2016
DOI: 10.31399/asm.cp.istfa2016p0327
|View full text |Cite
|
Sign up to set email alerts
|

Direct Charge Measurement in Floating Gate Transistors of Flash EEPROM Using Scanning Electron Microscopy

Abstract: We present a characterization methodology for fast direct measurement of the charge accumulated on Floating Gate (FG) transistors of Flash EEPROM cells. Using a Scanning Electron Microscope (SEM) in Passive Voltage Contrast (PVC) mode we were able to distinguish between '0' and '1' bit values stored in each memory cell. Moreover, it was possible to characterize the remaining charge on the FG; thus making this technique valuable for Failure Analysis applications for data retention measurements in Flash EEPROM. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(24 citation statements)
references
References 11 publications
0
24
0
Order By: Relevance
“…However, no data was recovered after shred delete command. We suspect that data may be recovered successfully by making customized embedded recovery setup and by using invasive microscopy based techniques such as AFM/SCM/SEM etc [14], [15].…”
Section: Our Recovery Experiments and Resultsmentioning
confidence: 99%
“…However, no data was recovered after shred delete command. We suspect that data may be recovered successfully by making customized embedded recovery setup and by using invasive microscopy based techniques such as AFM/SCM/SEM etc [14], [15].…”
Section: Our Recovery Experiments and Resultsmentioning
confidence: 99%
“…Note that three wires are used for the input terminal for all 16 Boolean gates (recall Fig. 3); this renders the layout of the primitive indistinguishable for optical-imaging-based RE, irrespective of the actual functionality.…”
Section: (Inset)mentioning
confidence: 99%
“…III), hence indistinguishable for optical-imaging-based RE. A more sophisticated attacker might, however, leverage electron microscopy (EM) for identification and read-out attacks [16].…”
Section: Preventing Reverse Engineering and Side-channel Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…When the existence of a backdoor in highly secure ICs was discovered [6] in the form of secret test/debug interface capable of overriding chip security policy, it raised a lot of questions about hardware security of modern ICs. Recently demonstrated method for the direct imaging of EEPROM and Flash memory contents using easily accessible Scanning Electron Microscopes (SEM) [7] challenges the security of embedded storage. This is because non-volatile memory was always considered as being highly secure against most invasive attacks due to very small electrical charge accumulated beneath very thin barrier that cannot survive de-processing.…”
Section: Introductionmentioning
confidence: 99%