Counterfeit IC Detection: A Defect Database and Test Procedure

نویسندگان

  • Mahbub Alam
  • Sreeja Chowdhury
  • Navid Asadizanjani
  • Mark Tehranipoor
  • Domenic Forte
چکیده

Counterfeit electronics are a long-standing problem, which pose an enormous threat to the electronics industry and supply chain. Critical systems used in medical, transportation, defense, etc. have long life cycles which make it easier for long-term counterfeiting success. Physical inspection and electrical tests are the most common approach for counterfeit parts detection. During the physical inspection, exterior, interior, and material composition are examined to detect anomaly from the component under test. There are a diverse set of counterfeit IC types, all of which have their own unique defects. Thus, detection process requires a long time to test an IC against a long list of defects [2]. It is immensely difficult to classify and provide a universal physical inspection process for all counterfeit types. Apart from this, physical inspection requires subject matters expert (SME), and a wide range of expensive test equipment which makes the process costly. An automated approach [1] to physical inspection with reduced cost and time can be a solution to above problems. The main barrier towards overcoming the above challenges is the lack of defect data of counterfeit components as in general academia do not have access to costly equipment and samples. To address this, we developed a large database www.counterfeit-ic.org [2] for counterfeit electronic ICs that provides a great opportunity to student, practitioners, and researchers to study the defects. On contrary, electrical tests are used to compare the IC parameters such as current, voltage, delay, etc. to the specifications or any known reference data.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Comprehensive Framework for Counterfeit Defect Coverage Analysis and Detection Assessment

The increasing threat of counterfeit electronic components has created specialized service of testing, detection, and avoidance of such components. However, various types of counterfeit components – recycled, remarked, overproduced, defective, cloned, forged documentation, and tampered – pose serious threats to supply chain. Over the past few years, standards and programs have been put in place...

متن کامل

Advanced Physical Inspection Methods for Counterfeit IC Detection

The remarkable increase in counterfeit parts (a factor of 4 since 2009) [1] is a huge reliability and security concern in various industries ranging from automotive electronics to sensitive military applications increasing the possibility of premature failure in critical systems [2-5]. Counterfeit parts can also incur a great financial loss to legitimate electronics companies [6]. The issue is ...

متن کامل

Defect - Oriented Testing and Defective - Part - Level

0740-7475/01/$10.00 © 2001 IEEE January–February 2001 AFTER AN INTEGRATED CIRCUIT (IC) design is complete, but before first silicon arrives from the manufacturing facility, the design team prepares a set of test patterns to isolate defective parts. Applying this test pattern set to every manufactured part reduces the fraction of defective parts erroneously sold to customers as defect-free parts...

متن کامل

Built-in Self-test and Defect Tolerance in Molecular Electronics-based Nanofabrics

We propose a built-in self-test (BIST) procedure for nanofabrics implemented using chemically assembled electronic nanotechnology. Several fault detection configurations are presented to target stuck-at faults, shorts, opens, and connection faults in nanoblocks and switchblocks. The detectability of multiple faults in blocks within the nanofabric is also considered. We present an adaptive recov...

متن کامل

Counterfeit Drug Penetration into Global Legitimate Medicine Supply Chains: A Global Assessment

Counterfeit medicines are a global public health risk. We assess counterfeit reports involving the legitimate supply chain using 2009-2011 data from the Pharmaceutical Security Institute Counterfeit Incident System (PSI CIS) database that uses both open and nonpublic data sources. Of the 1,510 identified CIS reports involving counterfeits, 27.6% reported China as the source country of the incid...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017