Skip Nav Destination
Close Modal
Search Results for
hardware assurance
Update search
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
NARROW
Format
Topics
Journal
Article Type
Date
Availability
1-20 of 20 Search Results for
hardware assurance
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
EDFA Technical Articles (2019) 21 (3): 16–24.
Published: 01 August 2019
... created. It also explains how physical inspection methods can serve as trust verification tools and provides practical guidelines for making hardware more secure. Copyright © ASM International® 2019 2019 ASM International countermeasures hardware assurance hardware security malicious...
Abstract
View article
PDF
This article presents a comprehensive study of physical inspection and attack methods, describing the approaches typically used by counterfeiters and adversaries as well as the risks and threats created. It also explains how physical inspection methods can serve as trust verification tools and provides practical guidelines for making hardware more secure.
Journal Articles
EDFA Technical Articles (2019) 21 (2): 30–36.
Published: 01 May 2019
... be employed to provide trust and assurance when dealing with commercial off-the-shelf chips. Copyright © ASM International® 2019 2019 ASM International counterfeit ICs image analysis machine learning malicious hardware attack reverse engineering trust and assurance 3 0 httpsdoi.org/10.31399...
Abstract
View article
PDF
Integrated circuits embedded in everyday devices face an increased risk of tampering and intrusion. In this article, the authors explain how reverse engineering techniques, including automated image analysis, can be employed to provide trust and assurance when dealing with commercial off-the-shelf chips.
Journal Articles
EDFA Technical Articles (2022) 24 (3): 12–22.
Published: 01 August 2022
... and classify cells. The classification outcome is matched with the design exchange format file entry to ensure the purity of the underlying IC. Copyright © ASM International® 2022 2022 ASM International feature extraction hardware assurance image processing machine learning Trojan detection...
Abstract
View article
PDF
This article proposes a design for a real-time Trojan detection system and explores possible solutions to the challenge of large-scale SEM image acquisition. One such solution, a deep-learning approach that generates synthetic micrographs from layout images, shows significant promise. Learning-based approaches are also used to both synthesize and classify cells. The classification outcome is matched with the design exchange format file entry to ensure the purity of the underlying IC.
Journal Articles
EDFA Technical Articles (2021) 23 (1): 12–18.
Published: 01 February 2021
... International® 2021 2021 ASM International hardware assurance design file recovery IC decomposition sample preparation verification 12 EDFAAO (2021) 1:12-18 httpsdoi.org/10.31399/asm.edfa.2021-1.p012 1537-0755/$19.00 ©ASM International® ELECTRONIC DEVICE FAILURE ANALYSIS | VOLUME 23 NO. 1 APPLIED...
Abstract
View article
PDF
Traditional post-fabrication testing can reliably verify whether or not an IC is working correctly, but it cannot tell the difference between an authentic and counterfeit chip or recognize design changes made with malicious intent. This article presents an IC decomposition workflow, based on FA tools and techniques, that provides a quantifiable level of assurance for components in a zero trust environment.
Journal Articles
EDFA Technical Articles (2021) 23 (4): 4–13.
Published: 01 November 2021
..., integrated circuit decomposition, and developing novel techniques for quantifying hardware assurance in advanced node devices. Kimura currently holds his B.S., M.S., and Ph.D. in electrical and computer engineering from The Ohio State University. Jonathan Scholl is a lead materials engineer at Battelle...
Abstract
View article
PDF
Further development of SEM-based feature extraction tools for design validation and failure analysis is contingent on reliable sample preparation methods. This article describes how a delayering framework for 130 nm technology was adapted and used on a 45 nm SPI module consisting of 11 metal layers, 10 via layers, two layers of polysilicon, and an active silicon layer. It explains how different polishing and etching methods are used to expose each layer with sufficient contrast for SEM imaging and subsequent feature extraction. By combining polygon sets representing each layer, the full design of the device was reconstructed as shown in one of the images.
Journal Articles
EDFA Technical Articles (2022) 24 (2): 24–32.
Published: 01 May 2022
... not carry enough structure information. edfas.org ELECTRONIC DEVICE FAILURE ANALYSIS | VOLUME 24 NO. 2 31 32 ELECTRONIC DEVICE FAILURE ANALYSIS | VOLUME 24 NO. 2 Developing a new tool to detect both material and structure is very important not only for interposer inspection but also for hardware assurance...
Abstract
View article
PDF
Interposers play an important role in 2.5D and 3D packages, routing power and communication signals between dies while maintaining electrical contact with I/O pins. This role and their relatively simple construction makes interposers a target for malicious attacks. In this article, the authors assess the vulnerabilities inherent in the fabrication of interposers and describe various types of optical attacks along with practical countermeasures.
Journal Articles
EDFA Technical Articles (2015) 17 (3): 50–52.
Published: 01 August 2015
... integration and hardware assurance and reliability. He managed the Integrity and Reliability of Integrated Circuits, Trust in Integrated Circuits, Gratings of Regular Arrays and Trim Exposures, Leading Edge Access, and 3-Dimensional Integrated Circuits programs. From 2003 to 2009, Carl was an Associate...
Abstract
View article
PDF
The second phase of the IARPA Circuit Analysis Tools (CAT) program, which ended in June 2015, focused on the development of prototype tools to demonstrate scalability to the 10 nm node. Our guest columnist, IARPA Program Manager, Carl E. McCants, provides a summary of what the participating teams accomplished.
Journal Articles
EDFA Technical Articles (2013) 15 (4): 52–54.
Published: 01 November 2013
... manager at IARPA in the Office of Safe and Secure Operations, where he manages the CAT program. From 2010 to 2012, he was a program manager in the Defense Advanced Research Projects Agency (DARPA) Microsystems Technology Office (MTO), focused on microelectronic integration and hardware assurance...
Abstract
View article
PDF
The semiconductor industry continues to scale microelectronics in accordance with Moore’s Law, as the minimum feature size on integrated circuits has decreased from 800 nm in 1993 to 90 nm in 2003 to 22 nm today. In addition, manufacturing advances include 3-D packaging, with multiple dice stacked in various configurations, and 3-D integrated circuits that use through-silicon vias or through-oxide vias to connect the various dice layers. The Intelligence Advanced Research Projects Activity (IARPA) Circuit Analysis Tools (CAT) program is developing tools and techniques to ensure that the U.S. government has capabilities for circuit analysis at future technology nodes, specifically at 22 nm and beyond, and for chips assembled using advanced packaging techniques. This column describes the CAT program activities and goals.
Journal Articles
EDFA Technical Articles (2024) 26 (3): 14–24.
Published: 01 August 2024
.... Nitin Varshney is currently working as a lab engineer at the Florida Institute for Cyber Security (FICS) Research for the last four years. He received his master s degree in materials science from the University of California, San Diego. He had multiple internship experiences in hardware assurance while...
Abstract
View article
PDF
This article describes a proposed novel metric to furnish chip designers with a prognostic tool for x-ray imaging in the pre-silicon stage. This metric is fashioned to provide designers with a concrete measure of how visible the fine-pitched features of their designs are under x-ray inspection. It utilizes a combination of x-ray image data collection, analysis, and simulations to evaluate different design elements.
Journal Articles
EDFA Technical Articles (2021) 23 (3): 24–31.
Published: 01 August 2021
... in Temasek Laboratories @ NTU, Singapore. His research interest includes microelectronics hardware assurance and effects of space radiation on reliability. Chee Lip Gan is a professor at the school of materials science and engineering, Nanyang Technological University. He is currently the associate provost...
Abstract
View article
PDF
This article describes a novel method for improving image resolution achieved using time-resolved photon emission techniques. Instead of directly generating images from photon counting, all detected photons are displayed as a point cloud in 3D space and a new higher-resolution image is generated based on probability density functions associated with photon distributions. Unsupervised learning algorithms identify photon distribution patterns as well as fainter emission sources.
Journal Articles
EDFA Technical Articles (2021) 23 (2): 4–12.
Published: 01 May 2021
..., and provides insights on effective countermeasures. Copyright © ASM International® 2021 2021 ASM International electro-optical probing flip-chip packages hardware security laser fault injection optical attack threat models 4 httpsdoi.org/10.31399/asm.edfa.2021-2.p004 1537-0755/$19.00 ©ASM...
Abstract
View article
PDF
The inverted orientation of a flip-chip packaged die makes it vulnerable to optical attacks from the backside. This article discusses the nature of that vulnerability, assesses the threats posed by optical inspection tools and techniques, and provides insights on effective countermeasures.
Journal Articles
EDFA Technical Articles (2022) 24 (4): 12–21.
Published: 01 November 2022
... International® ELECTRONIC DEVICE FAILURE ANALYSIS | VOLUME 24 NO. 4 MEMOMETER: MEMORY PUF-BASED HARDWARE METERING METHODOLOGY FOR FPGAs Anvesh Perumalla and John M. Emmert Department of Electrical and Computer Engineering, University of Cincinnati, Ohio john.emmert@uc.edu INTRODUCTION Security, assurance...
Abstract
View article
PDF
This article describes a hardware metering fingerprint technique, called the memometer, that addresses supply chain integrity issues with field-programmable gate arrays (FPGAs). The memometer is a physically unclonable function (PUF) based on cross-coupled lookup tables that overcomes manufacturing memory power-on preset. The fingerprints are not only unique, but also reliable with average hamming distances close to the ideal values of 50% (interchip) and 0% (intrachip). Instead of having one fingerprint per device, the memometer makes provision for hundreds with the potential for more.
Journal Articles
EDFA Technical Articles (2015) 17 (1): 33–37.
Published: 01 February 2015
...), timeresolved LADA, and VLP. Dr. David Stoker (SRI International) gave the second presentation, Supply Chain Assurance and Device Reliability, With a Laser Confocal Microscope. Supply chain assurance and device reliability are very real threats to commercial and Department of Defense system integrators. Dr...
Abstract
View article
PDF
Several technology-focused User's Groups met at ISTFA 2014 to discuss current issues and advances in their areas of interest. This article summarizes key discussion points from the Contactless Fault Isolation User's Group, the Nanoprobing User's Group, the Sample Prep/3-D Package User's Group, and the FIB User's Group.
Journal Articles
EDFA Technical Articles (2009) 11 (2): 16–22.
Published: 01 May 2009
... candidate area surrounding the fault and then narrow it down to a smaller area, step by step, based on data provided by software tools or hardware analysis instruments, finally localizing a specified element with the fault area. An SEM-based nanoprobing system is used in the last step of the process...
Abstract
View article
PDF
This article discusses the advantages of SEM-based nanoprobing and the various ways it can be used to locate defects associated with IC failures. It describes the basic measurement physics of electron beam induced current, absorbed electron, and voltage distribution contrast imaging and presents examples showing how the different methods are used to isolate low- and high-resistance sites, shorts, and opens as well as ion implantation and metal patterning defects.
Journal Articles
EDFA Technical Articles (2022) 24 (4): 22–29.
Published: 01 November 2022
... engineering in 2010 and 2011, respectively, from the University of Dhaka. His research is focused on finding vulnerabilities using physical inspection, hardware security and assurance, and reverse engineering. M. Shafkat M. Khan is currently a Ph.D. student at the University of Florida in the electrical...
Abstract
View article
PDF
This article describes how physical attacks can be launched on different types of nonvolatile memory (NVM) cells using failure analysis tools. It explains how the bit information stored inside these devices is susceptible to read-out and fault injection attacks and defines vulnerability parameters to help quantify risks associated with different modalities of attack. It also presents an in-depth security analysis of emerging NVM technologies and discusses potential countermeasures.
Journal Articles
EDFA Technical Articles (2017) 19 (4): 36–44.
Published: 01 November 2017
... is an Assistant Professor with the Electrical and Computer Engineering Department at the University of Florida. His current research interest is on supply chain security and the assurance of everything. This covers a wide range of products, including electronic systems and devices, automotive parts...
Abstract
View article
PDF
Deprocessing of ICs is often the final step for defect validation in FA cases with limited fault-isolation information. This article presents a workflow for deprocessing ICs from the backside using automated thinning and large-area plasma FIB delayering. Advantages to this approach include a reduction in manual planarization and depackaging and a higher degree of precision and repeatability.
Journal Articles
EDFA Technical Articles (2021) 23 (3): 13–22.
Published: 01 August 2021
.../plant-spy-chips-hardware-supermicrocheap-proof-of-concept 4. 4. S.H. Russ, Techniques to Thwart Surreptitiously Altered PCBs, 2020 IEEE Physical Assurance and Inspection of Electronics (PAINE), Washington, D.C., 2020, p. 1-4. ABOUT THE AUTHOR Samuel H. Russ received his Ph.D. from Georgia Tech in 1991...
Abstract
View article
PDF
Circuit boards are vulnerable to a wide range of ill-intentioned modifications done to gain access to information or malevolently influence control. This article describes the various ways attacks on circuit board can occur and presents examples showing how such attacks might look. It also provides general guidelines for protecting circuit-board design integrity.
Journal Articles
EDFA Technical Articles (2016) 18 (3): 4–8.
Published: 01 August 2016
.... This effectively creates two capacitors in series. The advantage of this arrangement is a little extra assurance that if a void or a particle of debris were present inside the capacitor dielectric, causing a short between the termination plates and the floating plates, there would still be another set of plates...
Abstract
View article
PDF
This article explains how the failure of a high-voltage capacitor led to the discovery of an unusual defect. Testing showed that the capacitor shorted due to silver migration, which investigators believe was facilitated by voids in the dielectric that had been present from the time of manufacture. Through some combination of time, electric potential, trapped humidity, and elevated operating temperature, plate material migrated into the voids, creating a short path that led to the failure. Using acoustic images as a guide, the failed capacitor was cross-sectioned, allowing investigators to examine the voids more closely and thereby confirm their theory.
Journal Articles
EDFA Technical Articles (2023) 25 (4): 4–11.
Published: 01 November 2023
... failures of ICs to the physical defects that caused them. ICs are often designed and manufactured by different organizations in different countries, which raises questions of hardware security assurance. A tomographic imaging system could help to detect disabled features, hardware trojans, counterfeit...
Abstract
View article
PDF
The high energy-resolving power of superconducting x-ray detectors reduces unwanted x-ray backgrounds, uses x-ray photons efficiently, and allows for discrimination among multiple chemical elements in a sample. This article discusses the challenges of analyzing the internal structure and composition of integrated circuits, and how 3D imaging can benefit manufacturers and researchers. It covers the development of superconducting x-ray sensors, their advantages over traditional sensors, potential applications, and focus areas for future work to develop this technology.
Journal Articles
EDFA Technical Articles (2020) 22 (2): 29–35.
Published: 01 May 2020
... on-the-fly during acquisition to gain the full benefit of lock-in measurements and to ensure reliable data-handling. In this acquisition mode, a precise synchronization between the excitation and acquisition hardware has to be ensured. Upon acquiring a 3D time-resolved data set of the samples thermal...
Abstract
View article
PDF
This article describes a form of lock-in thermography that achieves 3D localization of thermally active defects in stacked die packages. In this approach, phase shifts associated with thermal propagation delay are analyzed as a function of frequency. This allows for a precise localization of defects in all three spatial dimensions and can serve as a guide for subsequent high-resolution physical analyses.