A Comprehensive Framework for Counterfeit Defect Coverage Analysis and Detection Assessment

Ujjwal Guin1, Daniel DiMase2, Mohammad Tehranipoor1
1Department of ECE, University of Connecticut, Storrs, USA
2Honeywell Inc., Morristown, USA

Tóm tắt

Từ khóa


Tài liệu tham khảo

Alam M, Mahapatra S (2005) A comprehensive model of pmos nbti degradation. Microelectron Reliab 45(1):71–81

Bhardwaj S, Wang W, Vattikonda R, Cao Y, Vrudhula S (2006) Predictive modeling of the nbti effect for reliable design. In: Proceeding of IEEE on custom integrated circuits conference, pp 189–192

Black J (1969) Electromigration - a brief survey and some recent results. IEEE Trans Electron Devices 16(4):338–347

Bolotnyy L, Robins G (2007) Physically unclonable function-based security and privacy in rfid systems. In: Proceeding of IEEE International conference on pervasive computing and communications, pp 211–220

Bushnell M, Agrawal V (2000) Essentials of electronic testing for digital, memory, and mixed-signal VLSI circuits. Springer

Cassell J (2012) Reports of Counterfeit Parts Quadruple Since 2009, Challenging US Defence Industry and National Security

CHASE (2013). http://www.chase.uconn.edu/arochase-special-workshop-on-counterfeit-electronics.php

Chen K-L, Saller S, Groves I, Scott D (1985) Reliability effects on mos transistors due to hot-carrier injection. IEEE Trans Electron Devices 32(2):386–393

CTI (2011) Certification for coutnerfeit components avoidance program. http://www.cti-us.com/pdf/CCAP101Certification.pdf

Departnent of Defense (2010) Test method standard: microcircuits. [Online]. Available: http://www.landandmaritime.dla.mil/Downloads/MilSpec/Docs/MIL-STD-883/std883.pdf

Departnent of Defense (2012) Test method standard: test methods for semiconductor devices. [Online]. Available: http://www.landandmaritime.dla.mil/Downloads/MilSpec/Docs/MIL-STD-750/std750.pdf

Eldred RD (1959) Test routines based on symbolic logical statements. J ACM 6(1):33–37

Galey JM, Norby RE, Roth JP (1961) Techniques for the diagnosis of switching circuit failures. In: Proceedings of the Second annual symposium on switching circuit theory and logical design, pp 152–160

GIDEP, Government-Industry Data Exchange Program (GIDEP). http://www.gidep.org/

Groeseneken G, Degraeve R, Nigam T, Van den Bosch G, Maes HE (1999) Hot carrier degradation and time-dependent dielectric breakdown in oxides. Microelectron Eng 49(1–2):27–40

Guin U, Tehranipoor M (2013) Counterfeit detection technology assessment. In: GOMACTech

Guin U, Tehranipoor M (2013) On selection of counterfeit IC detection methods. In: IEEE North Atlantic test workshop (NATW)

Guin U, Tehranipoor M, DiMase D, Megrdician M (2013) Counterfeit IC detection and challenges ahead. In: ACM SIGDA

IDEA, Acceptability of electronic components distributed in the open market. http://www.idofea.org/products/118-idea-std-1010b

Karri R, Rajendran J, Rosenfeld K, Tehranipoor M (2010) Trustworthy hardware: identifying and classifying hardware trojans. Computer 43(10):39–46

Kessler LW, Sharpe T (2010) Faked parts detection, circuits assembly, the journal for surface mount and electronics assembly

Koushanfar F, Qu G (2001) Hardware metering. In: DAC, pp 490–493

Koushanfar F, Qu G, Potkonjak M (2001) Intellectual property metering. In: Inform. Hiding. Springer-Verlag, pp 81–95

Kumar S, Guajardo J, Maes R, Schrijen G-J, Tuyls P (2008) Extended abstract: the butterfly puf protecting ip on every fpga. In: Proceedings of IEEE International workshop on hardware-oriented security and trust, pp 67–70

Kursawe K, Sadeghi A-R, Schellekens D, Skoric B, Tuyls P (2009) Reconfigurable physical unclonable functions - enabling technology for tamper-resistant storage. In: Proceeding of IEEE International workshop on hardware-oriented security and trust, pp 22–29

Mahapatra S, Saha D, Varghese D, Kumar P (2006) On the generation and recovery of interface traps in mosfets subjected to nbti, fn, and hci stress. IEEE Trans Electron Devices 53(7):1583–1592

Mazumder P, Chakraborty K (1996) Testing and testable design of high-density random-access memories. Springer

McPherson J (2006) Reliability challenges for 45nm and beyond. In: Proceeding of ACM/IEEE on Design automation conference, pp 176–181

Miller M, Meraglia J, Hayward J (2012) Traceability in the age of globalization: a proposal for a marking protocol to assure authenticity of electronic parts. In: SAE aerospace electronics and avionics systems conference

Mouli C, Carriker W (2007) Future Fab: how software is helping Intel go nano–and beyond. IEEE Spectr 44(3):38–43

Nelson GF, Boggs WF (1975) Parametric tests meet the challenge of high-density ICs. Electronics 48(5):108–111

Pappu R (2001) Physical one-way functions. PhD dissertation, Massachusetts Institute of Technology

Reddy V, Krishnan A, Marshall A, Rodriguez J, Natarajan S, Rost T, Krishnan S (2002) Impact of negative bias temperature instability on digital circuit reliability. In: Proceeding on reliability physics, pp 248–254

SAE (2009) Counterfeit electronic parts; avoidance, detection, mitigation, and disposition. http://standards.sae.org/as5553/

SAE, http://www.sae.org/works/committeeHome.do?comtID=TEAG19

Schroder DK, Babcock JA (2003) Negative bias temperature instability: road to cross in deep submicron silicon semiconductor manufacturing. Appl Phys 94(1):1–18

Seshu S, Freeman DN (1962) The diagnosis of asynchronous sequential switching systems, vol EC-11

Soma M (1993) Fault coverage of dc parametric tests for embedded analog amplifiers. In: Proceedings on International test conference, pp 566–573

Stathis J (2001) Physical and predictive models of ultrathin oxide reliability in cmos devices and circuits. IEEE Trans Device Mater Reliab 1(1):43–59

Suh G, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In: Proceedings of ACM/IEEE on Design automation conference, pp 9–14

Suk D, Reddy S (1981) A march test for functional faults in semiconductor random access memories. IEEE Trans Comput C30(12):982–985

Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection. IEEE Des Test 27(1):10–25

Tehranipoor M, Wang C (2012) Introduction to hardware security and trust. Springer

trust-HUB, http://trust-hub.org/home

US Congress, National Defense Authorization Act for Fiscal Year 2012. [Online]. Available: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf

U.S. Department Of Commerce (2010) Defense industrial base assessment: counterfeit electronics

U.S. Environmental Protection Agency (2011) Electronic waste management in the united states through 2009

U.S. Senate Committee on Armed Services (2012) Inquiry into counterfeit electronic parts in the department of defence supply chain

U.S. Senate Committee on Armed Services (2012) Suspect Counterfeit Electronic Parts Can Be Found on Internet Purchasing Platforms. [Online]. Available: http://www.gao.gov/assets/590/588736.pdf

Villasenor J, Tehranipoor M (2012) Are you sure its new? the hidden dangers of recycled electronics components. In: IEEE spectrum

Wang W, Reddy V, Krishnan A, Vattikonda R, Krishnan S, Cao Y (2007) Compact modeling and simulation of circuit reliability for 65-nm cmos technology. IEEE Trans Device Mater Reliab 7(4):509–517

Zhang X, Tehranipoor M (2013) Design of on-chip light-weight sensors for effective detection of recycled ICs. In: TVLSI

Zhang X, Tuzzio N, Tehranipoor M (2012) Identification of recovered ics using fingerprints from a light-weight on-chip sensor. In: DAC, pp 703–708

Zhang X, Xiao K, Tehranipoor M (2012) Path-delay fingerprinting for identification of recovered ICs. In: DFT