The invention, including its various embodiments, relates to methods for verifying whether a device under test, such as a printed circuit board including associated components on the PCB and packaging, is authentic or counterfeit or has been subjected to tampering. In particular, the invention, including its various embodiments, relates to methods for characterizing the power distribution network of a printed circuit board for comparison to determine whether the printed circuit board is authentic or has been subjected to tampering.
The globalization of electronic system's manufacturing has been on the rise due to the high demand for reduced fabrication costs and shortened time-to-market. As a result, different steps of design, fabrication, and packaging may no longer be completed at the same location. With many global entities involved in the supply chain, original intellectual property owners and designers no longer have control over the manufacturing and assembly of such systems. The lack of control over the supply chain leaves some critical systems vulnerable to an array of attacks that can occur during various steps in the overall manufacturing and distribution and packaging process prior to deployment.
Such attacks may include tampering with electronic printed circuit boards (PCBs), for example, by implanting malicious computer chips or spy chips or hardware Trojans for eavesdropping on processed/communicated data, obtaining backdoor-access to privileged modes of the system, or providing a kill switch. To perform such attacks, the design may be tampered with before or after board manufacturing. Tampering activities can include drilling the PCB (adding via to the PCB), adding/removing open/short circuits, refurbishing the PCB or its components, cutting traces on the PCB's PDN, and adding/removing components from the PCB.
Similarly, the introduction of counterfeit, recycled, lower quality, or aged components into the supply chain can lead to quality and performance degradation of electronic systems, such as short or open circuits.
As embedded electronics continue to be utilized within numerous systems ranging from smartphones to autonomous vehicles and critical infrastructure, the possibility of attacks or introduction of counterfeit components, for example, can lead to significant financial loss and in some applications (e.g., medical devices) serious human injuries and even fatalities.
Existing techniques that are generally used today for validating hardware are not sufficient to mitigate more advanced cybersecurity threats, such as the recent concerns about hardware trojans and malicious hardware components being embedded within electronic equipment during the manufacturing process. Most techniques in use today are visually based or rely on proprietary solutions that cannot be validated by the end user. This results in relying on the vendor/supplier to guarantee and validate that their product is genuine and has not been tampered with or compromised.
Accordingly, there is a need for an effective method to verify the integrity and authenticity of PCBs (including components, such as capacitors, PCB traces, PCB vias, etc.) down to the IC package level both prior to installation as well as during runtime deployment.
In general, the present invention is directed to a unified physical verification framework or methods for verifying the integrity and authenticity of PCBs, including associated components on the PCB and packaging. The framework or methods are based on analyzing the power integrity of the power distribution network (PDN) of the PCB whose overall characteristics are determined by the electrical impedance of individual components on the PCB. Any tampering or counterfeiting on the PCB will lead to changes in the equivalent impedance of the PDN or the PDN characteristics over frequency. Accordingly, the physical scanning or monitoring of the PDN will reveal whether the PCB's integrity has been violated, such as through tampering or the use of counterfeit components.
In one embodiment, the method of the present invention is a method for verifying whether a printed circuit board is authentic, comprising characterizing a power distribution network of the printed circuit board to produce a signature based upon a reflection response parameter and comparing the signature from the characterizing to a known signature based upon a reflection response parameter for a corresponding authentic printed circuit board to identify differences. In some embodiments, the reflection response parameter comprises the S-parameter or S11 data, including amplitude (|S11|) and phase (∠S11). In some embodiments, the S11 data is mathematically modeling to provide a modeled set of data for comparison.
Based on the methods of the present invention, the power distribution network of a device-under-test, such as such as a printed circuit board including associated components on the PCB and packaging, can be characterized by measuring the S-parameter and comparing that data or signature to a known signature to determine whether the device-under-test is authenticate or has been subject to tampering or counterfeiting.
The present invention is more fully described below with reference to the accompanying drawings. While the present invention will be described in conjunction with various embodiments, such should be viewed as examples and should not be viewed as limiting or as setting forth the only embodiments of the invention. Rather, the present invention includes various embodiments or forms, various related aspects or features, and various uses, as well as alternatives, modifications, and equivalents to the foregoing, all of which are included within the spirit and scope of the invention and the claims, whether or not expressly described herein. Further, the use of the terms “invention,” “present invention,” “embodiment,” and similar terms throughout this description are used broadly and are not intended to mean that the invention requires, or is limited to, any particular embodiment or aspect being described or that such description is the only manner in which the invention may be made or used.
In general, the present invention is directed to a unified physical verification framework or method for verifying the integrity and authenticity of PCBs, including associated components on the PCB and packaging. The framework or method is based on analyzing the power integrity of the power distribution network (PDN) of the PCB whose overall characteristics are determined by the electrical impedance of individual components on the PCB.
A power distribution network (PDN) contains the power delivery from the external power regulator all the way down to the transistors on the chip. The PDN is usually modeled as an RLC network. The impedance profile of the RLC network of the PDN is a function of frequency, and the contribution of each individual component to the PDN's impedance is distinct at different frequencies. For example, while in lower frequencies, the equivalent impedance of the PDN is dominated by the voltage regulator's characteristics, and in higher frequencies, the off-chip and on-chip components are contributing most to the impedance.
Any tampering or counterfeiting on the PCB will lead to changes in the equivalent impedance of the PDN or the PDN characteristics over frequency. Accordingly, the physical scanning or monitoring of the PDN before the boot-up process or before the device is deployed in the field will reveal whether the PCB's integrity has been violated. Such a power integrity-based scanning makes the verification method of the present invention generic and applicable to virtually all electronic boards. Following, the method of the present invention for characterizing or measuring the PDN of a PCB to identify tampering and counterfeiting of the PCB is described in conjunction with the figures.
To characterize a PDN, power and signal integrity analyzes can be carried out using measurement equipment, such as vector network analyzers (VNAs) as shown in
Signal integrity analysis checks the quality of delivery of an electrical signal (e.g., a data signal) between two points on the PCB. Issues such as attenuation, reflection, dissipation, interference, and crosstalk can occur on poorly designed data paths on the PCB. In digital circuits, for high-frequency data streams, the bit period and rise/fall times of the signals play essential roles in designing the PCB. For such high data rates, proper impedance matching has to be taken into account to avoid signal bouncing/reflection causing intersymbol interference (ISI) and bit errors. Moreover, the PCB traces and vias' geometry affects the quality of the signal propagation on the PCB.
Since there are different electrical effects on PCBs, such as signal attenuation and signal reflection, and because each component contributes to the PDN's impedance, the primary way to characterize these effects in a unified manner is to use Z (impedance) and S (scattering) parameters. These parameters are employed in power/signal integrity analyses of electronic systems to describe the electrical properties of linear electrical networks (e.g., networks consist of resistors, capacitors, and inductors). These parameters are complex numbers (including voltage amplitude and phase of traveling waves) and functions of frequency. Based on the number of electrical ports, these parameters are represented in matrices with different sizes. S-parameters directly represent the attenuation and reflection/transmission ratio of the signal at each port of a network. Z-parameters, however, can be used to derive the observed impedance at each port of a network. A VNA, as shown in
As noted, any tampering and counterfeiting attempt on the PCB will lead to changes in the equivalent impedance of the PDN. It should be noted that the contribution of each individual component to the PDN's impedance is distinct at different frequencies. While in lower frequencies, the equivalent impedance of the PDN is dominated by the voltage regulator's characteristics, and in higher frequencies, the off-chip and on-chip components are contributing most to the impedance. Consequently, changes in the impedance in different frequencies affect both S- and Z-parameters. As measuring the S-parameters is more convenient in practice using VNAs, they can be used for the characterization of the PDNs for purposes of detecting tampering or counterfeiting. More specifically, the reflection coefficient (S11) parameter can be selected for analysis, which allows the measurement setup to be simplified because only one access point (i.e., electrical terminal consists of voltage and ground) is needed on the PCB to perform the characterization. In other words, verification can be achieved using a single measurement.
Returning to
In the first step 204, the PDN of a subject PCB or device is characterized or the PDN signature of the PCB or device is measured. In the first step 204, and with reference to
As noted, the data collected from the PDN can be mathematically modeled using machine learning techniques in preparation for comparison in the second step 206 to determine whether tampering or counterfeiting is present. It should be appreciated that in some instances mathematically modeling may or may not be necessary. In some cases, the change in the S-signatures between the measured S-signature of the device being evaluated and the known S-signature may be large enough, or very large, for direct comparison. In that instance a direct comparison of the amplitude of the S-signatures (e.g., by subtraction) provides sufficient differences to allow for a determination of whether the device has been subjected to tampering or is a counterfeit device without the need for mathematical modeling or machine learning techniques. In other cases, such as those in which the tampering may be more sophisticated and in which the S-signature is relatively small or provides a small footprint or the differences are relatively small, mathematical modeling of the collected data can be used to determine whether tampering or counterfeiting has occurred. One of skill in the art will appreciate the distinction in such cases to understand when and whether machine learning or mathematical modeling should be used.
To detect tampering, machine learning can be used in both supervised (i.e., classification) and unsupervised (i.e., clustering) scenarios. The data collected from S-parameter measurements is noisy and multidimensional, as it is collected over pre-defined time and frequency ranges. The sequence of the S-parameters data over frequency also exhibits the characteristics of a time series, although being non-temporal. Therefore, classifying/clustering the collected data can be thought of as a sequence labeling problem that is addressed by applying time-series analysis. Specifically, a state-space model (SSM) can be used, which is an approach used to analyze sequential, structured, time series-like data. In an SSM, the sequence of measured data is assumed to be generated by some hidden state variables, which would include the resistance, capacitance, and inductance of the PDN at each frequency, resulting in the overall impedance. It should be appreciated that these hidden state variables can be impacted by environmental noise, device aging, or noise imposed by the measurement. These physical uncertainties are assumed to follow a Gaussian distribution. Therefore, a straightforward class of SSMs, called linear Gaussian state-space models, can be used. Formally, a sequence of measured data y (in a vector form) y1, y2, . . . is collected over a frequency range. This sequence is generated by some hidden state variables x1, x2, . . . with joint probability as shown in Equation 1:
where θ is the model parameter, X1:F and y1:F are the sequence of F sequences of the hidden state variables and the measurements, respectively. As Gaussian distributions can model various physical phenomena, linear-Gaussian SSMs composed of multivariate following Equations 2 and 3 can be used:
where vectors v and w represent uncertainty and follow Gaussian distributions, with covariance matrices R and Q, respectively. In other words, these two vectors account for the total impact of aging, environmental noise, uncertainty imposed by the measurement process, and so forth. Parameters of a PCB are represented by θ=(A, C, Q, R).
Another important aspect of the data representation is the dependency of the hidden state variables on one another. Since continuous electrical current generation at each step of measurement increases the temperature of the board and its components, the measurement at each time/frequency step would be affected by the previous measurement. Consequently, the state variables have first-order Markov dynamics.
It should be appreciated, based on the availability of the golden sample, the verification method can be used for supervised and unsupervised scenarios. In the unsupervised scenario, to learn the parameters of the linear Gaussian SSM (Equation (1), a well-studied approach is the expectation-maximization (E-M) algorithm. This algorithm is the building block of Gaussian mixture models that can cluster objects based on SSMs. In this regard, a Gaussian mixture model makes use of hidden Gaussian states to assign each measured data y to a cluster. Each cluster corresponds to a Gaussian distribution with the mean and variance that are cluster specific and learned by employing the E-M algorithm.
In the supervised scenario, however, the K-nearest neighbors (KNN) algorithm can be used, which is a close approach to the E-M algorithm. The reason behind selecting KNN algorithms is that examples exhibiting similar properties should be in close proximity to one another in a dataset.
As an example, in some embodiments, and as described in the Examples below, a statistical and machine learning framework in MATLAB can be used. To this end, off-the-shelf algorithms can be used to fit Gaussian mixture models to the collected data. For these algorithms, it is necessary to define the number of Gaussian distributions contributing to the model (i.e., the number of clusters). In addition to the number of clusters, parameters needed for determining the clusters (i.e., distance metric and clustering evaluation criterion) are adjusted automatically. In doing so, a gap criterion can be selected to evaluate the clusters. In other words, the gap statistic reflects the compactness of clusters by calculating the total intra-cluster distance variation for different numbers of clusters. Furthermore, the cityblock distance metric can be chosen to maximize the performance of the clustering. The cityblock distance (also called Manhattan distance) is used to calculate the distance between two data points in a grid-like path for high-dimensional data, similar to the data collected in these tests. As described above, fitting a Gaussian mixture model can be performed by applying the E-M algorithm, realized by the k-means algorithm in MATLAB. As for supervised machine learning, the KNN algorithm included in the MATLAB software suite can be used. Similar to the approach for the unsupervised Gaussian mixture model mentioned previously, the KNN algorithm parameters (i.e., the number of neighbors and the distance metric) are set in an automatic manner. To assess the performance of the classification algorithm, leave-one-out cross validation can be used. As a result, the data collected from all PCBs can be fed into the KNN algorithm: the data collected from each PCB is once used as the test data, whereas all other instances serve as a training set. In general, the advantage of cross-validation methods is that the results are less biased. Specifically for leave-one-out cross validation, the computation complexity is low.
As described above, in the second step 206, the results from the characterization of the PDN of the PBC in question, which may include the results of the mathematical modeling, are evaluated or compared. As described above, the S-parameter includes two components, namely the amplitude (|S11|) and the phase (∠S11). Accordingly, either or both can be used for comparison as in some cases either the amplitude or the phase may be more or less sensitive to the tampering or counterfeiting that was done.
Generally, there are two scenarios that can be addressed in this second step 206. First, the results can be used to determine whether the PCB in question has been tampered with or is a counterfeit or contains counterfeit components. In other words, this step 206 can be used to identify or differentiate legitimate versus tampered devices. Second, the results can be used to differentiate what are believed to be two legitimate devices. Each of these is described below.
In the first scenario, in determining whether the device has been tampered with or is counterfeit, in some embodiments, the user or verifier may have a golden sample and can perform the same PDN analysis on the golden sample to provide a characterization of the PDN to which the results for the PCB in question can be compared. As a result, the verifier can perform measurements and characterize this golden sample. To verify every other device, the verifier has to carry out the same characterization and compare the resulting signatures with the golden one. The existence of differences between these two PDN characterizations would identify the existence of tampering or counterfeiting.
It should be appreciated, however, that in some cases, the measurements may suffer from noise such that the mathematical modeling described above should be employed. A first type of noise stems from the uncertainties during the measurement because of either the changes in the environmental conditions or else the thermal noise in the measurement equipment. The adverse effect of this kind of noise can be reduced by repeating the same measurement and by better controlling the environmental conditions. A second type of noise is caused by manufacturing process variations. Unlike the first type, process variation noise cannot be mitigated. Even if two devices are genuine, they may still show differences in their physical signature.
It should be appreciated that if the user or verifier has only access to a golden sample, only unsupervised (i.e., clustering) methods to find out whether the signatures of suspicious devices belong to the same cluster or not. The main advantage of this approach is that the verifier does not require any knowledge about the behavior of the tampered/counterfeited devices as any signature with enough difference to the golden signature is clustered differently.
In some embodiments, the user or verifier may also have access to some tampered or counterfeit samples. In this case, the verifier can assign labels to the golden and all other attacked samples and deploy supervised (i.e., classification) techniques. The advantage here is that an unseen sample from the known attacked categories can be detected with high confidence.
In the second scenario, directed to differentiating what are believed to be two legitimate devices, the distance between signatures of the legitimate devices can be used as a fingerprint to authenticate each individual sample. Such fingerprinting is useful in attack scenarios, where an electronic board might be replaced by a similar one. Although both boards could be genuine, the boards may have different software versions, which cannot be detected easily by physical measurements.
It should be appreciated that the method of the present invention can be applied to any electronic board at any time. In some embodiments, the method may be used prior to deployment of the device into the field so as to authenticate the device prior to use. In some embodiments, the method may be used at various points along the manufacturing or supply chain and can be used to evaluate various types of tampering or counterfeiting, including, for example, malicious implants on a PCB or the use of counterfeit or recycled components.
The following Examples provide further description regarding the implementation of the method of the present invention. Specifically, the Examples provide further description on how to measure a PDN, how to mathematically model the results, and how to utilize the results to determine the authenticity of a given device.
Evaluations of various devices were performed to test the method of the present invention. In one case, a genuine and a counterfeit Yokogawa EJX110A differential pressure transmitter were evaluated. Specifically, the differences in the S11 signatures between the genuine and counterfeit devices was evaluated. In a second case, Texas Instruments LP-MSP430FR2476 development kits were evaluated to show the effect on the S11 signature in light of various tampering actions. To emulate tampering actions or attacks on the Texas Instrument devices, capacitors, resistors, and inductors from the PCB's plane were desoldered and then the S11 parameter was measured. Among different components on the PCB, tampering with capacitors is more crucial for three reasons. First, capacitors play a crucial role in delivering high-quality power to the ICs on the PCB. Second, the capacitors may be the most counterfeited products in the market. Third, changing any other components on the PCB, such as implanting a spy chip, will cause changes in overall capacitance (and naturally, the overall impedance) of the PDN, but this attack type can be emulated by capacitors. It should be appreciated that in a supervised (i.e., classification) scenario, S-parameter measurements are compared with genuine PDN signatures in an enrollment phase for the detection of attacks. However, in an unsupervised scenario, the S-parameters are used for fingerprinting and verification. In a third case, Texas Instruments MSP-EXP432P401R development kits were evaluated to show the effect on the S11 signature in light of incremental tampering and how the method of the present invention can detect such.
For S-parameter measurement, a Keysight ENA Network Analyzer E5080A was used. A linear frequency sweep from 100 kHz to 200 MHz and 100 kHz to 1 GHz with an intermediate frequency bandwidth of 100 kHz was set using 201 measurement points. The output power level of the network analyzer was set to 0 dBm, with starting and stopping power levels of −10 dBm and 0 dBm, respectively. The network analyzer was used only for measuring the reflection coefficient (S11). A shielded cable was used as an adapter between an SMA connection and pins of the DUTs. Since the network analyzer's signal path could only be calibrated up to the SMA connection, a constant offset was added to the measurements based on using the same connector. As the main purpose of experiments was to detect a difference between the measurements of genuine and tampered/counterfeit samples, the presence of this constant offset in all measurements does not affect the results.
In some cases, to analyze the data collected from these tests, a statistical and
machine learning framework in MATLAB was used, noting that the algorithm can be implemented using any known software suite. To this end, off-the-shelf algorithms were used to fit Gaussian mixture models to the collected data. For these algorithms, it is necessary to define the number of Gaussian distributions contributing to the model (i.e., the number of clusters). In addition to the number of clusters, parameters needed for determining the clusters (i.e., distance metric and clustering evaluation criterion) are adjusted automatically. In doing so, the gap criterion was selected to evaluate the clusters. In other words, the gap statistic reflects the compactness of clusters by calculating the total intra-cluster distance variation for different numbers of clusters. Furthermore, the cityblock distance metric was chosen to maximize the performance of the clustering. The cityblock distance (also called Manhattan distance) is used to calculate the distance between two data points in a grid-like path for high-dimensional data, similar to the data collected in these tests. As described above, fitting a Gaussian mixture model was performed by applying the E-M algorithm, realized by the k-means algorithm in MATLAB. As for supervised machine learning, the KNN algorithm included in the MATLAB software suite was used. Similar to the approach for the unsupervised Gaussian mixture model mentioned previously, the KNN algorithm parameters (i.e., the number of neighbors and the distance metric) are set in an automatic manner. To assess the performance of the classification algorithm, leave-one-out cross validation was used. As a result, the data collected from all PCBs were fed into the KNN algorithm: the data collected from each PCB is once used as the test data, whereas all other instances serve as a training set. In general, the advantage of cross-validation methods is that the results are less biased. Specifically for leave-one-out cross validation, the computation complexity is low.
To evaluate the effect of counterfeiting activities on the phase of the reflection response of the pressure sensor, the phase of the reflection coefficient of the Yokogawa EJX110A sensor was also measured in two ranges of frequency (100 kHz to 200 MHz and 100 kHz to 1 GHz). These results are shown in
It should be appreciated that to rely on S11 signatures in an enrollment phase for tampering and counterfeit detection of an unseen sample, the S11 signatures have to show consistency between boards from the same family. Although similar electronic boards can be manufactured by the same foundry using the same material, there are still manufacturing process variations leading to differences in signatures. To measure the effect of the process variations between boards, S11 measurements were performed on 10 MSP430FR2476 development kits in the bandwidth of 100 kHz to 900 MHz.
It should be appreciated that with respect to attack 6, it can be observed that the pattern, amplitude, and resonance frequencies are remarkably altered, noting that the phase profile of these tampering experiments was captured as well. Interestingly, in the case of simultaneous removal of C1 and C2 capacitors, an observable change in ∠S11 was seen as well. However, this change is dependent on the periodic nature of the ∠S11. Therefore, if a higher level of tampering occurs, in which ∠S11 goes back to its initial state, such tampering may remain undetected via the inspection of the phase profile.
Additional tests were performed using 20 MSP430FR2476 development kits from different manufacturing facilities. Specifically, the S11 experiments (in the bandwidth of 100 kHz to 900 MHz) were performed on these boards to classify them. All boards were from the same family and had exactly the same design; however, they were assembled at different facilities of Texas Instruments.
Returning to
In what are referred to as “tampering levels,” various components were successively removed from the board. In tampering levels 1 through 4, the decoupling capacitors (C4, C7, C1, and C2) were removed one by one for the digital and analog power supply. Tampering levels 5 and 6 included removal of components with no direct connection to the 3.3V PDN (i.e., L1 and R5). In tampering level 7, the decoupling capacitor with the largest capacitance (C3) was removed. Finally, in tampering level 8, the resistor R1, which fully disconnects the PDN from the measurement point on the jumper/isolation block (see
One interesting observation is that different tampering levels have an impact on different portions of the spectrum. Although each level of tampering affects the S11 signature in a specific frequency range, its pattern remains intact in a large portion of the spectrum. The main differences can be observed by looking at the shifts of resonance points in frequency as well as their amplitude. This is due to the dependence of resonance frequencies on the inductance and capacitance of the overall PDN. Therefore, any removal, addition, or replacement of components, which affect the inductance and capacitance of the PDN, leads to a shift in resonance frequency. As a result, any local impedance measurement on PCBs for verification purposes, which does not scan a large range of frequency, might provide an inaccurate result and leave the tampering/counterfeiting undetected.
The largest impact of removing decoupling capacitors on the S11 signature can be observed in frequencies larger than 160 MHz. Compared to decoupling capacitors, the removal of L1 and R5 has small influences on the S11 signature. Finally, as expected, removing R1 in the last level of tampering has the highest impact on the S11 behavior as it disconnects the remaining components on the PDN of PCB from the measurement probes.
The phase profiles of these tampering experiments on MSP432P401R boards were captured as well. Interestingly, the phase profile was not affected so much up to level 6 of the gradual tampering. This observation confirms that the phase profile is not an appropriate metric to detect sophisticated tampering, in which the tampered DUT is similar to the legitimate sample. As the level of tampering level increases from 6 to 8 (more components are removed), the phase profile is considerably shifted forward. However, this change is dependent on the periodic nature of the ∠S11. Therefore, in higher levels of tampering, ∠S11 goes back to its initial state, and consequently, such tampering remains undisclosed via the inspection of the phase information.
As noted, the machine learning procedure described above was applied to the collected S11 signatures to automate the process of tampering detection. Two scenarios were evaluated.
In a first scenario, referred to as “unsupervised learning,” the objective was to determine whether the unmodified PCB and each modified versions after tampering can be differentiated automatically without the user knowing which is which or without having labels for each PCB. In other words, the verifier does not know anything about the S11 signature of the genuine device, and thus tries to cluster devices based on their collected signatures. As described above, a Gaussian mixture model was used to assign each measurement to a cluster. In fact, each cluster represent a Gaussian distribution with the mean and variance learned by employing the E-M algorithm.
Based on the results as shown in
In a second scenario, referred to as “supervised learning,” the objective was to evaluate the detection accuracy of modified PCBs by providing correct labels to the learning algorithm in the training phase. In this case, the verifier has already characterized different versions of the modified board and hence can provide the corresponding labels. This means that at least one genuine and one tampered PCB is available, where the verifier could prepare the latter by removing some components from the PCB, for instance. In this case, the verifier not only detects a deviation from the genuine PCB but can exactly learn what kind of tampering attack has been mounted on the board. Based on the obtained clustering results, a classification algorithm was run on frequency ranges where all tampering levels could be clustered and differentiated. In other words, the frequency range was taken into account, where the maximum number of Gaussian distributions (the maximum number of clusters, accordingly) could be determined by the algorithm.
In addition to this observation, in Section 6.3.4, we explore how statistical and machine learning methods can be helpful to differentiate between the fingerprints of the tampered and genuine PCBs. Specifically, the statistical distance of S11 signatures between the legitimate (unmodified) boards as well as between legitimate and tampered boards was analyzed to determine whether the process variation on legitimate boards is sufficient that S11 signatures provide a unique signature for each board.
Various embodiments of the invention have been described above. However, it should be appreciated that alternative embodiments are possible and that the invention is not limited to the specific embodiments described above.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2023/012704 | 2/9/2023 | WO |
Number | Date | Country | |
---|---|---|---|
63309983 | Feb 2022 | US |