Download All Rights Reserved - University of Connecticut

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
University of Connecticut
Automated Counterfeit IC Physical
Defect Characterization
Team 176
Wesley Stevens
Dan Guerrera
Ryan Nesbit
Advisors: Professor Mohammad Tehranipoor
Professor Domenic Forte
Electrical and Computer Engineering
Summary
Automated system for identifying physical defects
Analyze various images (Optical, X-Ray, SEM)
Return relevant data regarding counterfeit status
All Rights Reserved
2
Background
Threat of counterfeit ICs increasing
Over 1 million counterfeit ICs found in military supplies
Can cause critical failure of systems
Leads to loss of life in military and medical applications
Current physical defect analysis done manually
Need expert to spend time on tests
Tests can be destructive
Subject to human error
All Rights Reserved
3
Image Capture
Several GB of optical and SEM images obtained
already
Needs to be consistent in terms of lighting as well
as distance from lens to chip
Image capture of the top, bottom, and sides of the
chip
Different algorithms can be used for specific parts of chip
All Rights Reserved
4
Project Overview
All Rights Reserved
5
Project Overview
Three main steps
Acquire images of suspect and/or “golden” ICs
Run different algorithms based on image location
Algorithms return altered images with highlighted defects
Uses images from different locations to find defects
Leads/Pins – scratches, bends, corrosion
Surface – scratches, discoloration, pattern variation
Markings – missing, faded, different location
All Rights Reserved
6
Image Groupings
Golden-IC Analysis
Take identically positioned images for one golden IC and
one suspect IC
Use comparison algorithm to determine inconsistencies
Self-Reference Analysis
Take images from different locations of the package of a
suspect IC
Use comparison algorithm to determine inconsistencies
Group Comparison Analysis
Compare data of individual ICs to group average
Large variation suggests counterfeit
All Rights Reserved
7
Example Group Comparison
All Rights Reserved
8
Algorithms
Binary Transformations
Text recognition
Ghost markings, extraneous markings
Edge detection
Feature acquisition and measurement
Statistical Analysis
Texture comparison
Scratches, color variation, different pattern, corrosion,
contamination, package damage
Feature matching
Image alignment
All Rights Reserved
9
Binary Transformations
All Rights Reserved
10
Feature Extraction & Edge Detection
One key goal is the ability to recognize defects.
This can be achieved through feature extraction.
Allows us to look at individual objects.
If it is a part of the device we can measure and
compare it to other objects
If it is not then we can try to identify what it is.
Also allows us to delve into text recognition.
All Rights Reserved
11
Statistical Analysis
All Rights Reserved
12
Feature Matching
All Rights Reserved
13
Project Plan
Finish algorithms for finding each defect in
taxonomy
Combine algorithms into one cohesive program
Automate algorithm ordering and parameters
Refine outputs to give meaningful results for user
All Rights Reserved
14