Non-Invasive Recognition of Poorly Resolved Integrated Circuit Elements

We present a non-invasive method for recognition of components in a digital CMOS integrated circuit (IC). We use a confocal infrared laser scanning optical microscope to collect multimodal images through the backside of the IC. Individual modes correspond to passive reflectivity measurements or active measurements, such as light-induced voltage alteration. The modes are registered and stored in a multidimensional data cube. We apply a machine learning algorithm using a binary representation to identify a variety of data structures from transistors to entire logic cells. Because of the compact representation, objects can be detected rapidly. We show that by increasing the number of imaging modes used to develop the descriptor, we can significantly increase recognition accuracy. The approach allows recognition of poorly resolved components, whose primary distinguishing features are below traditional optical resolution limits, and is general enough to be applied to multiple design processes. We believe this represents a significant step toward a fully non-invasive IC reverse engineering system.

[1]  Costas J. Spanos,et al.  Fundamentals of Semiconductor Manufacturing and Process Control: May/Fundamentals of Semiconductor Manufacturing and Process Control , 2006 .

[2]  Andrew Zisserman,et al.  Video Google: a text retrieval approach to object matching in videos , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.

[3]  Bennett B. Goldberg,et al.  Theoretical analysis of numerical aperture increasing lens microscopy , 2005 .

[4]  Hongtao Cui,et al.  Non Destructive Failure Analysis Technique With a Laboratory Based 3D X-ray Nanotomography System , 2006 .

[5]  G. S. Kino,et al.  Solid immersion lens , 1999, Other Conferences.

[6]  Yiorgos Makris,et al.  Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.

[7]  Mark Mohammad Tehranipoor,et al.  Layout-Aware Switching Activity Localization to Enhance Hardware Trojan Detection , 2012, IEEE Transactions on Information Forensics and Security.

[8]  Ralf Schweizer Elements Of Modern Optical Design , 2016 .

[9]  Edward I. Cole,et al.  Novel failure analysis techniques using photon probing with a scanning optical microscope , 1994, Proceedings of 1994 IEEE International Reliability Physics Symposium.

[10]  Mark Mohammad Tehranipoor,et al.  Trustworthy Hardware: Trojan Detection and Design-for-Trust Challenges , 2011, Computer.

[11]  H. Livingston Avoiding Counterfeit Electronic Components , 2007, IEEE Transactions on Components and Packaging Technologies.

[12]  Colin Studholme,et al.  An overlap invariant entropy measure of 3D medical image alignment , 1999, Pattern Recognit..

[13]  Berk Sunar,et al.  Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[14]  D. P. Vallett Failure analysis requirements for nanoelectronics , 2002 .

[15]  Sally Adee,et al.  The Hunt For The Kill Switch , 2008, IEEE Spectrum.

[16]  Vincent Lepetit,et al.  BRIEF: Binary Robust Independent Elementary Features , 2010, ECCV.

[17]  Ian McNulty,et al.  Tomographic reconstruction of an integrated circuit interconnect , 1999 .

[18]  Farinaz Koushanfar,et al.  High-sensitivity hardware Trojan detection using multimodal characterization , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[19]  Miodrag Potkonjak,et al.  Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach , 2008, Information Hiding.

[20]  Cordelia Schmid,et al.  A performance evaluation of local descriptors , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[21]  Costas J. Spanos,et al.  Fundamentals of Semiconductor Manufacturing and Process Control , 2006 .

[22]  Gabriela Csurka,et al.  Visual categorization with bags of keypoints , 2002, eccv 2004.

[23]  Richard Szeliski,et al.  Computer Vision - Algorithms and Applications , 2011, Texts in Computer Science.

[24]  Vincent Lepetit,et al.  DAISY: An Efficient Dense Descriptor Applied to Wide-Baseline Stereo , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[25]  Rosalinda M. Ring,et al.  Resistive interconnection localization , 2002, Proceedings of the 9th International Symposium on the Physical and Failure Analysis of Integrated Circuits (Cat. No.02TH8614).

[26]  Eric R. Ziegel,et al.  The Elements of Statistical Learning , 2003, Technometrics.

[27]  D.P. Vallett Why Waste Time on Roadmaps When We Don't Have Cars? , 2007, IEEE Transactions on Device and Materials Reliability.

[28]  Luc Van Gool,et al.  Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..

[29]  Dick James,et al.  The State-of-the-Art in IC Reverse Engineering , 2009, CHES.

[30]  Paiboon Tangyunyong,et al.  Soft defect localization (SDL) in integrated circuits using laser scanning microscopy , 2003, The 16th Annual Meeting of the IEEE Lasers and Electro-Optics Society, 2003. LEOS 2003..