Non-Destructive PCB Reverse Engineering Using X-Ray Micro Computed Tomography

Reverse engineering of electronics systems is performed for various reasons ranging from honest ones such as failure analysis, fault isolation, trustworthiness verification, obsolescence management, etc. to dishonest ones such as cloning, counterfeiting, identification of vulnerabilities, development of attacks, etc. Regardless of the goal, it is imperative that the research community understands the requirements, complexities, and limitations of reverse engineering. Until recently, the reverse engineering was considered as destructive, time consuming, and prohibitively expensive, thereby restricting its application to a few remote cases. However, the advents of advanced characterization and imaging tools and software have counteracted this point of view. In this paper, we show how X-ray micro-tomography imaging can be combined with advanced 3D image processing and analysis to facilitate the automation of reverse engineering, and thereby lowering the associated time and cost. In this paper, we demonstrate our proposed process on two different printed circuit boards (PCBs). The first PCB is a four-layer custom designed board while the latter is a more complex commercial system. Lessons learned from this effort can be used to both develop advanced countermeasures and establish a more efficient workflow for instances where reverse engineering is deemed necessary.

[1]  Dick James,et al.  The State-of-the-Art in IC Reverse Engineering , 2009, CHES.

[2]  Ted J. Biggerstaff,et al.  Design recovery for maintenance and reuse , 1989, Computer.

[3]  Mark Mohammad Tehranipoor,et al.  A Survey on Chip to System Reverse Engineering , 2016, JETC.

[4]  Martial Hebert,et al.  Toward Objective Evaluation of Image Segmentation Algorithms , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[5]  Mark Mohammad Tehranipoor,et al.  Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead , 2014, J. Electron. Test..

[6]  Farinaz Koushanfar,et al.  A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.

[7]  Wen-Yen Wu,et al.  Automated inspection of printed circuit boards through machine vision , 1996 .

[8]  X. Pan,et al.  Unified reconstruction theory for diffraction tomography, with consideration of noise control. , 1998, Journal of the Optical Society of America. A, Optics, image science, and vision.

[9]  Milan Sonka,et al.  Image Processing, Analysis and Machine Vision , 1993, Springer US.

[10]  Navid Asadizanjani,et al.  Investigation of Surface Geometry Thermal Barrier Coatings using Computed X-Ray Tomography , 2015 .

[11]  Q. Henry Wu,et al.  A pseudo top-hat mathematical morphological approach to edge detection in dark regions , 2002, Pattern Recognit..

[12]  Abdul Nasir Zulkifli,et al.  Morphological operation on printed circuit board (PCB) reverse engineering using MATLAB , 2014 .

[13]  Ankur Srivastava,et al.  On application of one-class SVM to reverse engineering-based hardware Trojan detection , 2014, Fifteenth International Symposium on Quality Electronic Design.

[14]  Cliff Wang,et al.  Introduction to Hardware Security and Trust , 2011 .

[15]  Nikolaos G. Bourbakis,et al.  Reverse engineering of real PCB level design using VERILOG HDL , 2002 .

[16]  Bhabatosh Chanda,et al.  Multiscale morphological segmentation of gray-scale images , 2003, IEEE Trans. Image Process..

[17]  C. Kenney,et al.  3D — A proposed new architecture for solid-state radiation detectors , 1997 .