Detecting a repackaged part: decapsulation
•
Decapsulation-verify die MFG, year, and P/N
are consistentCOPYRIGHT 2015 CALIFORNIA INSTITUTE OF TECHNOLOGY. GOVERNMENT SPONSORSHIP ACKNOWLEDGED
121
the New Frontier: Hardware and Software hacks
•
Trojan: innocuous piece of software
that contains malicious code•
Hardware Trojan: small change in an IC that can disturb chip operation
•
Failure at crucial time
•
Produces
false signals•
Added backdoor
•
When they are inserted:
•
During coding
•
MFG/ FAB
COPYRIGHT 2015 CALIFORNIA INSTITUTE OF TECHNOLOGY. GOVERNMENT SPONSORSHIP ACKNOWLEDGED
122
Photo Courtesy: http://s.hswstatic.com/gif/trojan-horse-1.jpg
Conclusion
•
Understanding of the electronics
parts counterfeit issue•
Knowledge of the supply chain environment for EEE parts
•
Familiarity with some of the methods used in counterfeiting
•
Learned how to
develop risk mitigation steps•
Hands-on verification and inspection processes for the detection of suspect parts
COPYRIGHT 2015 CALIFORNIA INSTITUTE OF TECHNOLOGY. GOVERNMENT SPONSORSHIP ACKNOWLEDGED
123
Mark LeBlanc
Mark.leblanc@jpl.nasa.gov
818-354-0953
Carlo Abesamis
Jose.carlos.s.Abesamis@jpl.nasa.gov
818-354-0211
Contacts:
References
•
NASA
•
Independent Distributors of Electronics Association (IDEA)
•
Government
Industry Data Exchange Program•
ERAI
•
SMT Corp
•
American Electronic Resource, Inc
•
U.S. Dept of Commerce
•
Environmental
Protection Agency•
PBS: Frontline
COPYRIGHT 2015 CALIFORNIA INSTITUTE OF TECHNOLOGY. GOVERNMENT SPONSORSHIP ACKNOWLEDGED
124