Response to Counterfeit ICs in the Supply Chain

Similar documents
Contrasting Quality Inspections and Engineering Inspection for Counterfeit Detection

A Semiconductor Manufacturers Perspective on Obsolescence and Counterfeiting

Counterfeit or retrofit

Semiconductor Anti-Counterfeit Presentation

Tapan Ray Director General Organisation of Pharmaceutical Producers of India ALCAN PACKAGING UNIVERSITY OCT 8, LONAVALA

AMD ATI TSMC 28 nm Gate Last HKMG CMOS Process

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE S: Microelectronics Technology Development and Support (DMEA) FY 2013 OCO

Intel Xeon E3-1230V2 22 nm Tri-Gate Microprocessor

P-Channel 20 V (D-S) MOSFET

N-Channel 100 V (D-S) MOSFET

Apple/Cirrus Logic 338S1081/46L01 Multi-Standard Audio Decoder

N-Channel 60 V (D-S) MOSFET

N-Channel 30-V (D-S) MOSFET

Maxim. MAX V Ultra-Precision Low Noise Op Amp. Circuit Analysis

Texas Instruments/Apple 343S0538 Touch Screen Controller with F Die Markings

Texas Instruments TXS0108EZXYR 8 Bit Bidirectional Voltage-Level Translator

P-Channel 20-V (D-S) MOSFET

Qualcomm MSM8260A Snapdragon S4 Dual-Core System-on-Chip (SoC) Mobile Applications Processor

TLE7242-G 4 Channel Fixed Frequency Constant Current Control IC

Datasheet of SAW Device

Committed to crafting exceptional passports

Marvell 88E6046-TAH1 Four Port Fast Ethernet Plus Two Port Gigabit Ethernet Switch

Doug Dunn ASML President and Chief Executive Officer Deutsche Bank Conference London, England September 19, / Slide 1

Qualcomm MSM8926 Snapdragon 400 Application Processor

N-Channel 30-V (D-S) MOSFET

Samsung SDP1301 DTV SERDES Interface

P-Channel 8 V (D-S) MOSFET

Qualcomm QFE1100 Envelope Tracking PA Power Supply

Freescale MCIMX535DVV1C i.mx535 Mobile Applications Processor

Strategies to Eliminate Counterfeit IC s

N- and P-Channel 20-V (D-S) MOSFET

Load Switch with Level-Shift

MediaTek MT6167A Smartphone Radio Frequency (RF) Transceiver

ProImage/Agfa Graphics Industrial Counterfeiting: Threats, Standards, and Market Opportunities

July 12, Subject: DFARS Case 2012-D055 Definitions. Dear Ms. Murphy:

Datasheet of SAW Device

Intel Q3GM ES 32 nm CPU (from Core i5 660)

Counterfeit Detection Strategies: When to Do It / How to Do It By:

P-Channel 60-V (D-S) MOSFET

N-Channel 20 V (D-S) MOSFET

Intel Xeon E3-1230V2 CPU Ivy Bridge Tri-Gate 22 nm Process

N-Channel 20 V (D-S) MOSFET

Marvell I1062-B0 Hard Drive Controller SoC

Qualcomm Atheros AR8035 Ultra Low Power Single RGMII Gigabit Ethernet PHY

Package Pin Out Configuration. Part Number Compliance Marking Reel Size (inch) Tape Width (mm) Quantity per Reel UMC4NQ-7 Automotive NP ,000

Freescale MCIMX6Q5EYM10AC (i.mx6q) Integrated Multimedia Applications Processor

Apple/Dialog Semiconductor 343S0622-A1/D2018A WLED Driver

u-blox M8030-KT Concurrent Multi-GNSS Receiver

RDA Microelectronics RDA8851A GSM/GPRS Baseband SoC

Marvell Avastar 88W ac Wi-Fi 2x2 MIMO Combo Chip

Intel Technology Journal

FocalTech Systems FT5336GQQ and FT5436iGQQ (FS-123ATPBC Die) Capacitive Touch Screen Controller

Nanomanufacturing and Fabrication By Matthew Margolis

SMARTPHONES: THE UBIQUITOUS MEAN TO DEFEAT COUNTERFEITING WHITE PAPER ABOUT A DARK INDUSTRY

P-Channel 12 V (D-S) MOSFET

MediaTek MT3333AV (BT10085B Die) Satellite Receiver SoC

N-Channel 40 V (D-S) MOSFET

P-Channel 8 V (D-S) MOSFET

N-Channel 60-V (D-S) MOSFET

DATA SHEET: CL7003C2 ULTRAVIOLET C LIGHT EMITTING DIODE. Features: Applications: Package: PIN Configuration: Ordering Information:

P-Channel 30 V (D-S) MOSFET

ADC114YUQ. Mechanical Data. Features. Ordering Information (Notes 4 & 5) Marking Information NXX 1Y7 YM NXX YM

Photovoltaic MOSFET Driver with Integrated Fast Turn-Off, Solid-State Relay

Automotive P-Channel 60 V (D-S) 175 C MOSFET

Complementary (N- and P-Channel) MOSFET

Intel Xeon E3-1230V2 CPU Ivy Bridge Tri-Gate 22 nm Process

Automotive P-Channel 20 V (D-S) 175 C MOSFET

N- and P-Channel 60-V (D-S), 175 C MOSFET

Qualcomm MDM9235M 4G LTE Advanced Modem

N-Channel 20-V (D-S) MOSFET

P-Channel 2.5-V (G-S) MOSFET

Basic Functional Analysis. Sample Report Richmond Road, Suite 500, Ottawa, ON K2H 5B7 Canada Tel:

Qualcomm APQ8084 Snapdragon 805 Application Processor

Fullhan FH8520 Image Signal Processor

N- and P-Channel 30-V (D-S) MOSFET

Layout Analysis Floorplan

Applications Q2 E2. Device Symbol. Product Marking Reel size (inches) Tape width (mm) Quantity per reel ZXTC2063E6TA ,000

MEDIA KIT 2018 MEDIA KIT 2018 DELIVERING AN AUDIENCE OF ENGAGED PROFESSIONAL AND EMERGING PHOTOGRAPHERS LEAH KENNEDY

Data sheet acquired from Harris Semiconductor SCHS038C Revised October 2003

NV4V31SF. Data Sheet R08DS0070EJ0100 Rev Blue-Violet Laser Diode 405 nm Blue-Violet Laser Light Source DESCRIPTION FEATURES APPLICATIONS

Intellectual Property Initiatives

ADVANCED INFORMATION

Datasheet of SAW Device

P-Channel 20 V (D-S) MOSFET

FocalTech FT5316 Touch Screen Controller

Dynamic Semiconductor Years

DATA SHEET SE2597L: 2.4 GHz Power Amplifier with Power Detector Preliminary Information. Applications. Product Description.

Texas Instruments. SR5580CBA4 HDD Pre-Amplifier. Circuit Analysis of Hard Drive Write System

Obsolescence Management Challenges for Users of Semiconductors

IBM POWER7 Server 46J6702 IBM 45 nm Dual Stress Liner SOI CMOS Process with edram

Dual P-Channel 20-V (D-S) MOSFET

P-Channel 20 V (D-S) MOSFET

3 BANKNOTES AND COINS 3.1 THE CIRCULATION OF EURO BANKNOTES AND COINS AND THE HANDLING OF CURRENCY


Photovoltaic MOSFET Driver with Integrated Fast Turn-Off, Solid-State Relay

Ted Glum Director. Defense Microelectronics Activity

Datasheet of SAW Device

P-Channel 30-V (D-S) MOSFET

Dual N-Channel 20-V (D-S) MOSFET

DoD Electronics Priorities

Transcription:

Response to Counterfeit ICs in the Supply Chain Gary F. Shade Insight Analytical Labs (IAL) Email: gshade@ial-fa.com Introduction Webster [1] defines a counterfeit item as made in imitation of something else with intent to deceive. In the case of electronic components, this is done with increasing regularity to meet market demand with products at inflated prices often substituting complete frauds that do not match the form, fit, or function of the intended component. The counterfeiters attempt to deceive the consumer into thinking they are purchasing a legitimate item, or convince another supplier that they could deceive others with the imitation. An example of a remarked IC is shown in Figures 1(a) and 1(b). The IC was remarked to match a more desirable memory, thus increasing its present value. Figure 1(a): Optical photographs of two packages with same date code show very similar markings, but mold marks are missing on one device. Figure 1(b) Figure 1(c): X-ray inspection of packages in 1(a) and 1(b) indicates two products that are clearly different. One has been remarked and mixed in with authentic components to prevent detection. Counterfeiting of electronic components is occurring in increasing numbers requiring resources to maintain or improve quality levels. The presence of counterfeit components in the supply chain (and in use) has an impact to all who supply and use these components and their assemblies. Procurement methods coupled with failure analysis, utilizing industry experience and a disciplined approach can provide great improvements in reducing this impact. This article addresses this topic to promote awareness of the problem as well as offer some solutions. Each example presented will raise many questions, and only some will be answered here. It is 1

sufficient that those who use or analyze electronic components learn to be aware of conterfeiting and to take appropriate action. Examples from the supply chain The traditional opportunities for counterfeiters increased as semiconductor technology spread across multiple continents making basic IC processing more accessible. Now the opportunity is expanding even further as mature products are discontinued in favor of more profitable ones and supply chains reach across the globe and across many different languages, cultures and legal systems to meet demands. Thus, the ability to analyze and detect counterfeit components can be critical in insuring high quality. In the past, it was assumed that most counterfeit parts were copies (or clones) of high value components to be sold as the original for the full price. These clones were made by (often intensive) reverse engineering and reproduction of an IC. They were meant to operate like the original but each was produced without the experience and quality of the original manufacturer. This limited the choices for components likely to be counterfeit. With the maturing of the Electronic component industry, and its expanding range of low-cost commodity products, the opportunities for counterfeiters have increased. In addition, there are increasing numbers of components that are obsolete or have dwindling supply driving their value higher. Due to shortages, any electronic device can potentially increase in value and be a target for counterfeiting. To compound this, the worldwide shift towards lead-free solders has provided additional opportunities for fraud as manufacturers struggle in some cases to provide both leaded and lead-free products. This situation is leading to increased use of traditional counterfeit methods such as remarking the product type or speed of high-end components. At the same time, new methods are appearing such as modified RoHS markings and other fraud of low cost components. As a result, the quantity and variety of counterfeit ICs entering the supply channels is increasing. The next example shown is an IC marked as Lattice seen in Figure 2. Two parts are shown sideby-side from the same lot packaging. Notice that both parts have alpha-numeric markings indicating the same device type and assembly lot. Oddly, only one has a pin-1 indicator and the mold marks are only partially visible on the second unit. This is very unlikely to occur within the same assembly lot. Internal inspection after decapsulation [2] added more concern as the die on the right was produced by AMD a foundry known to be used by Lattice for this MACH production, but not until the late 1990s. (See figures 3 and 4). The date on the die is 1991 indicating the die is not likely to be authentic. The conclusion is the package has been sanded to remove old markings. Next it is remarked to look like the more recent (and valuable) one beside it. In addition to these observations, the product undergoes several tests to determine its authenticity. Each test result is then used to determine the overall confidence. Some products require many tests before authenticity can be determined. 2

Figure 2: Sample with no Pin-1 marker, very odd. Notice both parts appear to be from the same date code and assembly lot, yet the one on the right is missing the pin-1 dimple and most of the mold marks. Lighting has been adjusted to enhance the markings. Figure 3: After decapsulating the part in figure 2, the die markings are visible showing the AMD logo, Mask set number and copyright date. 3

Figure 4: Also visible after decapsulation is a second AMD logo of an aircraft representing the Mach name. Current Observations Today s leading edge process technology is becoming more difficult to copy with 7-10 layers of copper metallization, 45nm geometries and sophisticated packaging. These same products often use sophisticated anti-counterfeit measures that are a challenge to overcome for all but a few counterfeiters. These difficulty factors appear to be expanding the market for forgeries of mature, less complex components. Such components are still in very high demand and can be easy to introduce into the supply chain. To date, over 150 product types have been inspected for authenticity by the author s company. From these, forgeries have been observed that range from complete frauds (do not match the form, fit or function of the original) to subtle changes of the date code. The former are not likely to elude detection for long, but may pass through one or more distributors before being detected. More typical are parts that have the correct package type, but are remarked to indicate a match to a desirable part. Visual inspection alone will not detect these and they are often mixed in with authentic parts to further reduce detection. Remarked components recently detected have been from different date codes that are re-marked at the package level to appear from the same date code and revision level. Figures 5(a) and 5(b) show an example of detecting remarking. The top surface has been polished or ground away to remove the original marking and then a textured, black paint was sprayed on to refresh the surface. Careful inspection is required to observe the black paint as seen in this figure. Next, the package is re-labeled to match the original. The ink on counterfeit components may or may not meet mark permanency tests required by the industry. 4

Figure 5(a): Example of paint at package edge from remarking. Figure 5(b): Example of package remarking. Close-up view of figure 5 (a). Impact and Summary The size and impact of the counterfeit problem is difficult to measure. This past year (2007), the U.S. and European Union worked jointly to seize 360,000 counterfeit ICs and computer network components bearing over 40 different trademarks. These products were selected for the joint operation because they presented either a safety or security risk (along with infringing intellectual property rights) [3]. Globally, all forms of counterfeiting are on the rise. Experts estimate the total as 5-7% of total world trade [4]. The range of impact; however, is quite wide. Suppliers must now take extensive measures to secure supply channels to protect their image. Board and system manufacturers in turn need to qualify suppliers, with inclusion of methods for detecting counterfeit products. Component suppliers (brokers, distributors, etc.) need additional inspections to screen potential counterfeit products from reaching their customers. Finally, Failure Analysts need to apply additional measures to determine if failures are caused by the wrong component, potentially one that appears and operates similarly to an authentic device. Such counterfeit failures have been seen at IAL in the normal course of analysis. References [1] counterfeit. Merriam-Webster Online Dictionary. 2008. Merriam-Webster Online. 05 May 2008 < http://www.merriam-webster.com/dictionary/counterfeit> [2] Microelectronic FA Desk Reference, 3rd Edition, 1993, Mechanical and Chemical Decapsulation, ASM, Thomas W. Lee, pp. 61-90. [3] The United States Mission to the European Union. United States Mission to the European Union. 22 Feb. 2008 17 Apr. 2008 5

<http://useu.usmission.gov/dossiers/ipr/feb2208_operation_infrastructure.asp>, (This website is produced and maintained by the Public Affairs Office, United States Mission to the European Union) [4] Counterfeit, Wikipedia, The Free Encyclopedia. Apr. 16, 2008 <http://en.wikipedia.org/wiki/counterfeit>. Additional reading on Counterfeiting: [A-1] Shade, Gary F., and Brian Wilson. "Response to Counterfeit Integrated Circuit Components in the Supply Chain, Part I." Electronic Device Failure Analysis Magazine. Vol 10, No. 4. Nov. 2008: 16-22. [A-2] Grow, Brian, Chi-Chu Tschang, Cliff Edwards, and Brain Burnsed. "Dangerous Fakes." Business Week 2 Oct. 2008: 1-8. Business Week. 2 Oct. 2008. 4 Oct. 2008 <http://www.businessweek.com/print/magazine/content/08_41/b4103034193886.htm> [A-3] US Government. Immigration and Customs Enforcement (ICE). "Value of CBP, ICE seizures of counterfeit goods in FY2007 is up 27%. Nearly $200 million in goods confiscated as a result of enforcement actions." Press release. 28 Jan. 2008. 11 July 2008 <http://www.ice.gov/pi/news/newsreleases/articles/080128washingtondc.htm>. [A-4] Jorgensen, Barbara. "Chip makers step up anti-counterfeiting efforts." 31 Oct. 2006. EDN- Electronic Design News. Reed Elsevier Inc. 11 Nov. 2008 <http://www.edn.com/index.asp?layout=articleprint&articleid=ca6386712>. [A-5] "Beware Counterfeit electronic components." DataWeek 7 Apr. 2004: 1-2. Electronics and Communication Technology. 7 Apr. 2004. TechNews Publishing Ltd. 17 Nov. 2008 <http://dataweek.co.za/article.aspx?pklarticleid=2922&pklcategoryid=31>. [A-6] "Counterfeit Components: The Trends, the Threats and One Promising Solution." Counterfeit. BP council. 18 Nov. 2008 <http://www.bpcouncil.com/apage/609.php>. [A-7] Miller, Joanna. "Hidden No More." Mar. 2005. Schofield Media. 15 Aug. 2008. 24-28. <http://www.planetxs.com/images/march 2005 usbr article.pdf>. [A-8] Thompson, Brad. "Counterfeit." 1 Feb. 2005. Penwall Publishing. 18 Nov. 2008 <http://www.tmworld.com/article/ca500057.html>. [A-9] "Anti-counterfeiting Standards Task Force Launced at SEMICON West 2007." Aug. 2007. SEMI. 19 Nov. 2008 <http://www.semi.org/en/p042417>. 6