SlideShare a Scribd company logo
1 of 21
Counterfeit ICs: Detection
and Prevention
of Recycled ICs Using On-
Chip Sensors
BY
S.SRINISHITH
15MV32
INTRODUCTION
• The counterfeiting of ICs is a major issue impacting the security of a wide
variety of electronic systems. A counterfeit component is defined as an
electronic part that is not genuine because it
(i) is an unauthorized copy;
(ii) does not conform to the original component manufacturer’s design,
model, and/or performance;
(iii) is not produced by the original component manufacturer or is
produced by unauthorized contractors;
(iv) is an off-specification, defective, or used original component
manufacturer’s product sold as “new” or working;
(v) has incorrect or false markings and/or documentation.
• These used or defective ICs enter the market when electronic
“recyclers” divert scrapped circuit boards away from their designated
place of disposal for the purposes of removing and reselling the ICs on
those boards. The detailed recycling process is shown in Figure.
Fig: ICs recycling process
• Since the recycling process usually involves a high-temperature
environment to remove ICs from their boards, there are several
security issues associated with these ICs:
(i) a used IC can act as a ticking time bomb since it does not
meet the specification of the unused (new) ICs;
(ii) an adversary can include additional die on top of the recycled
die, carrying a back-door attack.
• Therefore, it is vital to prevent these recycled ICs from entering
critical infrastructures.
• In general, recycled ICs have the same appearance, functionality, and
markings as the devices they are meant to mimic, but they have been
used for a period of time before they were resold. Even the best visual
inspection techniques will have difficulty identifying these ICs with
certainty. Physical tests, are often used to identify recycled ICs
through visual inspection, blacktop testing, scanning electron
microscopy (SEM), scanning acoustic microscopy (SAM), x-ray
imaging, x-ray fluorescence, Fourier transform infrared (FTIR)
spectroscopy, etc.
• These methods can efficiently detect recycled ICs with mechanical
defects, such as defects in packaging, lead, bond wires, die, etc.
• physical test cannot be verified all the ICs in a batch of chips as most
of these tests are based on sampling. On the other hand, electrical
detection methods can be applied to all the ICs under test.
• The first attempt to identify recycled ICs is presented in, a technique
that used on-chip sensors. The simulation and silicon results
demonstrated the effectiveness of the approach. This chapter will
focus on this technique for recycled IC identification.
• The major difference between recycled ICs and unused ICs is that
recycled Ics have already been used and have experienced aging, as
they were removed from their original boards and re-sold in the
market. Aging effects, such as negative bias temperature instability
(NBTI) and hot carrier injection (HCI), would have had an impact on
recycled ICs’ performance due to the change in threshold voltage.
Aging Analysis
• When the chip operates in functional mode, the transistors age mainly
due to NBTI and HCI. The aging effects of NBTI and HCI can cause
parametric shifts and circuit failures, as demonstrated by reliability
models.
• NBTI occurs when a negative gate-to-source voltage is applied at the
PMOS transistors.
• Equation shows the shift of Vth caused by NBTI
• HCI occurs when the electron or hole in the transistors gains sufficient
energy to overcome the silicon dioxide barrier in order to break an
interface state.
• two techniques using lightweight sensors (RO-based and AF-based)
will be presented to help with the detection of recycled Ics.
• The RO-based sensor is composed of a reference ring oscillator and a
stressed ring oscillator (Stressed RO). The Stressed RO is designed to
age at a very high rate by using high threshold voltage gates to
expedite aging so that Ics used for a period of time can be identified.
The Reference RO is gated off from the power supply during chip
operation, so that it experiences less stress.
• The frequency difference between the two ROs could denote the
usage time of the chip under test the larger the difference is, the longer
the CUT has been used.
• The RO-based sensor presents a negligible area overhead, imposes no
constraint on circuit layout, and is resilient to removal and tampering
attacks.
Fig: The structure of the RO-based sensor
• The main objectives in designing the RO-based sensor are:
(i) the sensor must age at a very high rate to help detect ICs used for a short
period of time,
(ii) The sensor must experience no aging during manufacturing testing,
(iii) The impact of process variations and temperature on the RO-based sensor
must be minimal,
(iv) The sensor must be resilient to attacks, and finally,
(v) The measurement process must be done using low-cost equipment, and be
very fast and easy.
• RO-based sensor, which is composed of a control module, a Reference
RO, a Stressed RO, a MUX, a timer, and a counter.
• The counter measures the cycle count of the two ROs during a pre-
specified time period, which is controlled by the timer. System clock is
used in the timer to minimize the measurement period variations due
to circuit aging.
• The MUX selects which RO is going to be measured, and is
controlled by the ROSEL signal.
• The Reference and Stressed ROs are identical; both are composed of
HVT components.
AF-based sensors:
• The AF-based sensor, composed of counters and an embedded anti
fuse memory block, is also presented to identify recycled ICs. The
counters are used to record the usage time of ICs, and the value is then
dynamically stored in the anti fuse memory block by controlling the
programming signal.
• Since the anti fuse memory block is one-time programmable,
“recyclers” cannot erase the context during the recycling process.
• Therefore, the AF-based sensor is resilient to removal and tampering
attacks.
• Two different structures of AF-based sensor are proposed to measure
the usage time of Ics
(i) an AF-based sensor using clock (CAF-based) records the cycle
count of the system clock during the chip operation. The usage time of
recycled ICs can be reported by this sensor and the measurement scale
and total measurement time can be adjusted according to the application
of ICs.
• (ii) an AF-based sensor using signal transition (SAF-based)
selects a certain number of signals with low switching probability and
records their switching activities to calculate usage time
Fig: The structure of the CAF-based sensor
• Figure shows the structure of the CAF-based sensor, which is composed of two
counters, a data read module, an adder, and an anti fuse OTP memory block.
• counter1 is used to divide the high frequency system clock with a lower frequency
signal, as shown in.
• counter2 is used to measure the cycle count of the lower frequency signal.
• The size of the two counters can be adjusted depending on the measurement scale.
• Since the data stored in registers (counters) could be lost or reset when the power
supply is off, non-erasable memory is required in this sensor. An embedded anti
fuse OTP block is used instead of a field programmable read-only memory
(FPROM).
• In order to eliminate the need for additional pins on the chip for authentication
purposes, the CAF-based sensor uses a MUX (MUX2) and an authentication pin
to send the usage time to the output pins of the ICs.
• This way, no extra output pins will be added to the original design. When the IC
works in normal functional mode, original primary outputs (OPOs) will go
through MUX2. If the IC is in authentication mode by enabling the authentication
signal,
Fig: The structure of the SAF-based sensor
• With two counters, the area overhead of the CAF-based sensor could
still be considered large for smaller designs. In order to reduce the area
overhead, an SAF-based sensor is proposed.
• SAF-based sensor is similar to that of the CAF-based sensor. The
difference is that the CAF-based sensor counts the cycle of system
clock to record the ICs’ usage time while the SAF-based sensor counts
the switching activity (positive edge) of a certain number of nets in the
design.
• During simulation, a certain number of nets are selected to be the input
of an AND gate. The rule of net selection is that the switching activity
of the output of the AND gate must meet the requirement of the
measurement scale.
• the accuracy of the SAF-based sensor is lower than the CAF-based
sensor because
(i) it is based on the switching activity of a certain number of nets
on the net list while CAF-based sensor counts the cycle count of the
system clock, and
(ii) the SAF-based sensor loses part of the usage time
information due to the shifters.
• The major advantage of the AF-based sensor over the RO-based
sensor is that the usage time stored in the AF-based sensors to identify
recycled ICs will not be impacted by technologies (i.e., older
technology designs do not age as much as the new ones do), packages,
assemblies, or process variations.
• Even if the design was fabricated at different times in different
foundries, the AF-based sensor can still indicate how long a chip under
testing has been used.
• In addition, AF-based sensors can identify recycled ICs used for a
very short period of time,

More Related Content

What's hot

TST Company Brochure
TST Company BrochureTST Company Brochure
TST Company Brochure
mason zhang
 
App095 en acquisition-internal-diameter-tubes
App095 en acquisition-internal-diameter-tubesApp095 en acquisition-internal-diameter-tubes
App095 en acquisition-internal-diameter-tubes
ISATECK
 
Tomar Industrial Signalling Products - Visual Signals, LED, Strobe Lighting, ...
Tomar Industrial Signalling Products - Visual Signals, LED, Strobe Lighting, ...Tomar Industrial Signalling Products - Visual Signals, LED, Strobe Lighting, ...
Tomar Industrial Signalling Products - Visual Signals, LED, Strobe Lighting, ...
Thorne & Derrick International
 
Tomar Emergency Vehicle Products - Lightbars, LED Lightheads, Self-contained ...
Tomar Emergency Vehicle Products - Lightbars, LED Lightheads, Self-contained ...Tomar Emergency Vehicle Products - Lightbars, LED Lightheads, Self-contained ...
Tomar Emergency Vehicle Products - Lightbars, LED Lightheads, Self-contained ...
Thorne & Derrick International
 
Micro e systems_mercuryii1900_datasheet
Micro e systems_mercuryii1900_datasheetMicro e systems_mercuryii1900_datasheet
Micro e systems_mercuryii1900_datasheet
Electromate
 

What's hot (20)

version1
version1version1
version1
 
SitrackVibes - Nuclear
SitrackVibes - NuclearSitrackVibes - Nuclear
SitrackVibes - Nuclear
 
Omni scan mx2_en_201203
Omni scan mx2_en_201203Omni scan mx2_en_201203
Omni scan mx2_en_201203
 
Introduction to Phased Array Using the OmniScan MX2 - Part Two
Introduction to Phased Array Using the OmniScan MX2 - Part TwoIntroduction to Phased Array Using the OmniScan MX2 - Part Two
Introduction to Phased Array Using the OmniScan MX2 - Part Two
 
Jaquet greenline us 11 08
Jaquet greenline us 11 08Jaquet greenline us 11 08
Jaquet greenline us 11 08
 
NC-CNC-DNC |Harin Prajapari |Mechanical Engineering |GTU
NC-CNC-DNC |Harin Prajapari |Mechanical Engineering |GTU NC-CNC-DNC |Harin Prajapari |Mechanical Engineering |GTU
NC-CNC-DNC |Harin Prajapari |Mechanical Engineering |GTU
 
Logistics information monitoring by means of rfid sensor tag
Logistics information monitoring by means of rfid sensor tagLogistics information monitoring by means of rfid sensor tag
Logistics information monitoring by means of rfid sensor tag
 
Case Study of Phased Array UT for B31.1 Piping
Case Study of Phased Array UT for B31.1 PipingCase Study of Phased Array UT for B31.1 Piping
Case Study of Phased Array UT for B31.1 Piping
 
TST Company Brochure
TST Company BrochureTST Company Brochure
TST Company Brochure
 
App095 en acquisition-internal-diameter-tubes
App095 en acquisition-internal-diameter-tubesApp095 en acquisition-internal-diameter-tubes
App095 en acquisition-internal-diameter-tubes
 
Electronic security system
Electronic security systemElectronic security system
Electronic security system
 
Miu872
Miu872Miu872
Miu872
 
Tomar Industrial Signalling Products - Visual Signals, LED, Strobe Lighting, ...
Tomar Industrial Signalling Products - Visual Signals, LED, Strobe Lighting, ...Tomar Industrial Signalling Products - Visual Signals, LED, Strobe Lighting, ...
Tomar Industrial Signalling Products - Visual Signals, LED, Strobe Lighting, ...
 
Introduction to Phased Array Using the OmniScan MX2 - Part Three
Introduction to Phased Array Using the OmniScan MX2 - Part ThreeIntroduction to Phased Array Using the OmniScan MX2 - Part Three
Introduction to Phased Array Using the OmniScan MX2 - Part Three
 
Zigbee based water quality monitoring system using solar power
Zigbee based water quality monitoring system using solar powerZigbee based water quality monitoring system using solar power
Zigbee based water quality monitoring system using solar power
 
Phased Array Scan Planning and Modeling for Weld inspection
Phased Array Scan Planning and Modeling for Weld inspectionPhased Array Scan Planning and Modeling for Weld inspection
Phased Array Scan Planning and Modeling for Weld inspection
 
Introduction to Phased Array Using the OmniScan MX2 - Part Four
Introduction to Phased Array Using the OmniScan MX2 - Part FourIntroduction to Phased Array Using the OmniScan MX2 - Part Four
Introduction to Phased Array Using the OmniScan MX2 - Part Four
 
TOFD PRO System
TOFD PRO SystemTOFD PRO System
TOFD PRO System
 
Tomar Emergency Vehicle Products - Lightbars, LED Lightheads, Self-contained ...
Tomar Emergency Vehicle Products - Lightbars, LED Lightheads, Self-contained ...Tomar Emergency Vehicle Products - Lightbars, LED Lightheads, Self-contained ...
Tomar Emergency Vehicle Products - Lightbars, LED Lightheads, Self-contained ...
 
Micro e systems_mercuryii1900_datasheet
Micro e systems_mercuryii1900_datasheetMicro e systems_mercuryii1900_datasheet
Micro e systems_mercuryii1900_datasheet
 

Viewers also liked

CV HAMIZAH AQILAH ABDULLAH 2016
CV HAMIZAH AQILAH ABDULLAH 2016CV HAMIZAH AQILAH ABDULLAH 2016
CV HAMIZAH AQILAH ABDULLAH 2016
Hamizah Aqilah
 
A new approach to erd s collaboration network using page rank
A new approach to erd s collaboration network using page rankA new approach to erd s collaboration network using page rank
A new approach to erd s collaboration network using page rank
Alexander Decker
 
σαμοθράκη
σαμοθράκησαμοθράκη
σαμοθράκη
teo70
 

Viewers also liked (18)

CV HAMIZAH AQILAH ABDULLAH 2016
CV HAMIZAH AQILAH ABDULLAH 2016CV HAMIZAH AQILAH ABDULLAH 2016
CV HAMIZAH AQILAH ABDULLAH 2016
 
A new approach to erd s collaboration network using page rank
A new approach to erd s collaboration network using page rankA new approach to erd s collaboration network using page rank
A new approach to erd s collaboration network using page rank
 
El món de la música
El món de la músicaEl món de la música
El món de la música
 
Ing obrasciviles
Ing obrascivilesIng obrasciviles
Ing obrasciviles
 
Session 8 d iariw gustafsson osterberg
Session 8 d iariw gustafsson osterbergSession 8 d iariw gustafsson osterberg
Session 8 d iariw gustafsson osterberg
 
222222
222222222222
222222
 
作业4第二部分
作业4第二部分作业4第二部分
作业4第二部分
 
Session 2 c iariw sakamoto
Session 2 c iariw sakamotoSession 2 c iariw sakamoto
Session 2 c iariw sakamoto
 
Role of the media on regional cooperation
Role of the  media on regional cooperationRole of the  media on regional cooperation
Role of the media on regional cooperation
 
UK Innovation Funding - what is available today? by @GrantTree
UK Innovation Funding - what is available today? by @GrantTreeUK Innovation Funding - what is available today? by @GrantTree
UK Innovation Funding - what is available today? by @GrantTree
 
Session 6 a comment on inklaar
Session 6 a comment on inklaarSession 6 a comment on inklaar
Session 6 a comment on inklaar
 
Holograms
HologramsHolograms
Holograms
 
Key stone draft
Key stone draftKey stone draft
Key stone draft
 
Welche Firmenwagen wählen Manager in Österreich und Deutschland
Welche Firmenwagen wählen Manager in Österreich und DeutschlandWelche Firmenwagen wählen Manager in Österreich und Deutschland
Welche Firmenwagen wählen Manager in Österreich und Deutschland
 
σαμοθράκη
σαμοθράκησαμοθράκη
σαμοθράκη
 
che guevara
che guevarache guevara
che guevara
 
videocon Telecom Project Report
videocon Telecom Project Reportvideocon Telecom Project Report
videocon Telecom Project Report
 
Yeshshree group of companies presentation
Yeshshree group of companies presentation Yeshshree group of companies presentation
Yeshshree group of companies presentation
 

Similar to Detection and prevention

Design Efficient Wireless Monitoring Platform for Recycling Point Spots
Design Efficient Wireless Monitoring Platform for Recycling Point SpotsDesign Efficient Wireless Monitoring Platform for Recycling Point Spots
Design Efficient Wireless Monitoring Platform for Recycling Point Spots
IJMTST Journal
 
Fingerprint EVM
Fingerprint EVMFingerprint EVM
Fingerprint EVM
Pranay Raj
 
8051 microcontroller
8051 microcontroller8051 microcontroller
8051 microcontroller
snehapvs
 
Pramod J Resume M.Sc. (Electronics) 3.5 Year Exprience in Hardware Design
Pramod J Resume M.Sc. (Electronics) 3.5 Year Exprience in Hardware DesignPramod J Resume M.Sc. (Electronics) 3.5 Year Exprience in Hardware Design
Pramod J Resume M.Sc. (Electronics) 3.5 Year Exprience in Hardware Design
Pramod Jangam
 

Similar to Detection and prevention (20)

Numerical Relaying.pptx
Numerical Relaying.pptxNumerical Relaying.pptx
Numerical Relaying.pptx
 
Ajal mod 1
Ajal mod 1Ajal mod 1
Ajal mod 1
 
Introduction to microcontrollers
Introduction to microcontrollersIntroduction to microcontrollers
Introduction to microcontrollers
 
RTOS based Confidential Area Security System
RTOS based Confidential Area Security SystemRTOS based Confidential Area Security System
RTOS based Confidential Area Security System
 
Water environment measuring system using ph sensor
Water environment measuring system using ph sensorWater environment measuring system using ph sensor
Water environment measuring system using ph sensor
 
Design Efficient Wireless Monitoring Platform for Recycling Point Spots
Design Efficient Wireless Monitoring Platform for Recycling Point SpotsDesign Efficient Wireless Monitoring Platform for Recycling Point Spots
Design Efficient Wireless Monitoring Platform for Recycling Point Spots
 
Wireless energy meter monitoring with automated tariff calculation
Wireless energy meter monitoring with automated tariff calculationWireless energy meter monitoring with automated tariff calculation
Wireless energy meter monitoring with automated tariff calculation
 
Core of the ES
Core of the ESCore of the ES
Core of the ES
 
Remote Monitoring System for Solar Inverters
Remote Monitoring System for Solar InvertersRemote Monitoring System for Solar Inverters
Remote Monitoring System for Solar Inverters
 
Fingerprint EVM
Fingerprint EVMFingerprint EVM
Fingerprint EVM
 
JamesEndl
JamesEndlJamesEndl
JamesEndl
 
Hardware Design For WSNs
Hardware Design For WSNsHardware Design For WSNs
Hardware Design For WSNs
 
Project_updated
Project_updatedProject_updated
Project_updated
 
version1
version1version1
version1
 
Reducing Area & Power Overhead In Design of Light Weight Sensor For Detection...
Reducing Area & Power Overhead In Design of Light Weight Sensor For Detection...Reducing Area & Power Overhead In Design of Light Weight Sensor For Detection...
Reducing Area & Power Overhead In Design of Light Weight Sensor For Detection...
 
MarutiProject
MarutiProjectMarutiProject
MarutiProject
 
8051 microcontroller
8051 microcontroller8051 microcontroller
8051 microcontroller
 
Pramod J Resume M.Sc. (Electronics) 3.5 Year Exprience in Hardware Design
Pramod J Resume M.Sc. (Electronics) 3.5 Year Exprience in Hardware DesignPramod J Resume M.Sc. (Electronics) 3.5 Year Exprience in Hardware Design
Pramod J Resume M.Sc. (Electronics) 3.5 Year Exprience in Hardware Design
 
ELN_3modul.pptx
ELN_3modul.pptxELN_3modul.pptx
ELN_3modul.pptx
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Detection and prevention

  • 1. Counterfeit ICs: Detection and Prevention of Recycled ICs Using On- Chip Sensors BY S.SRINISHITH 15MV32
  • 2. INTRODUCTION • The counterfeiting of ICs is a major issue impacting the security of a wide variety of electronic systems. A counterfeit component is defined as an electronic part that is not genuine because it (i) is an unauthorized copy; (ii) does not conform to the original component manufacturer’s design, model, and/or performance; (iii) is not produced by the original component manufacturer or is produced by unauthorized contractors; (iv) is an off-specification, defective, or used original component manufacturer’s product sold as “new” or working; (v) has incorrect or false markings and/or documentation.
  • 3. • These used or defective ICs enter the market when electronic “recyclers” divert scrapped circuit boards away from their designated place of disposal for the purposes of removing and reselling the ICs on those boards. The detailed recycling process is shown in Figure.
  • 5. • Since the recycling process usually involves a high-temperature environment to remove ICs from their boards, there are several security issues associated with these ICs: (i) a used IC can act as a ticking time bomb since it does not meet the specification of the unused (new) ICs; (ii) an adversary can include additional die on top of the recycled die, carrying a back-door attack. • Therefore, it is vital to prevent these recycled ICs from entering critical infrastructures.
  • 6. • In general, recycled ICs have the same appearance, functionality, and markings as the devices they are meant to mimic, but they have been used for a period of time before they were resold. Even the best visual inspection techniques will have difficulty identifying these ICs with certainty. Physical tests, are often used to identify recycled ICs through visual inspection, blacktop testing, scanning electron microscopy (SEM), scanning acoustic microscopy (SAM), x-ray imaging, x-ray fluorescence, Fourier transform infrared (FTIR) spectroscopy, etc. • These methods can efficiently detect recycled ICs with mechanical defects, such as defects in packaging, lead, bond wires, die, etc. • physical test cannot be verified all the ICs in a batch of chips as most of these tests are based on sampling. On the other hand, electrical detection methods can be applied to all the ICs under test.
  • 7. • The first attempt to identify recycled ICs is presented in, a technique that used on-chip sensors. The simulation and silicon results demonstrated the effectiveness of the approach. This chapter will focus on this technique for recycled IC identification. • The major difference between recycled ICs and unused ICs is that recycled Ics have already been used and have experienced aging, as they were removed from their original boards and re-sold in the market. Aging effects, such as negative bias temperature instability (NBTI) and hot carrier injection (HCI), would have had an impact on recycled ICs’ performance due to the change in threshold voltage.
  • 8. Aging Analysis • When the chip operates in functional mode, the transistors age mainly due to NBTI and HCI. The aging effects of NBTI and HCI can cause parametric shifts and circuit failures, as demonstrated by reliability models. • NBTI occurs when a negative gate-to-source voltage is applied at the PMOS transistors. • Equation shows the shift of Vth caused by NBTI
  • 9. • HCI occurs when the electron or hole in the transistors gains sufficient energy to overcome the silicon dioxide barrier in order to break an interface state.
  • 10. • two techniques using lightweight sensors (RO-based and AF-based) will be presented to help with the detection of recycled Ics. • The RO-based sensor is composed of a reference ring oscillator and a stressed ring oscillator (Stressed RO). The Stressed RO is designed to age at a very high rate by using high threshold voltage gates to expedite aging so that Ics used for a period of time can be identified. The Reference RO is gated off from the power supply during chip operation, so that it experiences less stress. • The frequency difference between the two ROs could denote the usage time of the chip under test the larger the difference is, the longer the CUT has been used. • The RO-based sensor presents a negligible area overhead, imposes no constraint on circuit layout, and is resilient to removal and tampering attacks.
  • 11. Fig: The structure of the RO-based sensor
  • 12. • The main objectives in designing the RO-based sensor are: (i) the sensor must age at a very high rate to help detect ICs used for a short period of time, (ii) The sensor must experience no aging during manufacturing testing, (iii) The impact of process variations and temperature on the RO-based sensor must be minimal, (iv) The sensor must be resilient to attacks, and finally, (v) The measurement process must be done using low-cost equipment, and be very fast and easy.
  • 13. • RO-based sensor, which is composed of a control module, a Reference RO, a Stressed RO, a MUX, a timer, and a counter. • The counter measures the cycle count of the two ROs during a pre- specified time period, which is controlled by the timer. System clock is used in the timer to minimize the measurement period variations due to circuit aging. • The MUX selects which RO is going to be measured, and is controlled by the ROSEL signal. • The Reference and Stressed ROs are identical; both are composed of HVT components.
  • 14. AF-based sensors: • The AF-based sensor, composed of counters and an embedded anti fuse memory block, is also presented to identify recycled ICs. The counters are used to record the usage time of ICs, and the value is then dynamically stored in the anti fuse memory block by controlling the programming signal. • Since the anti fuse memory block is one-time programmable, “recyclers” cannot erase the context during the recycling process. • Therefore, the AF-based sensor is resilient to removal and tampering attacks.
  • 15. • Two different structures of AF-based sensor are proposed to measure the usage time of Ics (i) an AF-based sensor using clock (CAF-based) records the cycle count of the system clock during the chip operation. The usage time of recycled ICs can be reported by this sensor and the measurement scale and total measurement time can be adjusted according to the application of ICs. • (ii) an AF-based sensor using signal transition (SAF-based) selects a certain number of signals with low switching probability and records their switching activities to calculate usage time
  • 16. Fig: The structure of the CAF-based sensor
  • 17. • Figure shows the structure of the CAF-based sensor, which is composed of two counters, a data read module, an adder, and an anti fuse OTP memory block. • counter1 is used to divide the high frequency system clock with a lower frequency signal, as shown in. • counter2 is used to measure the cycle count of the lower frequency signal. • The size of the two counters can be adjusted depending on the measurement scale. • Since the data stored in registers (counters) could be lost or reset when the power supply is off, non-erasable memory is required in this sensor. An embedded anti fuse OTP block is used instead of a field programmable read-only memory (FPROM). • In order to eliminate the need for additional pins on the chip for authentication purposes, the CAF-based sensor uses a MUX (MUX2) and an authentication pin to send the usage time to the output pins of the ICs. • This way, no extra output pins will be added to the original design. When the IC works in normal functional mode, original primary outputs (OPOs) will go through MUX2. If the IC is in authentication mode by enabling the authentication signal,
  • 18. Fig: The structure of the SAF-based sensor
  • 19. • With two counters, the area overhead of the CAF-based sensor could still be considered large for smaller designs. In order to reduce the area overhead, an SAF-based sensor is proposed. • SAF-based sensor is similar to that of the CAF-based sensor. The difference is that the CAF-based sensor counts the cycle of system clock to record the ICs’ usage time while the SAF-based sensor counts the switching activity (positive edge) of a certain number of nets in the design. • During simulation, a certain number of nets are selected to be the input of an AND gate. The rule of net selection is that the switching activity of the output of the AND gate must meet the requirement of the measurement scale.
  • 20. • the accuracy of the SAF-based sensor is lower than the CAF-based sensor because (i) it is based on the switching activity of a certain number of nets on the net list while CAF-based sensor counts the cycle count of the system clock, and (ii) the SAF-based sensor loses part of the usage time information due to the shifters.
  • 21. • The major advantage of the AF-based sensor over the RO-based sensor is that the usage time stored in the AF-based sensors to identify recycled ICs will not be impacted by technologies (i.e., older technology designs do not age as much as the new ones do), packages, assemblies, or process variations. • Even if the design was fabricated at different times in different foundries, the AF-based sensor can still indicate how long a chip under testing has been used. • In addition, AF-based sensors can identify recycled ICs used for a very short period of time,