Abstract
The increasing threat of counterfeit electronic components has created specialized service of testing, detection, and avoidance of such components. However, various types of counterfeit components – recycled, remarked, overproduced, defective, cloned, forged documentation, and tampered – pose serious threats to supply chain. Over the past few years, standards and programs have been put in place throughout the supply chain that outline testing, documenting, and reporting procedures. However, there is little uniformity in the test results among the various entities. Currently, there are no metrics for evaluating these counterfeit detection methods. In this paper, we have developed a detailed taxonomy of defects present in counterfeit components. Based on this taxonomy, a comprehensive framework has been developed to find an optimum set of detection methods considering test time, test cost, and application risks. We have also performed an assessment of all the detection methods based on the newly introduced metrics – counterfeit defect coverage, under-covered defects, and not-covered defects.
Access this article
We’re sorry, something doesn't seem to be working properly.
Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.









Similar content being viewed by others
References
Alam M, Mahapatra S (2005) A comprehensive model of pmos nbti degradation. Microelectron Reliab 45(1):71–81
Bhardwaj S, Wang W, Vattikonda R, Cao Y, Vrudhula S (2006) Predictive modeling of the nbti effect for reliable design. In: Proceeding of IEEE on custom integrated circuits conference, pp 189–192
Black J (1969) Electromigration - a brief survey and some recent results. IEEE Trans Electron Devices 16(4):338–347
Bolotnyy L, Robins G (2007) Physically unclonable function-based security and privacy in rfid systems. In: Proceeding of IEEE International conference on pervasive computing and communications, pp 211–220
Bushnell M, Agrawal V (2000) Essentials of electronic testing for digital, memory, and mixed-signal VLSI circuits. Springer
Cassell J (2012) Reports of Counterfeit Parts Quadruple Since 2009, Challenging US Defence Industry and National Security
CHASE (2013). http://www.chase.uconn.edu/arochase-special-workshop-on-counterfeit-electronics.php
Chen K-L, Saller S, Groves I, Scott D (1985) Reliability effects on mos transistors due to hot-carrier injection. IEEE Trans Electron Devices 32(2):386–393
CTI (2011) Certification for coutnerfeit components avoidance program. http://www.cti-us.com/pdf/CCAP101Certification.pdf
Departnent of Defense (2010) Test method standard: microcircuits. [Online]. Available: http://www.landandmaritime.dla.mil/Downloads/MilSpec/Docs/MIL-STD-883/std883.pdf
Departnent of Defense (2012) Test method standard: test methods for semiconductor devices. [Online]. Available: http://www.landandmaritime.dla.mil/Downloads/MilSpec/Docs/MIL-STD-750/std750.pdf
Eldred RD (1959) Test routines based on symbolic logical statements. J ACM 6(1):33–37
Galey JM, Norby RE, Roth JP (1961) Techniques for the diagnosis of switching circuit failures. In: Proceedings of the Second annual symposium on switching circuit theory and logical design, pp 152–160
GIDEP, Government-Industry Data Exchange Program (GIDEP). http://www.gidep.org/
Groeseneken G, Degraeve R, Nigam T, Van den Bosch G, Maes HE (1999) Hot carrier degradation and time-dependent dielectric breakdown in oxides. Microelectron Eng 49(1–2):27–40
Guin U, Tehranipoor M (2013) Counterfeit detection technology assessment. In: GOMACTech
Guin U, Tehranipoor M (2013) On selection of counterfeit IC detection methods. In: IEEE North Atlantic test workshop (NATW)
Guin U, Tehranipoor M, DiMase D, Megrdician M (2013) Counterfeit IC detection and challenges ahead. In: ACM SIGDA
IDEA, Acceptability of electronic components distributed in the open market. http://www.idofea.org/products/118-idea-std-1010b
Karri R, Rajendran J, Rosenfeld K, Tehranipoor M (2010) Trustworthy hardware: identifying and classifying hardware trojans. Computer 43(10):39–46
Kessler LW, Sharpe T (2010) Faked parts detection, circuits assembly, the journal for surface mount and electronics assembly
Koushanfar F, Qu G (2001) Hardware metering. In: DAC, pp 490–493
Koushanfar F, Qu G, Potkonjak M (2001) Intellectual property metering. In: Inform. Hiding. Springer-Verlag, pp 81–95
Kumar S, Guajardo J, Maes R, Schrijen G-J, Tuyls P (2008) Extended abstract: the butterfly puf protecting ip on every fpga. In: Proceedings of IEEE International workshop on hardware-oriented security and trust, pp 67–70
Kursawe K, Sadeghi A-R, Schellekens D, Skoric B, Tuyls P (2009) Reconfigurable physical unclonable functions - enabling technology for tamper-resistant storage. In: Proceeding of IEEE International workshop on hardware-oriented security and trust, pp 22–29
Mahapatra S, Saha D, Varghese D, Kumar P (2006) On the generation and recovery of interface traps in mosfets subjected to nbti, fn, and hci stress. IEEE Trans Electron Devices 53(7):1583–1592
Mazumder P, Chakraborty K (1996) Testing and testable design of high-density random-access memories. Springer
McPherson J (2006) Reliability challenges for 45nm and beyond. In: Proceeding of ACM/IEEE on Design automation conference, pp 176–181
Miller M, Meraglia J, Hayward J (2012) Traceability in the age of globalization: a proposal for a marking protocol to assure authenticity of electronic parts. In: SAE aerospace electronics and avionics systems conference
Mouli C, Carriker W (2007) Future Fab: how software is helping Intel go nano–and beyond. IEEE Spectr 44(3):38–43
Nelson GF, Boggs WF (1975) Parametric tests meet the challenge of high-density ICs. Electronics 48(5):108–111
Pappu R (2001) Physical one-way functions. PhD dissertation, Massachusetts Institute of Technology
Reddy V, Krishnan A, Marshall A, Rodriguez J, Natarajan S, Rost T, Krishnan S (2002) Impact of negative bias temperature instability on digital circuit reliability. In: Proceeding on reliability physics, pp 248–254
SAE (2009) Counterfeit electronic parts; avoidance, detection, mitigation, and disposition. http://standards.sae.org/as5553/
SAE, http://www.sae.org/works/committeeHome.do?comtID=TEAG19
Schroder DK, Babcock JA (2003) Negative bias temperature instability: road to cross in deep submicron silicon semiconductor manufacturing. Appl Phys 94(1):1–18
Seshu S, Freeman DN (1962) The diagnosis of asynchronous sequential switching systems, vol EC-11
Soma M (1993) Fault coverage of dc parametric tests for embedded analog amplifiers. In: Proceedings on International test conference, pp 566–573
Stathis J (2001) Physical and predictive models of ultrathin oxide reliability in cmos devices and circuits. IEEE Trans Device Mater Reliab 1(1):43–59
Suh G, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In: Proceedings of ACM/IEEE on Design automation conference, pp 9–14
Suk D, Reddy S (1981) A march test for functional faults in semiconductor random access memories. IEEE Trans Comput C30(12):982–985
Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection. IEEE Des Test 27(1):10–25
Tehranipoor M, Wang C (2012) Introduction to hardware security and trust. Springer
trust-HUB, http://trust-hub.org/home
US Congress, National Defense Authorization Act for Fiscal Year 2012. [Online]. Available: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
U.S. Department Of Commerce (2010) Defense industrial base assessment: counterfeit electronics
U.S. Environmental Protection Agency (2011) Electronic waste management in the united states through 2009
U.S. Senate Committee on Armed Services (2012) Inquiry into counterfeit electronic parts in the department of defence supply chain
U.S. Senate Committee on Armed Services (2012) Suspect Counterfeit Electronic Parts Can Be Found on Internet Purchasing Platforms. [Online]. Available: http://www.gao.gov/assets/590/588736.pdf
Villasenor J, Tehranipoor M (2012) Are you sure its new? the hidden dangers of recycled electronics components. In: IEEE spectrum
Wang W, Reddy V, Krishnan A, Vattikonda R, Krishnan S, Cao Y (2007) Compact modeling and simulation of circuit reliability for 65-nm cmos technology. IEEE Trans Device Mater Reliab 7(4):509–517
Zhang X, Tehranipoor M (2013) Design of on-chip light-weight sensors for effective detection of recycled ICs. In: TVLSI
Zhang X, Tuzzio N, Tehranipoor M (2012) Identification of recovered ics using fingerprints from a light-weight on-chip sensor. In: DAC, pp 703–708
Zhang X, Xiao K, Tehranipoor M (2012) Path-delay fingerprinting for identification of recovered ICs. In: DFT
Acknowledgments
The authors would like to thank Steve Walters of Honeywell, and the G19-A group members for providing valuable feedback on the defect taxonomy. The authors would also like to thank Huynh Yvonne of Boeing and Sultan Lilani of Integra Tech. for their feedback on developing the model.
Author information
Authors and Affiliations
Corresponding author
Additional information
Responsible Editor: T. Xia
Rights and permissions
About this article
Cite this article
Guin, U., DiMase, D. & Tehranipoor, M. A Comprehensive Framework for Counterfeit Defect Coverage Analysis and Detection Assessment. J Electron Test 30, 25–40 (2014). https://doi.org/10.1007/s10836-013-5428-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10836-013-5428-2