Hardware Security Assessment through Repair of Damaged Device

S. Y. Sim*, Q. Liu, H. B. Kor, C. L. Gan

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, the feasibility of content access to physically damaged electronic device was explored by performing package level repair through transplantation of its intact silicon chip from its faulty substrate package onto another functional one, and establishment of new electrical connections between them. This functionality restoration of a damaged device was investigated using an integration of various sample preparation techniques commonly used in microelectronics failure analysis. Different decapsulation techniques were also studied to identify the optimal processes for this application. The repaired device was tested to verify the restoration of its functionality, as well as the integrity of the stored data. This may pave the way for new hardware security assessment approach for electronic devices with other types of packaging.

Original languageEnglish
Title of host publication2023 IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits, IPFA 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798350301649
DOIs
Publication statusPublished - 2023
Externally publishedYes
Event2023 IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits, IPFA 2023 - Pulau Pinang, Malaysia
Duration: Jul 24 2023Jul 27 2023

Publication series

NameProceedings of the International Symposium on the Physical and Failure Analysis of Integrated Circuits, IPFA
Volume2023-July

Conference

Conference2023 IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits, IPFA 2023
Country/TerritoryMalaysia
CityPulau Pinang
Period7/24/237/27/23

Bibliographical note

Publisher Copyright:
© 2023 IEEE.

ASJC Scopus Subject Areas

  • Electrical and Electronic Engineering

Keywords

  • damaged device repair
  • data extraction
  • functionality restoration
  • microchip decapsulation

Fingerprint

Dive into the research topics of 'Hardware Security Assessment through Repair of Damaged Device'. Together they form a unique fingerprint.

Cite this