<p><p>This timely and exhaustive study offers a much-needed examination of the scope and consequences of the electronic counterfeit trade. The authors describe a variety of shortcomings and vulnerabilities in the electronic component supply chain, which can result in counterfeit integrated circuits
Counterfeit integrated circuits: detection and avoidance
✍ Scribed by Forte, Domenic;Guin, Ujjwal;Tehranipoor, Mark
- Publisher
- Springer
- Year
- 2015
- Tongue
- English
- Leaves
- 282
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
Introduction -- Conterfeit Integrated Circuits -- Counterfeit Defects -- Physical Tests for Counterfeit Detection -- Electrical Tests for Counterfeit Detection -- Counterfeit Test Coverage: An Assessment of Current Counterfeit Detection Methods -- Advanced Detection: Physical Tests -- Advanced Detection: Electrical Tests -- Combating Die and IC Recycling -- Hardware IP Watermarking -- Prevention of Unlicensed and Rejected ICs from Untrusted Foundry and Assembly -- Chip ID.
✦ Table of Contents
Introduction --
Conterfeit Integrated Circuits --
Counterfeit Defects --
Physical Tests for Counterfeit Detection --
Electrical Tests for Counterfeit Detection --
Counterfeit Test Coverage: An Assessment of Current Counterfeit Detection Methods --
Advanced Detection: Physical Tests --
Advanced Detection: Electrical Tests --
Combating Die and IC Recycling --
Hardware IP Watermarking --
Prevention of Unlicensed and Rejected ICs from Untrusted Foundry and Assembly --
Chip ID.
✦ Subjects
Circuits intégrés--Essais;Circuits intégrés--Vérification;Produits commerciaux--Contrefaçon;Circuits intégrés -- Essais;Circuits intégrés -- Vérification;Produits commerciaux -- Contrefaçon
📜 SIMILAR VOLUMES
<p>This book describes techniques to verify the authenticity of integrated circuits (ICs). It focuses on hardware Trojan detection and prevention and counterfeit detection and prevention. The authors discuss a variety of detection schemes and design methodologies for improving Trojan detection techn
<p>The history of this book begins way back in 1982. At that time a research proposal was filed with the Dutch Foundation for Fundamental Research on Matter concerning research to model defects in the layer structure of integrated circuits. It was projected that the results may be useful for yield e