Skip to main content
Top
Published in: Journal of Electronic Testing 1/2014

01-02-2014

Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead

Authors: Ujjwal Guin, Daniel DiMase, Mohammad Tehranipoor

Published in: Journal of Electronic Testing | Issue 1/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The counterfeiting of electronic components has become a major challenge in the 21st century. The electronic component supply chain has been greatly affected by widespread counterfeit incidents. A specialized service of testing, detection, and avoidance must be created to tackle the worldwide outbreak of counterfeit integrated circuits (ICs). So far, there are standards and programs in place for outlining the testing, documenting, and reporting procedures. However, there is not yet enough research addressing the detection and avoidance of such counterfeit parts. In this paper we will present, in detail, all types of counterfeits, the defects present in them, and their detection methods. We will then describe the challenges to implementing these test methods and to their effectiveness. We will present several anti-counterfeit measures to prevent this widespread counterfeiting, and we also consider the effectiveness and limitations of these anti-counterfeiting techniques.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
1.
go back to reference Alkabani YM, Koushanfar F (2007) Active hardware metering for intellectual property protection and security. In: Proceedings of 16th USENIX security symposium on USENIX security symposium, pp 20:1–20:16 Alkabani YM, Koushanfar F (2007) Active hardware metering for intellectual property protection and security. In: Proceedings of 16th USENIX security symposium on USENIX security symposium, pp 20:1–20:16
2.
go back to reference Alkabani Y, Koushanfar F, Potkonjak M (2007) Remote activation of ICs for piracy prevention and digital right management. In: Proceedings of IEEE/ACM international conference on computer-aided design, pp 674–677 Alkabani Y, Koushanfar F, Potkonjak M (2007) Remote activation of ICs for piracy prevention and digital right management. In: Proceedings of IEEE/ACM international conference on computer-aided design, pp 674–677
3.
go back to reference Arndt K, Narayan C, Brintzinger A, Guthrie W, Lachtrupp D, Mauger J, Glimmer D, Lawn S, Dinkel B, Mitwalsky A (1999) Reliability of laser activated metal fuses in drams. In: Proceedings of IEEE on electronics manufacturing technology symposium, pp 389–394 Arndt K, Narayan C, Brintzinger A, Guthrie W, Lachtrupp D, Mauger J, Glimmer D, Lawn S, Dinkel B, Mitwalsky A (1999) Reliability of laser activated metal fuses in drams. In: Proceedings of IEEE on electronics manufacturing technology symposium, pp 389–394
4.
go back to reference Baumgarten A, Tyagi A, Zambreno J (2010) Preventing IC piracy using reconfigurable logic barriers. IEEE Des Test of Comput 27(1):6–75CrossRef Baumgarten A, Tyagi A, Zambreno J (2010) Preventing IC piracy using reconfigurable logic barriers. IEEE Des Test of Comput 27(1):6–75CrossRef
5.
go back to reference Bolotnyy L, Robins G (2007) Physically unclonable function-based security and privacy in rfid systems. In: Proceedings of IEEE international conference on pervasive computing and communications, pp 211–220 Bolotnyy L, Robins G (2007) Physically unclonable function-based security and privacy in rfid systems. In: Proceedings of IEEE international conference on pervasive computing and communications, pp 211–220
6.
go back to reference Bushnell M, Agrawal V (2000) Essentials of electronic testing for digital, memory, and mixed-signal VLSI circuits. Springer Bushnell M, Agrawal V (2000) Essentials of electronic testing for digital, memory, and mixed-signal VLSI circuits. Springer
7.
go back to reference Cassell J (2012) Reports of counterfeit parts quadruple since 2009. Challenging US Defence Industry and National Security Cassell J (2012) Reports of counterfeit parts quadruple since 2009. Challenging US Defence Industry and National Security
8.
go back to reference Chakraborty R, Bhunia S (2008) Hardware protection and authentication through netlist level obfuscation. In: Proceedings of IEEE/ACM international conference on computer-aided design, pp 674 –677 Chakraborty R, Bhunia S (2008) Hardware protection and authentication through netlist level obfuscation. In: Proceedings of IEEE/ACM international conference on computer-aided design, pp 674 –677
9.
go back to reference Chakraborty R, Bhunia S (2009) HARPOON: an obfuscation-based SoC design methodology for hardware protection. IEEE Trans Comput Aided Des Integr Circ Syst 28(10):1493–1502CrossRef Chakraborty R, Bhunia S (2009) HARPOON: an obfuscation-based SoC design methodology for hardware protection. IEEE Trans Comput Aided Des Integr Circ Syst 28(10):1493–1502CrossRef
10.
go back to reference Chardonnal D (2011) Impacts of counterfeiting and piracy to reach US$1.7 trillion by 2015 Chardonnal D (2011) Impacts of counterfeiting and piracy to reach US$1.7 trillion by 2015
12.
go back to reference Contreras G, Rahman T, Tehranipoor M (2013) Secure split-test for preventing IC piracy by untrusted foundry and assembly. In: Proceedings of international symposium on fault and defect tolerance in VLSI systems Contreras G, Rahman T, Tehranipoor M (2013) Secure split-test for preventing IC piracy by untrusted foundry and assembly. In: Proceedings of international symposium on fault and defect tolerance in VLSI systems
14.
go back to reference CTI (2010) Comparison of AS 5553, CTI-CCAP-101B, and IDEA-STD-1010-A CTI (2010) Comparison of AS 5553, CTI-CCAP-101B, and IDEA-STD-1010-A
20.
go back to reference Galey JM, Norby RE, Roth JP (1961) Techniques for the diagnosis of switching circuit failures. In: Proceedings of the second annual symposium on switching circuit theory and logical design, pp 152–160 Galey JM, Norby RE, Roth JP (1961) Techniques for the diagnosis of switching circuit failures. In: Proceedings of the second annual symposium on switching circuit theory and logical design, pp 152–160
21.
go back to reference Gassend B, Clarke D, van Dijk M, Devadas S (2002) Silicon physical random functions. In: Proceedings of the 9th ACM conference on computer and communications security, ser. CCS ’02. ACM, New York, pp 148–160 Gassend B, Clarke D, van Dijk M, Devadas S (2002) Silicon physical random functions. In: Proceedings of the 9th ACM conference on computer and communications security, ser. CCS ’02. ACM, New York, pp 148–160
23.
go back to reference Grochowski A, Bhattacharya D, Viswanathan T, Laker K (1997) Integrated circuit testing for quality assurance in manufacturing: history, current status, and future trends. IEEE Trans Circ Syst II: Analog Digit Signal Process 44(8):610–633CrossRef Grochowski A, Bhattacharya D, Viswanathan T, Laker K (1997) Integrated circuit testing for quality assurance in manufacturing: history, current status, and future trends. IEEE Trans Circ Syst II: Analog Digit Signal Process 44(8):610–633CrossRef
24.
go back to reference Guajardo J, Kumar S, Schrijen G-J, Tuyls P (2007) Physical unclonable functions and public-key crypto for fpga ip protection. In: International conference onfield programmable logic and applications, pp 189–195 Guajardo J, Kumar S, Schrijen G-J, Tuyls P (2007) Physical unclonable functions and public-key crypto for fpga ip protection. In: International conference onfield programmable logic and applications, pp 189–195
25.
go back to reference Guin U, Tehranipoor M (2013) Counterfeit detection technology assessment. In: GOMACTech Guin U, Tehranipoor M (2013) Counterfeit detection technology assessment. In: GOMACTech
26.
go back to reference Guin U, Tehranipoor M (2013) On selection of counterfeit ic detection methods. In: IEEE north atlantic test workshop (NATW) Guin U, Tehranipoor M (2013) On selection of counterfeit ic detection methods. In: IEEE north atlantic test workshop (NATW)
27.
go back to reference Guin U, DiMase D, Tehranipoor M (2014) A comprehensive framework for counterfeit defect coverage analysis and detection assessment. J Electron Test Theory Appl (JETTA) 30(1). doi:10.1007/s10836-013-5428-2 Guin U, DiMase D, Tehranipoor M (2014) A comprehensive framework for counterfeit defect coverage analysis and detection assessment. J Electron Test Theory Appl (JETTA) 30(1). doi:10.​1007/​s10836-013-5428-2
28.
go back to reference Guin U, Forte D, Tehranipoor M (2013) Anti-Counterfeit techniques: from design to resign. In: Microprocessor test and verification (MTV) Guin U, Forte D, Tehranipoor M (2013) Anti-Counterfeit techniques: from design to resign. In: Microprocessor test and verification (MTV)
29.
go back to reference Guin U, Tehranipoor M, DiMase D, Megrdician M (2013) Counterfeit IC detection and challenges ahead. In: ACM SIGDA Guin U, Tehranipoor M, DiMase D, Megrdician M (2013) Counterfeit IC detection and challenges ahead. In: ACM SIGDA
31.
go back to reference Hori Y, Yoshida T, Katashita T, Satoh A (2010) Quantitative and statistical performance evaluation of arbiter physical unclonable functions on FPGAs. In: International conference on reconfigurable computing and FPGAs (ReConFig), pp 298–303 Hori Y, Yoshida T, Katashita T, Satoh A (2010) Quantitative and statistical performance evaluation of arbiter physical unclonable functions on FPGAs. In: International conference on reconfigurable computing and FPGAs (ReConFig), pp 298–303
32.
go back to reference Huang J, Lach J (2008) IC Activation and user authentication for security-sensitive systems. In: Proceedings of IEEE international workshop on hardware-oriented security and trust, pp 76–80 Huang J, Lach J (2008) IC Activation and user authentication for security-sensitive systems. In: Proceedings of IEEE international workshop on hardware-oriented security and trust, pp 76–80
35.
go back to reference IHS iSuppli (2011) Top 5 most counterfeited parts represent a ¡DOLLAR/¿169 billion potential challenge for global semiconductor market IHS iSuppli (2011) Top 5 most counterfeited parts represent a ¡DOLLAR/¿169 billion potential challenge for global semiconductor market
36.
go back to reference Jensen F, Petersen NE (1982) Burn-in: an engineering approach to the design and analysis of burn-in procedures. Wiley Jensen F, Petersen NE (1982) Burn-in: an engineering approach to the design and analysis of burn-in procedures. Wiley
37.
go back to reference Jones J (2009) Counterfeit components and acoustic microscopy Jones J (2009) Counterfeit components and acoustic microscopy
39.
go back to reference Koushanfar F, Qu G, Potkonjak M (2001) Intellectual property metering. In: Information hiding. Springer-Verlag, pp 81–95 Koushanfar F, Qu G, Potkonjak M (2001) Intellectual property metering. In: Information hiding. Springer-Verlag, pp 81–95
40.
go back to reference Koushanfar F, Qu G (2001) Hardware metering. In: Proceedings IEEE-ACM design automation conference, pp 490–493 Koushanfar F, Qu G (2001) Hardware metering. In: Proceedings IEEE-ACM design automation conference, pp 490–493
41.
go back to reference Kuemin C, Nowack L, Bozano L, Spencer ND, Wolf H (2012) Oriented assembly of gold nanorods on the single-particle level. Adv Funct Materi 22(4):702–708CrossRef Kuemin C, Nowack L, Bozano L, Spencer ND, Wolf H (2012) Oriented assembly of gold nanorods on the single-particle level. Adv Funct Materi 22(4):702–708CrossRef
42.
go back to reference Kumar S, Guajardo J, Maes R, Schrijen G-J, Tuyls P (2008) Extended abstract: the butterfly puf protecting ip on every fpga. In: Proceedings of IEEE international workshop on hardware-oriented security and trust, pp 67–70 Kumar S, Guajardo J, Maes R, Schrijen G-J, Tuyls P (2008) Extended abstract: the butterfly puf protecting ip on every fpga. In: Proceedings of IEEE international workshop on hardware-oriented security and trust, pp 67–70
43.
go back to reference Kursawe K, Sadeghi A-R, Schellekens D, Skoric B, Tuyls P (2009) Reconfigurable physical unclonable functions—enabling technology for tamper-resistant storage. In: Proceedings of IEEE international workshop on hardware-oriented security and trust, pp 22–29 Kursawe K, Sadeghi A-R, Schellekens D, Skoric B, Tuyls P (2009) Reconfigurable physical unclonable functions—enabling technology for tamper-resistant storage. In: Proceedings of IEEE international workshop on hardware-oriented security and trust, pp 22–29
45.
go back to reference Marshall M (2011) Best detection methods for counterfeit components Marshall M (2011) Best detection methods for counterfeit components
46.
go back to reference Lee J, Lim D, Gassend B, Suh G, van Dijk M, Devadas S (2004) A technique to build a secret key in integrated circuits for identification and authentication applications. In: Proceedings of digest of technical papers on VLSI circuits, pp 176–179 Lee J, Lim D, Gassend B, Suh G, van Dijk M, Devadas S (2004) A technique to build a secret key in integrated circuits for identification and authentication applications. In: Proceedings of digest of technical papers on VLSI circuits, pp 176–179
47.
go back to reference Lofstrom K, Daasch W, Taylor D (2000) Ic identification circuit using device mismatch. In: Proceedings of IEEE international solid-state circuits conference, pp 372–373 Lofstrom K, Daasch W, Taylor D (2000) Ic identification circuit using device mismatch. In: Proceedings of IEEE international solid-state circuits conference, pp 372–373
48.
go back to reference Mazumder P, Chakraborty K (1996) Testing and testable design of high-density random-access memories. Springer Mazumder P, Chakraborty K (1996) Testing and testable design of high-density random-access memories. Springer
49.
go back to reference Miller M, Meraglia J, Hayward J (2012) Traceability in the age of globalization: a proposal for a marking protocol to assure authenticity of electronic parts. In: SAE aerospace electronics and avionics systems conference Miller M, Meraglia J, Hayward J (2012) Traceability in the age of globalization: a proposal for a marking protocol to assure authenticity of electronic parts. In: SAE aerospace electronics and avionics systems conference
51.
go back to reference Mouli C, Carriker W (2007) Future Fab: how software is helping Intel go nano—and beyond. IEEE Spectr 44(3):38–43CrossRef Mouli C, Carriker W (2007) Future Fab: how software is helping Intel go nano—and beyond. IEEE Spectr 44(3):38–43CrossRef
52.
go back to reference Nelson GF, Boggs WF (1975) Parametric tests meet the challenge of high-density ICs. Electronics 48(5):108–111 Nelson GF, Boggs WF (1975) Parametric tests meet the challenge of high-density ICs. Electronics 48(5):108–111
54.
go back to reference Pappu R (2001) Physical one-way functions. Ph.D. dissertation, Massachusetts Institute of Technology Pappu R (2001) Physical one-way functions. Ph.D. dissertation, Massachusetts Institute of Technology
55.
go back to reference Poage JF (1963) Derivation of optimal tests to detect faults in combinational circuits. In: Proceedings of the symposium on mathematical theory of automata, pp 483–528 Poage JF (1963) Derivation of optimal tests to detect faults in combinational circuits. In: Proceedings of the symposium on mathematical theory of automata, pp 483–528
56.
go back to reference Robson N, Safran J, Kothandaraman C, Cestero A, Chen X, Rajeevakumar R, Leslie A, Moy D, Kirihata T, Iyer S (2007) Electrically programmable fuse (eFUSE): from memory redundancy to autonomic chips. In: CICC, pp 799–804 Robson N, Safran J, Kothandaraman C, Cestero A, Chen X, Rajeevakumar R, Leslie A, Moy D, Kirihata T, Iyer S (2007) Electrically programmable fuse (eFUSE): from memory redundancy to autonomic chips. In: CICC, pp 799–804
57.
go back to reference Roy J, Koushanfar F, Markov I (2008) EPIC: ending piracy of integrated circuits. In: Proceedings on design, automation and test in Europe, pp 1069–1074 Roy J, Koushanfar F, Markov I (2008) EPIC: ending piracy of integrated circuits. In: Proceedings on design, automation and test in Europe, pp 1069–1074
60.
go back to reference SAE (2009) Counterfeit electronic parts; avoidance, detection, mitigation, and disposition SAE (2009) Counterfeit electronic parts; avoidance, detection, mitigation, and disposition
61.
go back to reference Semiconductor Industry Association (SIA) (2012) Public comments—DNA authentication marking on items in FSC5962 Semiconductor Industry Association (SIA) (2012) Public comments—DNA authentication marking on items in FSC5962
62.
go back to reference Seshu S, Freeman DN (1962) The diagnosis of asynchronous sequential switching systems. IRE Trans Electron Comput EC-11(4):459–465CrossRefMathSciNet Seshu S, Freeman DN (1962) The diagnosis of asynchronous sequential switching systems. IRE Trans Electron Comput EC-11(4):459–465CrossRefMathSciNet
63.
go back to reference Soma M (1993) Fault coverage of dc parametric tests for embedded analog amplifiers. In: Proceedings on international test conference, pp 566–573 Soma M (1993) Fault coverage of dc parametric tests for embedded analog amplifiers. In: Proceedings on international test conference, pp 566–573
64.
go back to reference Suh G, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In: Proceedings of ACM/IEEE on design automation conference, pp 9–14 Suh G, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In: Proceedings of ACM/IEEE on design automation conference, pp 9–14
65.
go back to reference Suh GE, Clarke D, Gassend B, van Dijk M, Devadas S (2003) Aegis: architecture for tamper-evident and tamper-resistant processing. In: Proceedings of the 17th annual international conference on supercomputing, ser. ICS ’03. New York, ACM, pp 160–171 Suh GE, Clarke D, Gassend B, van Dijk M, Devadas S (2003) Aegis: architecture for tamper-evident and tamper-resistant processing. In: Proceedings of the 17th annual international conference on supercomputing, ser. ICS ’03. New York, ACM, pp 160–171
66.
go back to reference Su Y, Holleman J, Otis B (2007) A 1.6pj/bit 96 circuit using process variations. In: Proceedings of IEEE international on solid-state circuits conference, pp 406–611 Su Y, Holleman J, Otis B (2007) A 1.6pj/bit 96 circuit using process variations. In: Proceedings of IEEE international on solid-state circuits conference, pp 406–611
67.
go back to reference Suk D, Reddy S (1981) A march test for functional faults in semiconductor random access memories. IEEE Trans Comput C-30(12):982–985CrossRef Suk D, Reddy S (1981) A march test for functional faults in semiconductor random access memories. IEEE Trans Comput C-30(12):982–985CrossRef
68.
go back to reference Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection. IEEE Des Test Comput 27(1):10–25CrossRef Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection. IEEE Des Test Comput 27(1):10–25CrossRef
70.
go back to reference US (2010) Department Of commerce, defense industrial base assessment: counterfeit electronics US (2010) Department Of commerce, defense industrial base assessment: counterfeit electronics
73.
go back to reference US Environmental Protection Agency (2011) Electronic waste management in the united states through 2009 US Environmental Protection Agency (2011) Electronic waste management in the united states through 2009
74.
go back to reference US Senate Committee on armed services (2012) Inquiry into counterfeit electronic parts in the department of defence supply chain US Senate Committee on armed services (2012) Inquiry into counterfeit electronic parts in the department of defence supply chain
76.
go back to reference Wang X, Tehranipoor M (2010) Novel physical unclonable function with process and environmental variations. In: Proceedings on design, automation test in europe conference exhibition (DATE), pp 1065–1070 Wang X, Tehranipoor M (2010) Novel physical unclonable function with process and environmental variations. In: Proceedings on design, automation test in europe conference exhibition (DATE), pp 1065–1070
77.
go back to reference Yu M-DM, Sowell R, Singh A, M’Rahi D, Devadas S (2012) Performance metrics and empirical results of a PUF cryptographic key generation ASIC. In: HOST, pp 108–115 Yu M-DM, Sowell R, Singh A, M’Rahi D, Devadas S (2012) Performance metrics and empirical results of a PUF cryptographic key generation ASIC. In: HOST, pp 108–115
78.
go back to reference Zhang X, Tehranipoor M (2013) Design of on-chip light-weight sensors for effective detection of recycled ICs. In: IEEE transactions on VLSI systems Zhang X, Tehranipoor M (2013) Design of on-chip light-weight sensors for effective detection of recycled ICs. In: IEEE transactions on VLSI systems
79.
go back to reference Zhang X, Tuzzio N, Tehranipoor M (2012) Identification of recovered ICs using fingerprints from a light-weight on-chip sensor. In: Proceedings on IEEE-ACM design automation conference, pp 703–708 Zhang X, Tuzzio N, Tehranipoor M (2012) Identification of recovered ICs using fingerprints from a light-weight on-chip sensor. In: Proceedings on IEEE-ACM design automation conference, pp 703–708
Metadata
Title
Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead
Authors
Ujjwal Guin
Daniel DiMase
Mohammad Tehranipoor
Publication date
01-02-2014
Publisher
Springer US
Published in
Journal of Electronic Testing / Issue 1/2014
Print ISSN: 0923-8174
Electronic ISSN: 1573-0727
DOI
https://doi.org/10.1007/s10836-013-5430-8

Other articles of this Issue 1/2014

Journal of Electronic Testing 1/2014 Go to the issue

Announcement

New Editor

EditorialNotes

Editorial

Announcement

2013 Reviewers