Loading [MathJax]/extensions/MathMenu.js
Automated Detection and Localization of Counterfeit Chip Defects by Texture Analysis in Infrared (IR) Domain | IEEE Conference Publication | IEEE Xplore

Automated Detection and Localization of Counterfeit Chip Defects by Texture Analysis in Infrared (IR) Domain


Abstract:

Today's globalized supply chain for electronics design, fabrication, and distribution has resulted in a proliferation of counterfeit chips. Recycled and remarked chips ar...Show More

Abstract:

Today's globalized supply chain for electronics design, fabrication, and distribution has resulted in a proliferation of counterfeit chips. Recycled and remarked chips are the most common counterfeit types in the market, and prior work has shown that physical inspection is the best approach to detect them. However, it can be time-consuming, expensive, and destructive while relying on the use of subject matter experts. This paper proposes a low-cost, automated detection technique that examines surface variations within and between chips to identify defective chips. Further, it can estimate the location of the defects for additional analysis. The proposed method only requires a cheap IR camera-based setup to capture images of the chip package surface and is completely unsupervised and non-destructive. Experimental results on 25 chips in our lab demonstrate 100% detection accuracy.
Date of Conference: 15-16 December 2020
Date Added to IEEE Xplore: 03 February 2021
ISBN Information:
Conference Location: Washington, DC, USA
References is not available for this document.

I. Introduction

Counterfeit integrated circuits (ICs) are a serious threat to critical systems. There are several categories of counterfeit ICs, among which recycled and remarked ICs are the most prevalent found in the market [1]. Recycled and remarked ICs are removed from scrapped printed circuit boards (PCBs) and sold as new, often after their packages are sanded, recoated, and/or remarked. These recycled ICs are prone to failure and thus decrease system reliability and lifetime. If they are incorporated in safety and mission-critical systems like aircrafts, submarines, etc. they may cause catastrophic hazards and loss of lives. Therefore, identification of such ICs before they are integrated into systems is dire.

Select All
1.
Counterfeit Electronics Survey, November 2009.
2.
Makris Yiorgos, M. Carulli John, Ujjwal Guin, Ke Huang and Mohammad Tehranipoor, Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain, 2014.
3.
M.M. Tehranipoor, U. Guin and D. Forte, Counterfeit integrated circuits. In Counterfeit Integrated Circuits, Cham:Springer, pp. 15-36, 2015.
4.
U. Guin, D. Forte and M. Tehranipoor, "Anti-counterfeit techniques: from design to resign", 2013 14th International workshop on microprocessor test and verification, pp. 89-94, December. 2013.
5.
P. Ghosh and R. S. Chakraborty, "Recycled and Remarked Counterfeit Integrated Circuit Detection by Image-Processing-Based Package Texture and Indent Analysis", IEEE Transactions on Industrial Informatics, vol. 15, no. 4, pp. 1966-1974, April 2019.
6.
L. Liu, J. Chen, P. Fieguth et al., "From BoW to CNN: Two Decades of Texture Representation for Texture Classification", Int J Comput Vis, vol. 127, pp. 74-109, 2019.
7.
P. Ghosh and R. S. Chakraborty, "Counterfeit IC Detection By Image Texture Analysis", 2017 Euromicro Conference on Digital System Design (DSD), pp. 283-286, 2017.
8.
P. Ghosh, A. Bhattacharya, D. Forte et al., "Automated Defective Pin Detection for Recycled Microelectronics Identification", J Hardw Syst Secur, vol. 3, pp. 250-260, 2019.
9.
K. Huang, J. M. Carulli and Y. Makris, "Parametric counterfeit ic detection via support vector machines", Proc. IEEE Int. Symp. Defect Fault Tolerance VLSI Nanotechnol. Syst., pp. 7-12, 2012.
10.
B. Gassend, D. Lim, D. Clarke, M. Van Dijk and S. Devadas, "Identification and authentication of integrated circuits", Concurrency Comput.: Practice Exper., vol. 16, no. 11, pp. 1077-1098, 2004.
11.
U. Guin, M. Tehranipoor, D. DiMase and M. Megrdichian, "Counterfeit IC detection and challenges ahead", ACM SIGDA, vol. 43, no. 3, pp. 1-5, 2013.
12.
L. Birgé and P. Massart, Gaussian model selection. Journal of the European Mathematical Society, vol. 3, no. 3, pp. 203-268, 2001.
13.
B. S. Manjunath and W.-Y. Ma, "Texture features for browsing and retrieval of image data", IEEE TPAMI, vol. 18, no. 8, pp. 837-842, 1996.
14.
T. Jabid, M.H. Kabir and O. Chae, "Local directional pattern (LDP)-A robust image descriptor for object recognition Advanced Video and Signal Based Surveillance (AVSS)", 2010 Seventh IEEE International Conference on IEEE, pp. 482-487, 2010.
15.
S.Z. Ishraque, A.H. Banna and O. Chae, "Local Gabor directional pattern for facial expression recognition", Computer and Information Technology (ICCIT) 2012 15th International Conference on, pp. 164-167, 2012.
16.
C. Turan and K.M. Lam, "Histogram-based local descriptors for facial expression recognition (FER): A comprehensive study", Journal of visual communication and image representation, vol. 55, pp. 331-341, 2018.
17.
H.P. Kriegel, P. Kröger, E. Schubert and A. Zimek, "LoOP: local outlier probabilities", Proceedings of the 18th ACM conference on Information and knowledge management, pp. 1649-1652, November. 2009.
18.
J. Huang, Q. Zhu, L. Yang and J. Feng, "A non-parameter outlier detection algorithm based on Natural Neighbor", Knowledge-Based Systems, vol. 92, pp. 71-77, 2016.
19.
ToolboxDESC, March 2020, [online] Available: https://www.github.com/cigdemturan/ToolboxDESC.

Contact IEEE to Subscribe

References

References is not available for this document.