Skip Nav Destination
Close Modal
Search Results for
reverse engineering
Update search
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
NARROW
Format
Topics
Journal
Article Type
Date
Availability
1-20 of 74 Search Results for
reverse engineering
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
1
Sort by
Journal Articles
EDFA Technical Articles (2019) 21 (2): 30–36.
Published: 01 May 2019
...Fatemeh Ganji; Domenic Forte; Navid Asadizanjani; Mark Tehranipoor; Damon Woodward Integrated circuits embedded in everyday devices face an increased risk of tampering and intrusion. In this article, the authors explain how reverse engineering techniques, including automated image analysis, can...
Abstract
View article
PDF
Integrated circuits embedded in everyday devices face an increased risk of tampering and intrusion. In this article, the authors explain how reverse engineering techniques, including automated image analysis, can be employed to provide trust and assurance when dealing with commercial off-the-shelf chips.
Journal Articles
EDFA Technical Articles (2022) 24 (3): 32–40.
Published: 01 August 2022
... of the beam hardening artifacts that often cause problems in failure analysis and reverse engineering. This article provides an overview of a commercial 3D X-ray system, explaining how it acquires high-resolution images of submicron defects in large intact samples. It presents examples in which the system...
Abstract
View article
PDF
This article provides an overview of a commercial 3D X-ray system, explaining how it acquires high-resolution images of submicron defects in large intact samples. It presents examples in which the system is used to reveal cracks in thin redistribution layers, voids in organic substrates, and variations in TSV metallization on 300-mm wafers. As the authors explain, each scan can be done in as little as a few minutes regardless of sample size, and the resulting images are clear of the beam hardening artifacts that often cause problems in failure analysis and reverse engineering.
Journal Articles
EDFA Technical Articles (2019) 21 (3): 16–24.
Published: 01 August 2019
... hardware attack reverse engineering 1 6 httpsdoi.org/10.31399/asm.edfa.2019-3.p016 EDFAAO (2019) 3:16-24 1537-0755/$19.00 ©ASM International® ELECTRONIC DEVICE FAILURE ANALYSIS | VOLUME 21 NO. 3 FAILURE ANALYSIS FOR HARDWARE ASSURANCE AND SECURITY M. Tanjidur Rahman and Navid Asadizanjani Department...
Abstract
View article
PDF
This article presents a comprehensive study of physical inspection and attack methods, describing the approaches typically used by counterfeiters and adversaries as well as the risks and threats created. It also explains how physical inspection methods can serve as trust verification tools and provides practical guidelines for making hardware more secure.
Journal Articles
EDFA Technical Articles (2021) 23 (2): 4–12.
Published: 01 May 2021
... on the availability of layout and capability available for the adversary. An adversary can reverse engineer the device and determine the location of target wires, transistors, or registers ELECTRONIC DEVICE FAILURE ANALYSIS | VOLUME 23 NO. 2 7 Fig. 4 Circuit board placed under the lenses in an LSM. edfas.org 8...
Abstract
View article
PDF
The inverted orientation of a flip-chip packaged die makes it vulnerable to optical attacks from the backside. This article discusses the nature of that vulnerability, assesses the threats posed by optical inspection tools and techniques, and provides insights on effective countermeasures.
Journal Articles
EDFA Technical Articles (2017) 19 (4): 36–44.
Published: 01 November 2017
... for reverse engineering for design verification and competitive analysis. State-of-the-art methods include expert hand polishing, selected area milling, and focused ion beam deprocessing. These techniques struggle to maintain a high success rate as semiconductor process nodes scale down due to the increased...
Abstract
View article
PDF
Deprocessing of ICs is often the final step for defect validation in FA cases with limited fault-isolation information. This article presents a workflow for deprocessing ICs from the backside using automated thinning and large-area plasma FIB delayering. Advantages to this approach include a reduction in manual planarization and depackaging and a higher degree of precision and repeatability.
Journal Articles
EDFA Technical Articles (2014) 16 (2): 46–47.
Published: 01 May 2014
... enhanced. This defect-centric reverse engineering could then be reapplied to a variety of similar device constructs, as identified by forward-looking design tools, to validate a failure hypothesis and build confidence in predictive capability. Together, complementary capabilities of forward-looking design...
Abstract
View article
PDF
This column suggests that developing 3D structural models as tools for observing and exploring failures in the virtual domain could prove instrumental in avoiding failure without committing hardware. Likewise, instead of building hardware to systematically evaluate failures in the presence of random effects, virtualization through a 3D model could provide a completely user-defined environment for conducting controlled experiments. In such a virtual environment, systematic and random behaviors can be introduced and parsed to provide greater clarity in the search for root causes of failure.
Journal Articles
EDFA Technical Articles (2017) 19 (4): 22–34.
Published: 01 November 2017
... for failure debug is distinctly different from IC reverse engineering that is commonly performed to detect IP infringements or examine chip security. Reverse engineering involves the use of physical methods to remove the materials layer by layer and acquire highresolution images at each layer...
Abstract
View article
PDF
Faster time-to-production of a new product is the common goal of design houses and foundries. This article demonstrates how foundries can contribute through post silicon validation, which allows design houses to focus on more complicated issues.
Journal Articles
EDFA Technical Articles (2001) 3 (1): 12–14.
Published: 01 February 2001
... of detail that could be obtained at a practical cost. These analyses that we simply called Product Analyses contained complete reverse engineering (schematic) of the entire IC die, complete parametric testing of performance, plus the delayering, delineation, cross sectioning, and design rule measure- Fig...
Abstract
View article
PDF
This article discusses the concept and intent of a construction analysis and the value it provides to manufacturers and users of integrated circuits. It describes the basic steps of a construction analysis for semiconductor devices and presents and interprets measurements and observations obtained from the analyses of several ICs.
Journal Articles
EDFA Technical Articles (2022) 24 (3): 12–22.
Published: 01 August 2022
..., DATE, Apr. 2015, Vol. 2015-April, p. 788 793, DOI: 10.7873/date.2015.1104. 7. C. Bao, D. Forte, and A. Srivastava: On Reverse Engineering-Based Hardware Trojan Detection, IEEE Trans. Comput. Des. Integr. Circuits Syst., Vol. 35, No. 1, 2016, p. 49 57, DOI: 10.1109/TCAD.2015.2488495. 8. I. Goodfellow...
Abstract
View article
PDF
This article proposes a design for a real-time Trojan detection system and explores possible solutions to the challenge of large-scale SEM image acquisition. One such solution, a deep-learning approach that generates synthetic micrographs from layout images, shows significant promise. Learning-based approaches are also used to both synthesize and classify cells. The classification outcome is matched with the design exchange format file entry to ensure the purity of the underlying IC.
Journal Articles
EDFA Technical Articles (2022) 24 (4): 22–29.
Published: 01 November 2022
... a detailed and methodical discussion about how existing and emerging memory devices can fall prey to attacks through various physical modalities. These physical attacks[2] are a well-defined class of hardware attacks, constituting both reverse engineering and fault injection threats. With the increase...
Abstract
View article
PDF
This article describes how physical attacks can be launched on different types of nonvolatile memory (NVM) cells using failure analysis tools. It explains how the bit information stored inside these devices is susceptible to read-out and fault injection attacks and defines vulnerability parameters to help quantify risks associated with different modalities of attack. It also presents an in-depth security analysis of emerging NVM technologies and discusses potential countermeasures.
Journal Articles
EDFA Technical Articles (2017) 19 (3): 22–27.
Published: 01 August 2017
... positions focused on semiconductor reverse engineering analysis, including hands-on experience with scanning probe microscopy and scanning electron microscopy, with a particular focus on characterizing doped semiconductors. Dr. Dixon-Warren provides a unique perspective and expertise that has kept...
Abstract
View article
PDF
Scanning microwave impedance microscopy (sMIM) is an electrical measurement technique that can be used to determine dopant profiles in semiconductor devices. This article describes the basic setup and implementation of the method and demonstrates its use in the cross-sectional analysis of NMOS power transistors.
Journal Articles
EDFA Technical Articles (2016) 18 (1): 30–35.
Published: 01 February 2016
... of integrated circuit (IC) devices is an important tool for semiconductor failure analysis, reverse engineering, and circuit edit activities.[4] Once a defect has been localized, it is necessary to isolate, inspect, and perform failure analysis. One method to enable this is to remove layer after layer until...
Abstract
View article
PDF
Plasma focused ion beam (PFIB) systems can generate ion beams with much higher current and are therefore able to remove larger volumes of material at much faster rates while still maintaining precise control of the beam and its milling action. This article explains how the improved performance of PFIB is leading to new applications in delayering, deprocessing, and site-specific failure analysis.
Journal Articles
EDFA Technical Articles (2018) 20 (2): 54–55.
Published: 01 May 2018
..., based in Austin, Texas, a leading consulting company in the field of advanced semiconductor packaging technology. In addition, he is fellow emeritus for TechInsights, a Canada-based specialty, reverse engineering company, and a contributing editor for Solid State Technology magazine. edfas.org ...
Abstract
View article
PDF
This column reflects on the effect mobile phones have had on process and packaging technology and failure analysis.
Journal Articles
EDFA Technical Articles (2019) 21 (3): 4–6.
Published: 01 August 2019
... vital and challenging for industrial and research applications such as failure analysis, chip reverse engineering, and patent violation detection. Gallium focused ion beam (Ga FIB) and Xe FIB instruments are the go-to tools for chip material analysis in the semiconductor industry for applications like...
Abstract
View article
PDF
Liquid metal ion and plasma beam FIB systems are widely used in the semiconductor industry for TEM lamella preparation, circuit edit, and cross-sectional analysis. This article compares the deprocessing capability of a Ga FIB with that of a Xe plasma FIB. Both systems were used to delayer an Intel 14 nm processor from M8 down to the transistor contacts. As the images in the article show, a 100 × 100 µm window was opened by the Xe plasma FIB and a 20 × 20 µm window was opened with the Ga FIB. Related issues such as processing time, end point detection, and surface roughness are also discussed.
Journal Articles
EDFA Technical Articles (2011) 13 (2): 12–18.
Published: 01 May 2011
... ircuit edit began as a way to reverse engineer (probably for benchmarking design and process technologies) competitor integrated circuits (ICs) as well as to reroute traces, as is frequently done on a printed circuit board. Initially, conductor deposition was not available and only trace cutting was used...
Abstract
View article
PDF
The presence of copper layers separated by low-k dielectrics in today’s ICs is a major problem for circuit edit engineers. This article explains why and presents a solution that addresses the challenges CE engineers face. According to the authors, the difficulties are primarily due to the interaction of the ion beam with variations in copper grain orientation, the effects of halogen corrosion, and the presence of CuF. As a result, copper milling tends to be uneven and edit times tend to be quite long. The solution presented is based on a chemically-assisted milling and etching process that quickly and uniformly removes copper and dielectric layers while maintaining planarity.
Journal Articles
EDFA Technical Articles (2015) 17 (1): 33–37.
Published: 01 February 2015
... could be a critical item for nuclear systems). In another example given by Dr. Stoker, 1500 flash memory ICs that were recently advertised as being new from Intel were actually counterfeit parts. The dilemma is that we can t reverse engineer each part we have because it is too labor-intensive. Question...
Abstract
View article
PDF
Several technology-focused User's Groups met at ISTFA 2014 to discuss current issues and advances in their areas of interest. This article summarizes key discussion points from the Contactless Fault Isolation User's Group, the Nanoprobing User's Group, the Sample Prep/3-D Package User's Group, and the FIB User's Group.
Journal Articles
EDFA Technical Articles (2009) 11 (3): 46–47.
Published: 01 August 2009
... related. Failure analysis involves several types of activities that are similar in nature: design debug, yield improvement, burn-in qualification, field returns, and reverse engineering. Despite our typical FA personal style,[3] we do not deliver sufficient value to our organizations when we are perceived...
Abstract
View article
PDF
At a Silicon Valley panel discussion on bringing new ICs to market, there was no mention by anyone onstage of a debug strategy, let alone its importance. This month’s guest columnist offers his insight on why that is and what should be done about it.
Journal Articles
EDFA Technical Articles (2024) 26 (3): 14–24.
Published: 01 August 2024
....: Penalized Weighted Least-squares Approach to Sinogram Noise Reduction and Image Reconstruction for Low-dose X-ray Computed Tomography, IEEE Transactions on Medical Imaging, 25(10), 2006, p. 1272 1283. 8. M.S.M. Khan, et al.: Exploring Advanced Packaging Technologies for Reverse Engineering a System...
Abstract
View article
PDF
This article describes a proposed novel metric to furnish chip designers with a prognostic tool for x-ray imaging in the pre-silicon stage. This metric is fashioned to provide designers with a concrete measure of how visible the fine-pitched features of their designs are under x-ray inspection. It utilizes a combination of x-ray image data collection, analysis, and simulations to evaluate different design elements.
Journal Articles
EDFA Technical Articles (2007) 9 (1): 20–23.
Published: 01 February 2007
... when no topological bit maps are available. The failing memory address can be quickly found by repeatedly strobing the failing bit address location. This same setup can be used to extract the topological bit map when reverse engineering of the memory array is required. Qualitative VC provides...
Abstract
View article
PDF
Voltage contrast followed by electron beam induced current imaging is an effective approach for isolating IC failures. This article briefly reviews the physics of signal generation for both techniques and presents several examples illustrating how this powerful combination contributes to advanced defect localization.
Journal Articles
EDFA Technical Articles (2004) 6 (1): 25–28.
Published: 01 February 2004
... of projects, including reverse engineering tool development, lead-zirconium-titanate electrical characterization, as well as day-to-day failure analysis activities. His background at Advanced Micro Devices has been diverse as well, including the areas of focused ion beam and debug using optical probing...
Abstract
View article
PDF
Time domain reflectometry (TDR) is widely used to measure the electrical length of conductors. It has also proven useful for isolating failures in ICs. This article describes a variation of the method, called comparative TDR, that overcomes inherent timing limitations and simplifies use. It discusses the basic hardware requirements of the new technique and presents examples demonstrating its use on opens and shorts in ceramic flip-chip packages.
1