Microelectronics Counterfeit Integrated Circuits Detection
Counterfeit integrated circuits and other electronic components pose a serious risk to reliability and functionality, microelectronics authenticity / counterfeit analysis is one way to try to mitigate this risk.
Counterfeiting of electronic components has been rising rapidly over the past several years. Indeed, the problem has become so widespread that the U.S. Government was forced to address the issue. Studies from 2011 indicated that as much as 40% of the Pentagon’s supply chain was impacted by counterfeit parts. As a result, Congress included a criminal penalty for trafficking in counterfeit goods in the National Defense Authorization Act of 2011.
Due to the multitude of different ways that counterfeit electronics are produced, performing authenticity analysis requires a versatile and diverse toolset. Often, one tool or inspection procedure is not enough to determine authenticity to a high degree of confidence.
The microelectronics authenticity / counterfeit analysis process is very similar to a typical electronics failure analysis project.
First, non-destructive testing like x-ray imaging or acoustic microscopy is used to look for bonding anomalies or evidence of “black-topping” (the act of sanding off the markings on a sample, then painting and re-marking it as a more desirable part).
The same tools used for fault verification can also be used to create a functional test bench to ensure that a suspect sample performs to specification.
Finally, counterfeit integrated circuits can be decapsulated to inspect the die, which may reveal markings that are inconsistent with those on the package exterior, casting doubt upon the part’s authenticity.
Almost all common electronic components may be a potential target for counterfeiters – and, therefore, for authenticity analysis. Ideally, the best protection against counterfeiting is to avoid grey-market vendors, but should that not be possible, microelectronics authenticity / counterfeit analysis is a good way to verify that components are what they purport to be before assembling them into critical systems.
- Screening samples purchased from a third-party vendor
- Creating a “known good” parts database
- Minimizing risk as a components vendor