{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T04:01:55Z","timestamp":1746763315062,"version":"3.40.5"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100007297","name":"Office of Naval Research Global","doi-asserted-by":"publisher","award":["N000142112513"],"award-info":[{"award-number":["N000142112513"]}],"id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10836-025-06161-x","type":"journal-article","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T10:19:43Z","timestamp":1741861183000},"page":"85-107","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Inherent Hardware Identifiers: Advancing IC Traceability and Provenance in the Multi-Die Era"],"prefix":"10.1007","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8532-8720","authenticated-orcid":false,"given":"M Shafkat M.","family":"Khan","sequence":"first","affiliation":[]},{"given":"Chengjie","family":"Xi","sequence":"additional","affiliation":[]},{"given":"Nitin","family":"Varshney","sequence":"additional","affiliation":[]},{"given":"Je-Hyeong","family":"Bahk","sequence":"additional","affiliation":[]},{"given":"Navid","family":"Asadizanjani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,13]]},"reference":[{"key":"6161_CR1","unstructured":"Loh GH, Naffziger S, and Lepak K (2021) \u201cUnderstanding chiplets today to anticipate future integration opportunities and limits,\u201d in 2021 Design, Automation Test in Europe Conference Exhibition (DATE): pp. 142-145"},{"key":"6161_CR2","unstructured":"Frontier Economics (2016) THE ECONOMIC IMPACTS OF Report prepared for BASCAP and INTA"},{"issue":"1","key":"6161_CR3","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s10836-013-5430-8","volume":"30","author":"U Guin","year":"2014","unstructured":"Guin U, Dimase D, Tehranipoor M (2014) Counterfeit integrated circuits: Detection, avoidance, and the challenges ahead. Journal of Electronic Testing: Theory and Applications (JETTA) 30(1):9\u201323","journal-title":"Journal of Electronic Testing: Theory and Applications (JETTA)"},{"key":"6161_CR4","unstructured":"Xi C, Varshney N, Khan MSM, Dalir H, and Asadizanjani N (2024) \u201cEnhancing counterfeit detection of integrated circuits through machine learning-assisted thz-tds analysis,\u201d in Terahertz, RF, Millimeter, and Submillimeter-Wave Technology and Applications XVII 12885(SPIE): 64\u201372"},{"key":"6161_CR5","first-page":"1","volume":"2016","author":"G Mounce","year":"2016","unstructured":"Mounce G, Lyke J, Horan S, Powell W, Doyle R, Some R (2016) \u201cChiplet based approach for heterogeneous processing and packaging architectures\u201d, in. IEEE Aerospace Conference 2016:1\u201312","journal-title":"IEEE Aerospace Conference"},{"key":"6161_CR6","unstructured":"Khan MSM, Xi C, Tehranipoor MM, and Asadizanjani N (2022) \u201cSecure Interposer- Based Heterogeneous Integration,\u201d no. October, pp. 156\u2013164"},{"key":"6161_CR7","unstructured":"Rizi AD, Roy A, Noor R, Kang H, Varshney N, Jacob K, RiveraJimenez S, Edwards N, Sorger VJ, Dalir H et al (2023) \u201cFrom talent shortage to workforce excellence in the chips act era: Harnessing industry 4.0 paradigms for a sustainable future in domestic chip production,\u201d arXiv preprint arXiv:2308.00215"},{"key":"6161_CR8","unstructured":"Noor R, Kottur HR, Craig PJ, Biswas LK, Khan MSM, Varshney N, Dalir H, Akc EA, Motlagh BG, Woychik C, Yoon Y-K, and Asadizanjani N (2023) \u201cUS Microelectronics Packaging Ecosystem: Challenges and Opportunities,\u201d p. arXiv:2310.11651 [eess.SY], 2023. [Online]. Available: http:\/\/arxiv.org\/abs\/2310.11651"},{"key":"6161_CR9","unstructured":"Dhanuskodi SN, Li X, and Holcomb DE (2020) \u201cCOUNTERFOIL: Verifying provenance of integrated circuits using intrinsic package fingerprints and inexpensive cameras,\u201d Proceedings of the 29th USENIX Security Symposium : 1255\u20131272"},{"key":"6161_CR10","doi-asserted-by":"publisher","unstructured":"Gao Y, Al-Sarawi SF, and Abbott D (2020) \u201cPhysical unclonable functions,\u201d Nature Electronics 3(2): 81\u201391 [Online]. Available: https:\/\/doi.org\/10.1038\/s41928-020-0372-5","DOI":"10.1038\/s41928-020-0372-5"},{"issue":"4","key":"6161_CR11","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1049\/iet-cds.2019.0175","volume":"14","author":"H Ning","year":"2020","unstructured":"Ning H, Farha F, Ullah A, Mao L (2020) Physical unclonable function: Architectures, applications and challenges for dependable security. IET Circuits Devices Syst 14(4):407\u2013424","journal-title":"IET Circuits Devices Syst"},{"key":"6161_CR12","unstructured":"Vijayakumar A, Patil VC, and Kundu S (2017) \u201cOn Improving Reliability of SRAM-Based Physically Unclonable Functions,\u201d Journal of Low Power Electronics and Applications 7(1) [Online]. Available: https:\/\/www.mdpi.com\/2079-9268\/7\/1\/2"},{"key":"6161_CR13","first-page":"286","volume":"2013","author":"U Ruhrmair","year":"2013","unstructured":"Ruhrmair U, van Dijk M (2013) \u201cPufs in security protocols: Attack models and\u00a8 security evaluations\u201d, in. IEEE Symposium on Security and Privacy 2013:286\u2013300","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"6161_CR14","unstructured":"Vashistha N, Rahman ML, Haque MSU, Uddin A, Sami MSUI, Shuo AM, Calzada P, Farahmandi F, Asadizanjani N, Rahman F, and Tehranipoor M (2022) \u201cToshi - towards secure heterogeneous integration: Security risks, threat assessment, and assurance,\u201d Cryptology ePrint Archive, Paper 2022\/984, https:\/\/eprint.iacr.org\/2022\/984. [Online]. Available: https:\/\/eprint.iacr.org\/2022\/984"},{"key":"6161_CR15","doi-asserted-by":"publisher","unstructured":"M. M. Tehranipoor, U. Guin, and D. Forte, Chip ID. Cham: Springer International Publishing, 2015, pp. 243\u2013263. [Online]. Available: https:\/\/doi.org\/10.1007\/978-3-319-11824-6{}12","DOI":"10.1007\/978-3-319-11824-6{}12"},{"key":"6161_CR16","unstructured":"Yu H, Leong PHW, and Xu Q (2012) \u201cAn fpga chip identification generator using configurable ring oscillators,\u201d IEEE Transactions on Very Large Scale Integration (VLSI) Systems 20(12): 2198\u20132207"},{"key":"6161_CR17","unstructured":"Gao M, Rahman MS, Varshney N, Tehranipoor M, and Forte D (2023) \u201ciprobe: Internal shielding approach for protecting against front-side and back-side probing attacks,\u201d IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"6161_CR18","unstructured":"Rahman MT, Tajik S, Rahman MS, Tehranipoor M, and Asadizanjani N (2019) \u201cThe Key is Left under the Mat On the Inappropriate Security Assumption of Logic Locking Schemes,\u201d Ia.Cr\/2019\/719: 1\u201322"},{"key":"6161_CR19","doi-asserted-by":"publisher","unstructured":"Emerging Nonvolatile Memories\u2014An Assessment of Vulnerability to Probing Attacks, ser. International Symposium for Testing and Failure Analysis, vol. ISTFA 2022: Conference Proceedings from the 48th International Symposium for Testing and Failure Analysis, 2022. [Online]. Available: https:\/\/doi.org\/10.31399\/asm.cp.istfa2022p0217","DOI":"10.31399\/asm.cp.istfa2022p0217"},{"key":"6161_CR20","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1109\/HST.2016.7495575","volume":"2016","author":"Q Shi","year":"2016","unstructured":"Shi Q, Asadizanjani N, Forte D, Tehranipoor MM (2016) \u201cA layout-driven framework to assess vulnerability of ics to microprobing attacks\u201d, in. IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2016:155\u2013160","journal-title":"IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"},{"key":"6161_CR21","unstructured":"Cai F, Bai G, Liu H, and Hu X (2016) \u201cOptical fault injection attacks for flash memory of smartcards,\u201d in 2016 6th International Conference on Electronics Information and Emergency Communication (ICEIEC): 46\u201350."},{"key":"6161_CR22","doi-asserted-by":"publisher","unstructured":"Maes R (2013) PUF-Based Entity Identification and Authentication. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 117\u2013141. [Online]. Available: https:\/\/doi.org\/10.1007\/978-3-642-41395-7{ }5","DOI":"10.1007\/978-3-642-41395-7"},{"key":"6161_CR23","unstructured":"Gokulanathan S (2017) \u201cIP Attacks and Protection Taxonomy : Logic Obfuscation as Solution,\u201d no. June 2016."},{"key":"6161_CR24","doi-asserted-by":"publisher","unstructured":"Karimi N, Danger J-L, and Guilley S (2018) \u201cImpact of Aging on the Reliability of Delay PUFs,\u201d Journal of Electronic Testing 34(5): 571\u2013586 [Online]. Available: https:\/\/doi.org\/10.1007\/s10836-018-5745-6","DOI":"10.1007\/s10836-018-5745-6"},{"key":"6161_CR25","unstructured":"Ruhrmair U, Olter JS, Sehnke F, Xu X, Mahmoud A, Stoyanova V, Dror G, Schmidhuber J, Burleson W, and Devadas S (2013) \u201cPuf modeling attacks on simulated and silicon data,\u201d IEEE Transactions on Information Forensics and Security 8(11): 1876\u20131891"},{"key":"6161_CR26","unstructured":"Ramezani M, Newsome AR, Ghatge M, Zhang F, Bhunia S, and Tabrizian R (2018) \u201cA nanomechanical identification tag technology for traceability and authentication applications,\u201d 2018 Solid-State Sensors, Actuators and Microsystems Workshop, Hilton Head 206\u2013209"},{"key":"6161_CR27","doi-asserted-by":"publisher","unstructured":"Xi C, Varshney N, Khan MSM, Dalir H, and Asadizanjani N (2024) \u201cTHz-TDS for IC packaging material changes detection under real-world conditions,\u201d in Terahertz, RF, Millimeter, and Submillimeter-Wave Technology and Applications XVII, L. P. Sadwick and T. Yang, Eds., vol. 12885, International Society for Optics and Photonics. SPIE 128850B. [Online]. Available: https:\/\/doi.org\/10.1117\/12.3004241","DOI":"10.1117\/12.3004241"},{"key":"6161_CR28","doi-asserted-by":"publisher","unstructured":"Varshney N, Khan MSM, Ghosh S, Roy A, Bahk J-H, and Asadizanjani N (2024) \u201cFault-marking: defect-pattern leveraged inherent fingerprinting of advanced IC package with thermoreflectance imaging,\u201d in Infrared Sensors, Devices, and Applications XIV, P. Wijewarnasuriya, A. I. D\u2019Souza, and A. K. Sood, Eds., vol. 13145, International Society for Optics and Photonics. SPIE 131450A. [Online]. Available: https:\/\/doi.org\/10.1117\/12.3027447","DOI":"10.1117\/12.3027447"},{"key":"6161_CR29","unstructured":"Bahk JH, and Shakouri A (2019) \u201cUltra-fast Thermoreflectance Imaging for Electronic, Optoelectronic, and Thermal Devices,\u201d 2019 IEEE BiCMOS and Compound Semiconductor Integrated Circuits and Technology Symposium, BCICTS 2019, no. Ccd"},{"key":"6161_CR30","unstructured":"Chakrabarty K, Deutsch S, Thapliyal H, and Ye F (2012) \u201cTsv defects and tsvinduced circuit failures: The third dimension in test and design-for-test,\u201d in 2012 IEEE International Reliability Physics Symposium (IRPS) 5F.1.1\u20135F.1.12."},{"key":"6161_CR31","doi-asserted-by":"publisher","unstructured":"Vermeersch B, Bahk J-H, Christofferson J, and Shakouri A (2013) \u201cThermoreflectance imaging of sub 100ns pulsed cooling in high-speed thermoelectric microcoolers,\u201d Journal of Applied Physics 113(10): 104502 [Online]. Available: https:\/\/doi.org\/10.1063\/1.4794166","DOI":"10.1063\/1.4794166"},{"key":"6161_CR32","unstructured":"Yazdan Mehr M, Bahrami A, Fischer H, Gielen S, Corbeij R, van Driel W, and Zhang G (2015) \u201cAn overview of scanning acoustic microscope, a reliable method for non-destructive failure analysis of microelectronic components,\u201d in 2015 16th International Conference on Thermal, Mechanical and MultiPhysics Simulation and Experiments in Microelectronics and Microsystems 1\u20134."},{"issue":"10","key":"6161_CR33","first-page":"1580","volume":"22","author":"S Brand","year":"2011","unstructured":"Brand S, Czurratis P, Hoffrogge P, Temple D, Malta D, Reed J, Petzold M (2011) Extending acoustic microscopy for comprehensive failure analysis applications. J Mater Sci: Mater Electron 22(10):1580\u20131593","journal-title":"J Mater Sci: Mater Electron"},{"key":"6161_CR34","unstructured":"Nvidia, \u201cNVIDIA Tesla P100 GPU ACCELERATOR,\u201d Data Sheet, 2016 [Online].Available:https:\/\/www.nvidia.com\/content\/dam\/en-zz\/Solutions\/ Data-Center\/tesla-product-literature\/nvidia-tesla-p100-datasheet.pdf"},{"key":"6161_CR35","unstructured":"Hsieh A-C, and Hwang T (2012) \u201cTsv redundancy: Architecture and design issues in 3-d ic,\u201d IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 20, no. 4, pp. 711\u2013722"},{"key":"6161_CR36","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1149\/06445.0011ecst","volume":"64","author":"D Kim","year":"2015","unstructured":"Kim D, Lee D, Kim Y, Kim S, Seo J, Hong J (2015) The study of dissolved oxygen control in tsv electroplating deposition process. ECS Trans 64:11\u201318","journal-title":"ECS Trans"},{"key":"6161_CR37","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1109\/TMI.2014.2358561","volume":"34","author":"Y Rakvongthai","year":"2015","unstructured":"Rakvongthai Y, Worstell W, Fakhri GE, Bian J, Lorsakul A, Ouyang J (2015) Spectral ct using multiple balanced k-edge filters. IEEE Trans Med Imaging 34:740\u2013747","journal-title":"IEEE Trans Med Imaging"},{"key":"6161_CR38","unstructured":"Chen Y, Lai P, Huang H-Z, Zhang, and X. Lin, \u201cOpen Localization in 3D Package with TSV Daisy Chain Using Magnetic Field Imaging and High-Resolution Three-Dimensional X-ray Microscopy,\u201d Applied Sciences 11(17) [Online]. Available: https:\/\/www.mdpi.com\/2076-3417\/ 11\/17\/8148"},{"key":"6161_CR39","unstructured":"Pahwa R, New TL, Chang R, Jie W, Min OZ, Ho SW, Qin R, Rao VS, Yang Y, Neumann JT, Pichumani R, and Gregorich T (2020) \u201cDeep learning analysis of 3d x-ray images for automated object detection and attribute measurement of buried package features,\u201d in 2020 IEEE 22nd Electronics Packaging Technology Conference (EPTC), 2020, pp. 221\u2013227."},{"key":"6161_CR40","doi-asserted-by":"publisher","unstructured":"True J, Xi C, Jessurun N, Ahi K, and. Asadizanjani N (2021) \u201cReview of THz-based semiconductor assurance,\u201d Optical Engineering 60(6): 60901, 2021. [Online]. Available: https:\/\/doi.org\/10.1117\/1.OE.60.6.060901","DOI":"10.1117\/1.OE.60.6.060901"},{"key":"6161_CR41","unstructured":"Semiconductor Industry Association SIA (2011) \u201cDetecting and Removing Counterfeit Semiconductors in the U . S . Supply Chain Manufacturing and Reliability of Genuine Semiconductors vs . Counterfeits Require Government Purchase from Authorized Sources 2011 [Online].Available:https:\/\/www.semiconductors.org\/wp-content\/uploads\/ 2018\/06\/ACTF-Whitepaper-Counterfeit-One-Pager-Final.pdf"},{"key":"6161_CR42","unstructured":"Bocu R, and Iavich M (2023) \u201cReal-Time Intrusion Detection and Prevention System for 5G and beyond Software-Defined Networks,\u201d Symmetry, 15(1)2023 [Online]. Available: https:\/\/www.mdpi.com\/2073-8994\/15\/1\/110"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-025-06161-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-025-06161-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-025-06161-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T07:28:40Z","timestamp":1746689320000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-025-06161-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["6161"],"URL":"https:\/\/doi.org\/10.1007\/s10836-025-06161-x","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2025,2]]},"assertion":[{"value":"11 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors would like to thank the Office of Naval Research (ONR) for their support in conducting this research work through the award of \"N000142112513 : SAIPA: Security Aware Interposer Design for Heterogeneous Packaging\".","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing in interest"}}]}}