed so that they can be fixed or used while masking out vector bits associated with broken or corrupted portions of the chain. This article describes the different ways that scan chains can break and how it tends to affect their performance. It explains how to repair various types of scan chain failures or at least regain partial use for limited testing purposes.
Journal Articles
EDFA Technical Articles (2023) 25 (1): 20–27.
Published: 01 February 2023
... just arrived at TI from a prior career as a TEM microscopist at UT Southwestern Medical School, I suggested taking one of the common cross-hatch TEM grids used by biologists and cutting it in half with a razor blade to create V-shaped landing sites for a FIB lift-out sample. Rocky got to work designing...
Abstract
View article
PDF
This is the story of how the mainstream Omniprobe FIB lift-out solution was invented and delivered to the market.