Skip to main content
Log in

A Comprehensive Framework for Counterfeit Defect Coverage Analysis and Detection Assessment

  • Published:
Journal of Electronic Testing Aims and scope Submit manuscript

Abstract

The increasing threat of counterfeit electronic components has created specialized service of testing, detection, and avoidance of such components. However, various types of counterfeit components – recycled, remarked, overproduced, defective, cloned, forged documentation, and tampered – pose serious threats to supply chain. Over the past few years, standards and programs have been put in place throughout the supply chain that outline testing, documenting, and reporting procedures. However, there is little uniformity in the test results among the various entities. Currently, there are no metrics for evaluating these counterfeit detection methods. In this paper, we have developed a detailed taxonomy of defects present in counterfeit components. Based on this taxonomy, a comprehensive framework has been developed to find an optimum set of detection methods considering test time, test cost, and application risks. We have also performed an assessment of all the detection methods based on the newly introduced metrics – counterfeit defect coverage, under-covered defects, and not-covered defects.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Alam M, Mahapatra S (2005) A comprehensive model of pmos nbti degradation. Microelectron Reliab 45(1):71–81

    Article  Google Scholar 

  2. Bhardwaj S, Wang W, Vattikonda R, Cao Y, Vrudhula S (2006) Predictive modeling of the nbti effect for reliable design. In: Proceeding of IEEE on custom integrated circuits conference, pp 189–192

  3. Black J (1969) Electromigration - a brief survey and some recent results. IEEE Trans Electron Devices 16(4):338–347

    Article  Google Scholar 

  4. Bolotnyy L, Robins G (2007) Physically unclonable function-based security and privacy in rfid systems. In: Proceeding of IEEE International conference on pervasive computing and communications, pp 211–220

  5. Bushnell M, Agrawal V (2000) Essentials of electronic testing for digital, memory, and mixed-signal VLSI circuits. Springer

  6. Cassell J (2012) Reports of Counterfeit Parts Quadruple Since 2009, Challenging US Defence Industry and National Security

  7. CHASE (2013). http://www.chase.uconn.edu/arochase-special-workshop-on-counterfeit-electronics.php

  8. Chen K-L, Saller S, Groves I, Scott D (1985) Reliability effects on mos transistors due to hot-carrier injection. IEEE Trans Electron Devices 32(2):386–393

    Article  Google Scholar 

  9. CTI (2011) Certification for coutnerfeit components avoidance program. http://www.cti-us.com/pdf/CCAP101Certification.pdf

  10. Departnent of Defense (2010) Test method standard: microcircuits. [Online]. Available: http://www.landandmaritime.dla.mil/Downloads/MilSpec/Docs/MIL-STD-883/std883.pdf

  11. Departnent of Defense (2012) Test method standard: test methods for semiconductor devices. [Online]. Available: http://www.landandmaritime.dla.mil/Downloads/MilSpec/Docs/MIL-STD-750/std750.pdf

  12. Eldred RD (1959) Test routines based on symbolic logical statements. J ACM 6(1):33–37

    Article  MATH  MathSciNet  Google Scholar 

  13. Galey JM, Norby RE, Roth JP (1961) Techniques for the diagnosis of switching circuit failures. In: Proceedings of the Second annual symposium on switching circuit theory and logical design, pp 152–160

  14. GIDEP, Government-Industry Data Exchange Program (GIDEP). http://www.gidep.org/

  15. Groeseneken G, Degraeve R, Nigam T, Van den Bosch G, Maes HE (1999) Hot carrier degradation and time-dependent dielectric breakdown in oxides. Microelectron Eng 49(1–2):27–40

    Article  Google Scholar 

  16. Guin U, Tehranipoor M (2013) Counterfeit detection technology assessment. In: GOMACTech

  17. Guin U, Tehranipoor M (2013) On selection of counterfeit IC detection methods. In: IEEE North Atlantic test workshop (NATW)

  18. Guin U, Tehranipoor M, DiMase D, Megrdician M (2013) Counterfeit IC detection and challenges ahead. In: ACM SIGDA

  19. IDEA, Acceptability of electronic components distributed in the open market. http://www.idofea.org/products/118-idea-std-1010b

  20. Karri R, Rajendran J, Rosenfeld K, Tehranipoor M (2010) Trustworthy hardware: identifying and classifying hardware trojans. Computer 43(10):39–46

    Article  Google Scholar 

  21. Kessler LW, Sharpe T (2010) Faked parts detection, circuits assembly, the journal for surface mount and electronics assembly

  22. Koushanfar F, Qu G (2001) Hardware metering. In: DAC, pp 490–493

  23. Koushanfar F, Qu G, Potkonjak M (2001) Intellectual property metering. In: Inform. Hiding. Springer-Verlag, pp 81–95

  24. Kumar S, Guajardo J, Maes R, Schrijen G-J, Tuyls P (2008) Extended abstract: the butterfly puf protecting ip on every fpga. In: Proceedings of IEEE International workshop on hardware-oriented security and trust, pp 67–70

  25. Kursawe K, Sadeghi A-R, Schellekens D, Skoric B, Tuyls P (2009) Reconfigurable physical unclonable functions - enabling technology for tamper-resistant storage. In: Proceeding of IEEE International workshop on hardware-oriented security and trust, pp 22–29

  26. Mahapatra S, Saha D, Varghese D, Kumar P (2006) On the generation and recovery of interface traps in mosfets subjected to nbti, fn, and hci stress. IEEE Trans Electron Devices 53(7):1583–1592

    Article  Google Scholar 

  27. Mazumder P, Chakraborty K (1996) Testing and testable design of high-density random-access memories. Springer

  28. McPherson J (2006) Reliability challenges for 45nm and beyond. In: Proceeding of ACM/IEEE on Design automation conference, pp 176–181

  29. Miller M, Meraglia J, Hayward J (2012) Traceability in the age of globalization: a proposal for a marking protocol to assure authenticity of electronic parts. In: SAE aerospace electronics and avionics systems conference

  30. Mouli C, Carriker W (2007) Future Fab: how software is helping Intel go nano–and beyond. IEEE Spectr 44(3):38–43

    Article  Google Scholar 

  31. Nelson GF, Boggs WF (1975) Parametric tests meet the challenge of high-density ICs. Electronics 48(5):108–111

    Google Scholar 

  32. Pappu R (2001) Physical one-way functions. PhD dissertation, Massachusetts Institute of Technology

  33. Reddy V, Krishnan A, Marshall A, Rodriguez J, Natarajan S, Rost T, Krishnan S (2002) Impact of negative bias temperature instability on digital circuit reliability. In: Proceeding on reliability physics, pp 248–254

  34. SAE (2009) Counterfeit electronic parts; avoidance, detection, mitigation, and disposition. http://standards.sae.org/as5553/

  35. SAE, http://www.sae.org/works/committeeHome.do?comtID=TEAG19

  36. Schroder DK, Babcock JA (2003) Negative bias temperature instability: road to cross in deep submicron silicon semiconductor manufacturing. Appl Phys 94(1):1–18

    Article  Google Scholar 

  37. Seshu S, Freeman DN (1962) The diagnosis of asynchronous sequential switching systems, vol EC-11

  38. Soma M (1993) Fault coverage of dc parametric tests for embedded analog amplifiers. In: Proceedings on International test conference, pp 566–573

  39. Stathis J (2001) Physical and predictive models of ultrathin oxide reliability in cmos devices and circuits. IEEE Trans Device Mater Reliab 1(1):43–59

    Article  Google Scholar 

  40. Suh G, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In: Proceedings of ACM/IEEE on Design automation conference, pp 9–14

  41. Suk D, Reddy S (1981) A march test for functional faults in semiconductor random access memories. IEEE Trans Comput C30(12):982–985

    Article  Google Scholar 

  42. Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection. IEEE Des Test 27(1):10–25

    Article  Google Scholar 

  43. Tehranipoor M, Wang C (2012) Introduction to hardware security and trust. Springer

  44. trust-HUB, http://trust-hub.org/home

  45. US Congress, National Defense Authorization Act for Fiscal Year 2012. [Online]. Available: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf

  46. U.S. Department Of Commerce (2010) Defense industrial base assessment: counterfeit electronics

  47. U.S. Environmental Protection Agency (2011) Electronic waste management in the united states through 2009

  48. U.S. Senate Committee on Armed Services (2012) Inquiry into counterfeit electronic parts in the department of defence supply chain

  49. U.S. Senate Committee on Armed Services (2012) Suspect Counterfeit Electronic Parts Can Be Found on Internet Purchasing Platforms. [Online]. Available: http://www.gao.gov/assets/590/588736.pdf

  50. Villasenor J, Tehranipoor M (2012) Are you sure its new? the hidden dangers of recycled electronics components. In: IEEE spectrum

  51. Wang W, Reddy V, Krishnan A, Vattikonda R, Krishnan S, Cao Y (2007) Compact modeling and simulation of circuit reliability for 65-nm cmos technology. IEEE Trans Device Mater Reliab 7(4):509–517

    Article  Google Scholar 

  52. Zhang X, Tehranipoor M (2013) Design of on-chip light-weight sensors for effective detection of recycled ICs. In: TVLSI

  53. Zhang X, Tuzzio N, Tehranipoor M (2012) Identification of recovered ics using fingerprints from a light-weight on-chip sensor. In: DAC, pp 703–708

  54. Zhang X, Xiao K, Tehranipoor M (2012) Path-delay fingerprinting for identification of recovered ICs. In: DFT

Download references

Acknowledgments

The authors would like to thank Steve Walters of Honeywell, and the G19-A group members for providing valuable feedback on the defect taxonomy. The authors would also like to thank Huynh Yvonne of Boeing and Sultan Lilani of Integra Tech. for their feedback on developing the model.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ujjwal Guin.

Additional information

Responsible Editor: T. Xia

Rights and permissions

Reprints and permissions

About this article

Cite this article

Guin, U., DiMase, D. & Tehranipoor, M. A Comprehensive Framework for Counterfeit Defect Coverage Analysis and Detection Assessment. J Electron Test 30, 25–40 (2014). https://doi.org/10.1007/s10836-013-5428-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10836-013-5428-2

Keywords

Navigation