Skip to main content
Erschienen in: Journal of Electronic Testing 1/2014

01.02.2014

Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead

verfasst von: Ujjwal Guin, Daniel DiMase, Mohammad Tehranipoor

Erschienen in: Journal of Electronic Testing | Ausgabe 1/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The counterfeiting of electronic components has become a major challenge in the 21st century. The electronic component supply chain has been greatly affected by widespread counterfeit incidents. A specialized service of testing, detection, and avoidance must be created to tackle the worldwide outbreak of counterfeit integrated circuits (ICs). So far, there are standards and programs in place for outlining the testing, documenting, and reporting procedures. However, there is not yet enough research addressing the detection and avoidance of such counterfeit parts. In this paper we will present, in detail, all types of counterfeits, the defects present in them, and their detection methods. We will then describe the challenges to implementing these test methods and to their effectiveness. We will present several anti-counterfeit measures to prevent this widespread counterfeiting, and we also consider the effectiveness and limitations of these anti-counterfeiting techniques.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Alkabani YM, Koushanfar F (2007) Active hardware metering for intellectual property protection and security. In: Proceedings of 16th USENIX security symposium on USENIX security symposium, pp 20:1–20:16 Alkabani YM, Koushanfar F (2007) Active hardware metering for intellectual property protection and security. In: Proceedings of 16th USENIX security symposium on USENIX security symposium, pp 20:1–20:16
2.
Zurück zum Zitat Alkabani Y, Koushanfar F, Potkonjak M (2007) Remote activation of ICs for piracy prevention and digital right management. In: Proceedings of IEEE/ACM international conference on computer-aided design, pp 674–677 Alkabani Y, Koushanfar F, Potkonjak M (2007) Remote activation of ICs for piracy prevention and digital right management. In: Proceedings of IEEE/ACM international conference on computer-aided design, pp 674–677
3.
Zurück zum Zitat Arndt K, Narayan C, Brintzinger A, Guthrie W, Lachtrupp D, Mauger J, Glimmer D, Lawn S, Dinkel B, Mitwalsky A (1999) Reliability of laser activated metal fuses in drams. In: Proceedings of IEEE on electronics manufacturing technology symposium, pp 389–394 Arndt K, Narayan C, Brintzinger A, Guthrie W, Lachtrupp D, Mauger J, Glimmer D, Lawn S, Dinkel B, Mitwalsky A (1999) Reliability of laser activated metal fuses in drams. In: Proceedings of IEEE on electronics manufacturing technology symposium, pp 389–394
4.
Zurück zum Zitat Baumgarten A, Tyagi A, Zambreno J (2010) Preventing IC piracy using reconfigurable logic barriers. IEEE Des Test of Comput 27(1):6–75CrossRef Baumgarten A, Tyagi A, Zambreno J (2010) Preventing IC piracy using reconfigurable logic barriers. IEEE Des Test of Comput 27(1):6–75CrossRef
5.
Zurück zum Zitat Bolotnyy L, Robins G (2007) Physically unclonable function-based security and privacy in rfid systems. In: Proceedings of IEEE international conference on pervasive computing and communications, pp 211–220 Bolotnyy L, Robins G (2007) Physically unclonable function-based security and privacy in rfid systems. In: Proceedings of IEEE international conference on pervasive computing and communications, pp 211–220
6.
Zurück zum Zitat Bushnell M, Agrawal V (2000) Essentials of electronic testing for digital, memory, and mixed-signal VLSI circuits. Springer Bushnell M, Agrawal V (2000) Essentials of electronic testing for digital, memory, and mixed-signal VLSI circuits. Springer
7.
Zurück zum Zitat Cassell J (2012) Reports of counterfeit parts quadruple since 2009. Challenging US Defence Industry and National Security Cassell J (2012) Reports of counterfeit parts quadruple since 2009. Challenging US Defence Industry and National Security
8.
Zurück zum Zitat Chakraborty R, Bhunia S (2008) Hardware protection and authentication through netlist level obfuscation. In: Proceedings of IEEE/ACM international conference on computer-aided design, pp 674 –677 Chakraborty R, Bhunia S (2008) Hardware protection and authentication through netlist level obfuscation. In: Proceedings of IEEE/ACM international conference on computer-aided design, pp 674 –677
9.
Zurück zum Zitat Chakraborty R, Bhunia S (2009) HARPOON: an obfuscation-based SoC design methodology for hardware protection. IEEE Trans Comput Aided Des Integr Circ Syst 28(10):1493–1502CrossRef Chakraborty R, Bhunia S (2009) HARPOON: an obfuscation-based SoC design methodology for hardware protection. IEEE Trans Comput Aided Des Integr Circ Syst 28(10):1493–1502CrossRef
10.
Zurück zum Zitat Chardonnal D (2011) Impacts of counterfeiting and piracy to reach US$1.7 trillion by 2015 Chardonnal D (2011) Impacts of counterfeiting and piracy to reach US$1.7 trillion by 2015
12.
Zurück zum Zitat Contreras G, Rahman T, Tehranipoor M (2013) Secure split-test for preventing IC piracy by untrusted foundry and assembly. In: Proceedings of international symposium on fault and defect tolerance in VLSI systems Contreras G, Rahman T, Tehranipoor M (2013) Secure split-test for preventing IC piracy by untrusted foundry and assembly. In: Proceedings of international symposium on fault and defect tolerance in VLSI systems
14.
Zurück zum Zitat CTI (2010) Comparison of AS 5553, CTI-CCAP-101B, and IDEA-STD-1010-A CTI (2010) Comparison of AS 5553, CTI-CCAP-101B, and IDEA-STD-1010-A
20.
Zurück zum Zitat Galey JM, Norby RE, Roth JP (1961) Techniques for the diagnosis of switching circuit failures. In: Proceedings of the second annual symposium on switching circuit theory and logical design, pp 152–160 Galey JM, Norby RE, Roth JP (1961) Techniques for the diagnosis of switching circuit failures. In: Proceedings of the second annual symposium on switching circuit theory and logical design, pp 152–160
21.
Zurück zum Zitat Gassend B, Clarke D, van Dijk M, Devadas S (2002) Silicon physical random functions. In: Proceedings of the 9th ACM conference on computer and communications security, ser. CCS ’02. ACM, New York, pp 148–160 Gassend B, Clarke D, van Dijk M, Devadas S (2002) Silicon physical random functions. In: Proceedings of the 9th ACM conference on computer and communications security, ser. CCS ’02. ACM, New York, pp 148–160
23.
Zurück zum Zitat Grochowski A, Bhattacharya D, Viswanathan T, Laker K (1997) Integrated circuit testing for quality assurance in manufacturing: history, current status, and future trends. IEEE Trans Circ Syst II: Analog Digit Signal Process 44(8):610–633CrossRef Grochowski A, Bhattacharya D, Viswanathan T, Laker K (1997) Integrated circuit testing for quality assurance in manufacturing: history, current status, and future trends. IEEE Trans Circ Syst II: Analog Digit Signal Process 44(8):610–633CrossRef
24.
Zurück zum Zitat Guajardo J, Kumar S, Schrijen G-J, Tuyls P (2007) Physical unclonable functions and public-key crypto for fpga ip protection. In: International conference onfield programmable logic and applications, pp 189–195 Guajardo J, Kumar S, Schrijen G-J, Tuyls P (2007) Physical unclonable functions and public-key crypto for fpga ip protection. In: International conference onfield programmable logic and applications, pp 189–195
25.
Zurück zum Zitat Guin U, Tehranipoor M (2013) Counterfeit detection technology assessment. In: GOMACTech Guin U, Tehranipoor M (2013) Counterfeit detection technology assessment. In: GOMACTech
26.
Zurück zum Zitat Guin U, Tehranipoor M (2013) On selection of counterfeit ic detection methods. In: IEEE north atlantic test workshop (NATW) Guin U, Tehranipoor M (2013) On selection of counterfeit ic detection methods. In: IEEE north atlantic test workshop (NATW)
27.
Zurück zum Zitat Guin U, DiMase D, Tehranipoor M (2014) A comprehensive framework for counterfeit defect coverage analysis and detection assessment. J Electron Test Theory Appl (JETTA) 30(1). doi:10.1007/s10836-013-5428-2 Guin U, DiMase D, Tehranipoor M (2014) A comprehensive framework for counterfeit defect coverage analysis and detection assessment. J Electron Test Theory Appl (JETTA) 30(1). doi:10.​1007/​s10836-013-5428-2
28.
Zurück zum Zitat Guin U, Forte D, Tehranipoor M (2013) Anti-Counterfeit techniques: from design to resign. In: Microprocessor test and verification (MTV) Guin U, Forte D, Tehranipoor M (2013) Anti-Counterfeit techniques: from design to resign. In: Microprocessor test and verification (MTV)
29.
Zurück zum Zitat Guin U, Tehranipoor M, DiMase D, Megrdician M (2013) Counterfeit IC detection and challenges ahead. In: ACM SIGDA Guin U, Tehranipoor M, DiMase D, Megrdician M (2013) Counterfeit IC detection and challenges ahead. In: ACM SIGDA
31.
Zurück zum Zitat Hori Y, Yoshida T, Katashita T, Satoh A (2010) Quantitative and statistical performance evaluation of arbiter physical unclonable functions on FPGAs. In: International conference on reconfigurable computing and FPGAs (ReConFig), pp 298–303 Hori Y, Yoshida T, Katashita T, Satoh A (2010) Quantitative and statistical performance evaluation of arbiter physical unclonable functions on FPGAs. In: International conference on reconfigurable computing and FPGAs (ReConFig), pp 298–303
32.
Zurück zum Zitat Huang J, Lach J (2008) IC Activation and user authentication for security-sensitive systems. In: Proceedings of IEEE international workshop on hardware-oriented security and trust, pp 76–80 Huang J, Lach J (2008) IC Activation and user authentication for security-sensitive systems. In: Proceedings of IEEE international workshop on hardware-oriented security and trust, pp 76–80
35.
Zurück zum Zitat IHS iSuppli (2011) Top 5 most counterfeited parts represent a ¡DOLLAR/¿169 billion potential challenge for global semiconductor market IHS iSuppli (2011) Top 5 most counterfeited parts represent a ¡DOLLAR/¿169 billion potential challenge for global semiconductor market
36.
Zurück zum Zitat Jensen F, Petersen NE (1982) Burn-in: an engineering approach to the design and analysis of burn-in procedures. Wiley Jensen F, Petersen NE (1982) Burn-in: an engineering approach to the design and analysis of burn-in procedures. Wiley
37.
Zurück zum Zitat Jones J (2009) Counterfeit components and acoustic microscopy Jones J (2009) Counterfeit components and acoustic microscopy
39.
Zurück zum Zitat Koushanfar F, Qu G, Potkonjak M (2001) Intellectual property metering. In: Information hiding. Springer-Verlag, pp 81–95 Koushanfar F, Qu G, Potkonjak M (2001) Intellectual property metering. In: Information hiding. Springer-Verlag, pp 81–95
40.
Zurück zum Zitat Koushanfar F, Qu G (2001) Hardware metering. In: Proceedings IEEE-ACM design automation conference, pp 490–493 Koushanfar F, Qu G (2001) Hardware metering. In: Proceedings IEEE-ACM design automation conference, pp 490–493
41.
Zurück zum Zitat Kuemin C, Nowack L, Bozano L, Spencer ND, Wolf H (2012) Oriented assembly of gold nanorods on the single-particle level. Adv Funct Materi 22(4):702–708CrossRef Kuemin C, Nowack L, Bozano L, Spencer ND, Wolf H (2012) Oriented assembly of gold nanorods on the single-particle level. Adv Funct Materi 22(4):702–708CrossRef
42.
Zurück zum Zitat Kumar S, Guajardo J, Maes R, Schrijen G-J, Tuyls P (2008) Extended abstract: the butterfly puf protecting ip on every fpga. In: Proceedings of IEEE international workshop on hardware-oriented security and trust, pp 67–70 Kumar S, Guajardo J, Maes R, Schrijen G-J, Tuyls P (2008) Extended abstract: the butterfly puf protecting ip on every fpga. In: Proceedings of IEEE international workshop on hardware-oriented security and trust, pp 67–70
43.
Zurück zum Zitat Kursawe K, Sadeghi A-R, Schellekens D, Skoric B, Tuyls P (2009) Reconfigurable physical unclonable functions—enabling technology for tamper-resistant storage. In: Proceedings of IEEE international workshop on hardware-oriented security and trust, pp 22–29 Kursawe K, Sadeghi A-R, Schellekens D, Skoric B, Tuyls P (2009) Reconfigurable physical unclonable functions—enabling technology for tamper-resistant storage. In: Proceedings of IEEE international workshop on hardware-oriented security and trust, pp 22–29
45.
Zurück zum Zitat Marshall M (2011) Best detection methods for counterfeit components Marshall M (2011) Best detection methods for counterfeit components
46.
Zurück zum Zitat Lee J, Lim D, Gassend B, Suh G, van Dijk M, Devadas S (2004) A technique to build a secret key in integrated circuits for identification and authentication applications. In: Proceedings of digest of technical papers on VLSI circuits, pp 176–179 Lee J, Lim D, Gassend B, Suh G, van Dijk M, Devadas S (2004) A technique to build a secret key in integrated circuits for identification and authentication applications. In: Proceedings of digest of technical papers on VLSI circuits, pp 176–179
47.
Zurück zum Zitat Lofstrom K, Daasch W, Taylor D (2000) Ic identification circuit using device mismatch. In: Proceedings of IEEE international solid-state circuits conference, pp 372–373 Lofstrom K, Daasch W, Taylor D (2000) Ic identification circuit using device mismatch. In: Proceedings of IEEE international solid-state circuits conference, pp 372–373
48.
Zurück zum Zitat Mazumder P, Chakraborty K (1996) Testing and testable design of high-density random-access memories. Springer Mazumder P, Chakraborty K (1996) Testing and testable design of high-density random-access memories. Springer
49.
Zurück zum Zitat Miller M, Meraglia J, Hayward J (2012) Traceability in the age of globalization: a proposal for a marking protocol to assure authenticity of electronic parts. In: SAE aerospace electronics and avionics systems conference Miller M, Meraglia J, Hayward J (2012) Traceability in the age of globalization: a proposal for a marking protocol to assure authenticity of electronic parts. In: SAE aerospace electronics and avionics systems conference
51.
Zurück zum Zitat Mouli C, Carriker W (2007) Future Fab: how software is helping Intel go nano—and beyond. IEEE Spectr 44(3):38–43CrossRef Mouli C, Carriker W (2007) Future Fab: how software is helping Intel go nano—and beyond. IEEE Spectr 44(3):38–43CrossRef
52.
Zurück zum Zitat Nelson GF, Boggs WF (1975) Parametric tests meet the challenge of high-density ICs. Electronics 48(5):108–111 Nelson GF, Boggs WF (1975) Parametric tests meet the challenge of high-density ICs. Electronics 48(5):108–111
54.
Zurück zum Zitat Pappu R (2001) Physical one-way functions. Ph.D. dissertation, Massachusetts Institute of Technology Pappu R (2001) Physical one-way functions. Ph.D. dissertation, Massachusetts Institute of Technology
55.
Zurück zum Zitat Poage JF (1963) Derivation of optimal tests to detect faults in combinational circuits. In: Proceedings of the symposium on mathematical theory of automata, pp 483–528 Poage JF (1963) Derivation of optimal tests to detect faults in combinational circuits. In: Proceedings of the symposium on mathematical theory of automata, pp 483–528
56.
Zurück zum Zitat Robson N, Safran J, Kothandaraman C, Cestero A, Chen X, Rajeevakumar R, Leslie A, Moy D, Kirihata T, Iyer S (2007) Electrically programmable fuse (eFUSE): from memory redundancy to autonomic chips. In: CICC, pp 799–804 Robson N, Safran J, Kothandaraman C, Cestero A, Chen X, Rajeevakumar R, Leslie A, Moy D, Kirihata T, Iyer S (2007) Electrically programmable fuse (eFUSE): from memory redundancy to autonomic chips. In: CICC, pp 799–804
57.
Zurück zum Zitat Roy J, Koushanfar F, Markov I (2008) EPIC: ending piracy of integrated circuits. In: Proceedings on design, automation and test in Europe, pp 1069–1074 Roy J, Koushanfar F, Markov I (2008) EPIC: ending piracy of integrated circuits. In: Proceedings on design, automation and test in Europe, pp 1069–1074
60.
Zurück zum Zitat SAE (2009) Counterfeit electronic parts; avoidance, detection, mitigation, and disposition SAE (2009) Counterfeit electronic parts; avoidance, detection, mitigation, and disposition
61.
Zurück zum Zitat Semiconductor Industry Association (SIA) (2012) Public comments—DNA authentication marking on items in FSC5962 Semiconductor Industry Association (SIA) (2012) Public comments—DNA authentication marking on items in FSC5962
62.
Zurück zum Zitat Seshu S, Freeman DN (1962) The diagnosis of asynchronous sequential switching systems. IRE Trans Electron Comput EC-11(4):459–465CrossRefMathSciNet Seshu S, Freeman DN (1962) The diagnosis of asynchronous sequential switching systems. IRE Trans Electron Comput EC-11(4):459–465CrossRefMathSciNet
63.
Zurück zum Zitat Soma M (1993) Fault coverage of dc parametric tests for embedded analog amplifiers. In: Proceedings on international test conference, pp 566–573 Soma M (1993) Fault coverage of dc parametric tests for embedded analog amplifiers. In: Proceedings on international test conference, pp 566–573
64.
Zurück zum Zitat Suh G, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In: Proceedings of ACM/IEEE on design automation conference, pp 9–14 Suh G, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In: Proceedings of ACM/IEEE on design automation conference, pp 9–14
65.
Zurück zum Zitat Suh GE, Clarke D, Gassend B, van Dijk M, Devadas S (2003) Aegis: architecture for tamper-evident and tamper-resistant processing. In: Proceedings of the 17th annual international conference on supercomputing, ser. ICS ’03. New York, ACM, pp 160–171 Suh GE, Clarke D, Gassend B, van Dijk M, Devadas S (2003) Aegis: architecture for tamper-evident and tamper-resistant processing. In: Proceedings of the 17th annual international conference on supercomputing, ser. ICS ’03. New York, ACM, pp 160–171
66.
Zurück zum Zitat Su Y, Holleman J, Otis B (2007) A 1.6pj/bit 96 circuit using process variations. In: Proceedings of IEEE international on solid-state circuits conference, pp 406–611 Su Y, Holleman J, Otis B (2007) A 1.6pj/bit 96 circuit using process variations. In: Proceedings of IEEE international on solid-state circuits conference, pp 406–611
67.
Zurück zum Zitat Suk D, Reddy S (1981) A march test for functional faults in semiconductor random access memories. IEEE Trans Comput C-30(12):982–985CrossRef Suk D, Reddy S (1981) A march test for functional faults in semiconductor random access memories. IEEE Trans Comput C-30(12):982–985CrossRef
68.
Zurück zum Zitat Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection. IEEE Des Test Comput 27(1):10–25CrossRef Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection. IEEE Des Test Comput 27(1):10–25CrossRef
70.
Zurück zum Zitat US (2010) Department Of commerce, defense industrial base assessment: counterfeit electronics US (2010) Department Of commerce, defense industrial base assessment: counterfeit electronics
73.
Zurück zum Zitat US Environmental Protection Agency (2011) Electronic waste management in the united states through 2009 US Environmental Protection Agency (2011) Electronic waste management in the united states through 2009
74.
Zurück zum Zitat US Senate Committee on armed services (2012) Inquiry into counterfeit electronic parts in the department of defence supply chain US Senate Committee on armed services (2012) Inquiry into counterfeit electronic parts in the department of defence supply chain
76.
Zurück zum Zitat Wang X, Tehranipoor M (2010) Novel physical unclonable function with process and environmental variations. In: Proceedings on design, automation test in europe conference exhibition (DATE), pp 1065–1070 Wang X, Tehranipoor M (2010) Novel physical unclonable function with process and environmental variations. In: Proceedings on design, automation test in europe conference exhibition (DATE), pp 1065–1070
77.
Zurück zum Zitat Yu M-DM, Sowell R, Singh A, M’Rahi D, Devadas S (2012) Performance metrics and empirical results of a PUF cryptographic key generation ASIC. In: HOST, pp 108–115 Yu M-DM, Sowell R, Singh A, M’Rahi D, Devadas S (2012) Performance metrics and empirical results of a PUF cryptographic key generation ASIC. In: HOST, pp 108–115
78.
Zurück zum Zitat Zhang X, Tehranipoor M (2013) Design of on-chip light-weight sensors for effective detection of recycled ICs. In: IEEE transactions on VLSI systems Zhang X, Tehranipoor M (2013) Design of on-chip light-weight sensors for effective detection of recycled ICs. In: IEEE transactions on VLSI systems
79.
Zurück zum Zitat Zhang X, Tuzzio N, Tehranipoor M (2012) Identification of recovered ICs using fingerprints from a light-weight on-chip sensor. In: Proceedings on IEEE-ACM design automation conference, pp 703–708 Zhang X, Tuzzio N, Tehranipoor M (2012) Identification of recovered ICs using fingerprints from a light-weight on-chip sensor. In: Proceedings on IEEE-ACM design automation conference, pp 703–708
Metadaten
Titel
Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead
verfasst von
Ujjwal Guin
Daniel DiMase
Mohammad Tehranipoor
Publikationsdatum
01.02.2014
Verlag
Springer US
Erschienen in
Journal of Electronic Testing / Ausgabe 1/2014
Print ISSN: 0923-8174
Elektronische ISSN: 1573-0727
DOI
https://doi.org/10.1007/s10836-013-5430-8

Weitere Artikel der Ausgabe 1/2014

Journal of Electronic Testing 1/2014 Zur Ausgabe