Method for Characterizing Integrated Circuits for Identification or Security Purposes

ABSTRACT

A method of detecting small changes to a complex integrated circuit measuring RF/microwave scattering parameters between every pin over a wide frequency range. The data from a characterization of a known good integrated circuit is stored and compared to each subsequent integrated circuit of unknown background.

BACKGROUND

1. Field of the Invention

This invention relates generally to RF/microwave measurement techniques used in integrated circuit testing, and even more specifically to the use of microwave scattering parameters (S parameters) in such techniques.

2. Related Art

In the post 9/11 world, there is an increased need for and concern about enhanced security. The security of state of art electronics systems ranks high among these concerns. The United States Department of Defense (DOD) recognizes the importance of assuring the protection of vital components of electronics systems from tempering by hostile forces. The DOD has launched a number of programs, via the Defense Advanced Research Projects Agency (DARPA), to address the issue. DARPA's concern is that the ability exists to detect small changes that might deliberately be introduced into an integrated circuit for hostile purposes.

Modern integrated circuits (ICs) are very complex devices and different methods may be used to introduce hostile changes, which would not be detected immediately by ordinary electrical testing. For example, long delay electronic counters connected to disable circuitry could be introduced. Other changes to reduce electrical reliability by changing feature sizes may also be introduced.

Changes to an integrated circuit may occur at an untrusted stage of the design or manufacturing. The changes may include modifying the RTL (register transfer level), the netlist, the layout, the fabrication process, or even the silicon, for example, by using Focused Ion Beam (FIB) editing. An untrusted foundry may make logic insertions or modifications, or include IP cores, which contain parasitic features used to sabotage normal operations by changing delays, or disabling clocks or busses.

It might be desirable to identify particular integrated circuits, or parts of integrated circuits for the protection of intellectual property rights.

Therefore, a need exists for non-destructive methods to provide highly sensitive and selective detection of even very subtle modifications that appear anywhere in the IC lifecycle.

SUMMARY

The present invention provides a method for characterizing an integrated circuit. The method employs a microwave scattering parameter measurement technique that allows for the detection of tampering with ICs, which may occur during design and production cycles.

In one aspect of the present invention, a method is provided which includes stimulating a pin of an un-powered circuit direct RF probing, while measuring the RF energy that is reflected back on the input signal and measuring the RF energy that is present on the other pins. The measurement is repeated for every pin of the circuit. The generated measurement data represents a unique fingerprint of the circuit.

In another aspect of the present invention, a method is provided for using polarimetric millimeter-wave radar techniques. The method includes a waveguide that is placed in contact with the back of the IC or close to the front and mechanically scanned in two dimensions. Reflected signals are measured in both polarizations, the signal coupled to the IC pins are also measured.

Alternatively, a bi-static methods with a separate transmit and receive waveguide probe may also be used to monitor reflections in directions other than directly back toward the transmitter. Millimeter wave signals passing through the chip may also be measured in both polarizations with a second waveguide probe.

Yet another aspect of the present invention includes a method for verifying the authenticity of an integrated circuit of unknown background. The method includes characterizing an integrated circuit of known pedigree, characterizing an integrated circuit of unknown background, and comparing the fingerprints of the two integrated circuits. The method of characterization can include either of the methods described above.

The present invention allows for the use of a variety of comparison techniques, for example, it can use a simple visual graphic comparison, or a sophisticated pattern recognition technique, depending on the complexity of the ICs being verified.

The comparison of fingerprints for large and complex ICs requires extensive data processing. Pattern recognition techniques, such as dynamic time wrapping and back projection, originally developed for RADAR, speech recognition, and medical imaging may be used to make these comparisons.

The present invention provides a low cost, non-destructive method of assuring complex electronic hardware security that does not exist today. Any company or agency that desires to provide security testing of electronic hardware or to detect intellectual property violations can do so by using this low cost method, rather than traditional reverse engineering.

This brief summary has been provided so that the nature of the invention may be understood quickly. A more complete understanding of the invention can be obtained by reference to the following detailed description of the embodiments thereof in connection with the attached drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

The foregoing features and other features of the present invention are described with reference to the drawings. In the drawings, the same components have the same reference numerals. The illustrated embodiments are intended to illustrate, but not to limit the invention. The drawings include the following Figures:

FIG. 1 is a block diagram illustrating a setup used for IC characterization;

FIG. 2 is a simplified diagram illustrating a setup for IC characterization using a wave-guide probing technique in accordance with an embodiment of the present invention;

FIG. 3 is a flowchart illustrating a method of verifying the authenticity of an IC in accordance with an embodiment of the present invention;

FIG. 4 is a flowchart illustrating a method of characterizing an IC;

FIG. 5 is a flowchart illustrating a method of characterizing an IC using wave-guide probing technique in accordance with an embodiment of the present invention;

FIG. 6 is a graph representing a frequency domain “RF fingerprint” obtained measuring multiple pins in accordance with an embodiment of the present invention; and

FIG. 7 is a graph representing a time domain “RF fingerprint” obtained measuring one pin in accordance with an embodiment of the present invention.

DETAILED DESCRIPTION

The invention provides a method of using microwave signals to determine the characteristics of an integrated circuit (IC) such that the IC can be readily identified and any unexpected changes in the IC can be detected. In one embodiment, the invention provides a method for measuring microwave scattering parameters (S parameters) between pin pairs of a large integrated IC.

The S parameters represent the ratios between incident and reflected or transmitted waves. Because of the complex leakage paths and material interactions in an IC, if microwave signals are applied to the pins of the IC, a unique S parameter fingerprint may be identified and the data representing the fingerprint obtained. A collection of S parameter data obtained across a wide frequency range allows unique identification of the IC, thus detection of very small changes to the make up of the IC is possible.

Various RF/microwave scattering parameters, including amplitude and phase information for reflected and transmitted signals, are measured using equipment with a dynamic range exceeding 60 dB. RF/microwave scattering parameters in a complex digital circuit are the functions of direct and indirect signal paths between the pins.

FIG. 1 is a block diagram illustrating a setup used for IC characterization. Test setup 100 includes a network analyzer 102, such as RF/Microwave instrumentation, coupled to a device under test (DUT) 104, such as an IC, which is to be characterized via a probing means 110. Test setup 100 also includes a processor 106 used for controlling and interacting with network analyzer 102, and database 108 for storing characterization results data.

FIG. 2 is a simplified diagram illustrating a probing setup 200 for IC characterization using a wave-guide probing technique in accordance with an embodiment of the present invention. In this embodiment, probing setup 200 includes one or more circular waveguides 204 producing dual polarized electro-magnetic radiation. Circular waveguide 204 is attached to a 2D X-Y translation stage 202 and coupled to network analyzer 102 via a coax adapter (not shown).

In one embodiment, circular waveguide 204 operates in the range of 25-100 GHz to support two orthogonal polarizations. Waveguide 204 is dielectrically loaded to match the feature size of DUT 104 to achieve an illumination face diameter about 1 mm. In operation, waveguide 204 is placed in contact with a backside of DUT 104 or alternatively placed close to the front side of DUT 104. The DUT 104 is mechanically scanned by moving of translation stage 202 carrying the waveguide 204 to move in the x and y direction during characterization.

FIG. 3 is a flowchart illustrating a method 300 for verifying the authenticity of a DUT in accordance with an embodiment of the present invention. Referring now to FIGS. 1 and 3, in step 3302, DUT 104, such as an IC with a known pedigree is characterized, to create a “trusted” RF fingerprint. RF instrumentation 102 using probing means 110 is applied to DUT 104. The resulting RF fingerprint data is than stored as a “trusted fingerprint” in database 108.

In step s304, when a new DUT 104 is to be verified for authenticity, the new DUT 104 is probed using an identical characterization process to that used in step s302 to create the trusted fingerprint. The result is a new fingerprint representing new DUT 104.

In step s306, the trusted fingerprint is compared to the new fingerprint. A match of the fingerprint characteristics points to the authenticity of the new DUT 104.

FIG. 4 is a flowchart illustrating a method 400 of characterizing an IC. Method 400 is used for characterizing an IC using a probing technique, where probes are directly connected to DUT 104.

In steps s402-s406 a DUT 104 is provided for testing and testing parameters and conditions for DUT 104 are set and configured.

In step s408, a stimulus is supplied to DUT 104, for example, RF signals are coupled to pin pairs of a not “powered on” IC. When microwave radiation moves across the IC, via leakage paths, parasitic coupling and reflection from discontinuities between the metal, polysilicon, and transistor devices influence the microwave signal depending on their size and location. The response to this stimulus is captured in step s410, since the amplitude and phase of each signal path is a function of the frequency. Over a wide frequency range, many simultaneous paths result in a superposition of signals, whose amplitude and phase change significantly with the frequency, resulting in a unique signature for each IC or part of an IC. It should be understood that steps s408 and s410 may not be two distinct events in time, but rather occur simultaneously.

In step s412, measurement results are stored for future processing in steps s414 and s416, it is determined to repeat steps s408-s412 until all pin pairs of the IC have been tested.

By testing all IC pin pairs, method 400 collects, analyzes, and correlates a large raw microwave S parameter data set. This data set is the RF fingerprint. The RF fingerprint uniquely characterizes a particular circuit implementation.

Another set of fingerprint data my be obtained by transforming amplitude and phase scattering data over a frequency range, into time domain using Fourier transform, where gating and inverse transform methods may be used to remove the effects of certain discontinuities or to examine particular areas of DUT 104, based on the effective propagation time of the RF/microwave signals.

FIG. 5 is a flowchart illustrating a method of characterizing an IC using wave-guide probing technique in accordance with an embodiment of the present invention. Method 500 includes characterizing an IC using a waveguide based probing technique, for example, where dual polarized waveguide 204 (FIG. 2) is coupled to DUT 104.

Referring now to FIGS. 2 and 5, the characterization method in steps s502-s506 sets up the IC testing by providing a DUT and configuring test conditions, such as IC dimensions, and IC location.

In step s508, RF signals are coupled to the backside of DUT 104 via circular waveguide 204. Circular waveguide 204 couples a swiping stimulus in the range of 25-100 GHz with two orthogonal polarizations. Wavelengths may be selected such that the signals are not blocked by silicon or metal fill patterns.

In steps s510 and s512 signals for both polarization states at all frequencies, both reflected back toward the source and transmitted to every pin, are measured and recorded.

In step s514, it is determined to repeat steps s508-s516 until DUT 104 is scanned in its whole length (h) in a y direction.

In step s516, waveguide 204 is moved to a new location on DUT 104

In step s518, it is determined to repeat steps s506-s512 until DUT 104 scanned in its whole width (w) x direction.

In steps s520, waveguide s204 is again moved to a new location on DUT 104 and the scanning continues.

After DUT 104 is completely scanned, in step s522, the test ends.

In another embodiment of the present invention RF characterization can be performed on operating ICs. While the IC is being exercised by a predetermined logic stimulus, RF/microwave signals may be applied to some pins of the IC through bias tees. This dynamic characterization can further enhance detection sensitivity.

The RF/microwave power level applied during the characterization may be controlled, assuring that the test is non-destructive. Existing microwave network analyzer equipment is used to perform the characterization.

Although the present invention has been described with reference to specific embodiments, these embodiments are illustrative only and not limiting. Many other applications and embodiments of the present invention will be apparent in light of this disclosure and the following claims. 

1-6. (canceled)
 7. A method for verifying the authenticity of an integrated circuit of unknown background comprising: characterizing an integrated circuit of known pedigree to create a first ID; characterizing an integrated circuit of unknown pedigree to create a second ID; and comparing the first ID to the second ID.
 8. The method of claim 7, wherein comparing the first ID to the second ID comprises making a visual graphic comparison.
 9. The method of claim 7, wherein comparing the first ID to the second ID comprises using a pattern recognition technique.
 10. The method of claim 9, wherein the pattern recognition technique comprises a dynamic time wrapping and back projection technique.
 11. The method of claim 9, wherein the pattern recognition technique comprises a speech recognition technique.
 12. The method of claim 9, wherein the pattern recognition technique comprises a medical imaging technique. 