Skip Nav Destination
Close Modal
Update search
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- EISBN
- Issue
- ISSN
- EISSN
- Volume
- References
NARROW
Format
Topics
Subjects
Journal
Article Type
Volume Subject Area
Date
Availability
1-6 of 6
Nitin Varshney
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Proceedings Papers
ISTFA2024, ISTFA 2024: Conference Proceedings from the 50th International Symposium for Testing and Failure Analysis, 22-27, October 28–November 1, 2024,
Abstract
View Papertitled, Optical Automated Interconnect Inspection of Printed Circuit Boards
View
PDF
for content titled, Optical Automated Interconnect Inspection of Printed Circuit Boards
In critical fields such as automotive, medicine, and defense, ensuring the reliability of microelectronics has been paramount given the extensive nature of their globalized supply chain. Automated visual inspection (AVI) of printed circuit boards (PCBs) offers a solution through computer vision and deep learning to automate defect detection, component verification, and quality assurance. In this paper, our research follows this precedent by introducing a novel dataset and annotations to train artificial intelligence (AI) models for extracting PCB connectivity components. Utilizing high-resolution images, and state-of-the-art instance segmentation models, this study aims to examine the difficulties in this implementation and lay the groundwork for more robust automated visual inspection.
Journal Articles
Journal: EDFA Technical Articles
EDFA Technical Articles (2024) 26 (3): 14–24.
Published: 01 August 2024
Abstract
View articletitled, Assessing Compatibility of Advanced IC Packages to X-ray Based Physical Inspection
View
PDF
for article titled, Assessing Compatibility of Advanced IC Packages to X-ray Based Physical Inspection
This article describes a proposed novel metric to furnish chip designers with a prognostic tool for x-ray imaging in the pre-silicon stage. This metric is fashioned to provide designers with a concrete measure of how visible the fine-pitched features of their designs are under x-ray inspection. It utilizes a combination of x-ray image data collection, analysis, and simulations to evaluate different design elements.
Proceedings Papers
ISTFA2023, ISTFA 2023: Conference Proceedings from the 49th International Symposium for Testing and Failure Analysis, 136-144, November 12–16, 2023,
Abstract
View Papertitled, Exploring the Effect of Annotation Quality on PCB Component Segmentation
View
PDF
for content titled, Exploring the Effect of Annotation Quality on PCB Component Segmentation
Due to the continuous outsourcing of printed circuit board (PCB) fabrication, PCB counterfeits and Trojans have increased by a significant margin, and this has necessitated rapid and advanced hardware assurance techniques. PCB Image segmentation is the primary step in PCB assurance. Over the years, few PCB component segmentation methods have been proposed and none of those have provided a definite benchmark of performance. Besides those methods haven’t discussed how the performance is correlated with underlying data or annotation quality. In this work, we present a benchmark on PCB image segmentation along with a high-quality dataset. In addition, we explore how annotation quality affects component segmentation and present possible future research directions to work with coarse annotations to alleviate the human effort behind full data annotation tasks. We have analyzed the performance of the preferred Deep Neural Network (DNN) architecture with the data annotation quality and presented the direction to leverage the outcome with limited quality annotations. Finally, we present the qualitative as well as the quantitative results to demonstrate the performance of our techniques and provide observations and future research directions on the overall task.
Proceedings Papers
ISTFA2023, ISTFA 2023: Conference Proceedings from the 49th International Symposium for Testing and Failure Analysis, 346-351, November 12–16, 2023,
Abstract
View Papertitled, Electron Beam Probing: The New Sheriff in Town for Security Analyzing of Sub- 7nm ICs - Exploring the Advantages of a Post-Photon Emission Technique
View
PDF
for content titled, Electron Beam Probing: The New Sheriff in Town for Security Analyzing of Sub- 7nm ICs - Exploring the Advantages of a Post-Photon Emission Technique
The increasing demand for semiconductor chips and the outsourcing of chip fabrication have heightened vulnerability to hardware security threats. While optical probing has been used extensively for semi-invasive/non-invasive attacks, its resolution limits and obsolescence in advanced technologies have necessitated exploring other techniques. Electron-beam probing (EBP) has emerged as a powerful method, offering 20x better spatial resolution than optical probing, and applies to sub- 7nm flip-chips and advanced 3D architecture systems. However, the increased resolution of EBP also poses a threat to sensitive information on these advanced chips, calling for developing countermeasures to secure assets. By understanding the capability of EBP, the potential of using EBP to extract sensitive data such as encryption keys, soft IP, neural network parameters, and proprietary algorithms will be discussed. This paper delves into the principles behind EBP, its capabilities, challenges for this technique, and potential applications in failure analysis and potential attacks. It highlights the need for developing effective countermeasures to protect sensitive information on advanced node technologies.
Proceedings Papers
ISTFA2023, ISTFA 2023: Conference Proceedings from the 49th International Symposium for Testing and Failure Analysis, 360-369, November 12–16, 2023,
Abstract
View Papertitled, LLE: Mitigating IC Piracy and Reverse Engineering by Last Level Edit
View
PDF
for content titled, LLE: Mitigating IC Piracy and Reverse Engineering by Last Level Edit
Hardware obfuscation is a proactive design-for- trust technique against integrated circuit (IC) supply chain threats, i.e., intellectual property (IP) piracy and overproduction. Many studies have evaluated numerous obfuscation techniques, broadly classified as IC camouflaging, logic locking, and split manufacturing. In split manufacturing, threats introduced by an untrusted foundry are eliminated by manufacturing only the front-end of line (FEOL) layers in the high-end untrusted foundry, and back-end of line (BEOL) layers in the design house’s trusted low-end foundry to hide BEOL connections from the untrusted foundry. However, researchers proposed several attacks based on physical layout design heuristic, network-flow model, and placement-routing proximity to extract missing back-end of line connections. Nevertheless, split manufacturing suffers from yield due to challenges in properly aligning FEOL connections with the BEOL. This paper proposes LLE, which protects ICs from piracy and reverse-engineering by untrusted foundries. In this approach, we perform layout-level obfuscation by creating an intermediate metal layer mesh to obscure the BEOL connections from the FEOL. After fabrication from an untrusted foundry, the mesh can be edited using a focused-ion beam (FIB) editing tool in a trusted facility (e.g., FIB lab) to realize the actual inter- connection. Hence, unlike split manufacturing, LLE eliminates the requirement of a separate trusted foundry and establishes trust in the microelectronic supply chain by lowering cost and yield loss. To validate the effectiveness of LLE, we fabricated a test chip in MITLL Low- Power FDSOI CMOS Process. In the silicon test chip, we demonstrate that LLE can prevent IC piracy and reverse engineering with low costs and yield losses in the semiconductor supply chain.
Proceedings Papers
ISTFA2021, ISTFA 2021: Conference Proceedings from the 47th International Symposium for Testing and Failure Analysis, 179-189, October 31–November 4, 2021,
Abstract
View Papertitled, Proof of Reverse Engineering Barrier: SEM Image Analysis on Covert Gates
View
PDF
for content titled, Proof of Reverse Engineering Barrier: SEM Image Analysis on Covert Gates
IC camouflaging has been proposed as a promising countermeasure against reverse engineering. Camouflaged gates contain multiple functional device structures, but appear as a single layout under microscope imaging, thereby concealing circuit functionality. The recent covert gate camouflaging design comes with a significantly reduced overhead cost, allowing numerous camouflaged gates in circuits which improves resiliency against invasive and semi-invasive attacks. Dummy inputs are used in the design, but SEM imaging analysis has only been performed on simplified contact structures so far. In this study, we fabricated real and dummy contacts in different structures and performed a systematic SEM analysis to investigate contact charging and passive voltage contrast. Machine learning based pattern recognition was also employed to examine the possibility of differentiating real and dummy contacts. Based on our experimental results, we found that the difference between real and dummy contacts is insignificant, which effectively prevents SEM-based reverse engineering.