{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T04:23:10Z","timestamp":1772252590878,"version":"3.50.1"},"reference-count":40,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2018,8,12]],"date-time":"2018-08-12T00:00:00Z","timestamp":1534032000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Counterfeiting electronic components is a serious problem for the security and reliability of any electronic systems. Unfortunately, the number of counterfeit components has increased considerably after the introduction of horizontal semiconductor supply chain. In this paper, we propose and experimentally demonstrate an approach for detecting recycled Flash memory. The proposed method is based on measurement of change in Flash array characteristics (such as erase time, program time, fail bit count, etc.) with its usage. We find that erase time is the best metric to distinguish a used Flash chip from a fresh one for the following reasons: (1) erase time shows minimal variation among different fresh memory blocks\/chip and (2) erase time increases significantly with usage. We verify our method for a wide range of commercial off the shelf Flash chips from several vendors, technology nodes, storage density and storage type (single-bit per cell and multi-bit per cell). The minimum detectable chip usage varies from 0.05% to 3.0% of its total lifetime depending on the exact details of the chip.<\/jats:p>","DOI":"10.3390\/cryptography2030017","type":"journal-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T11:27:13Z","timestamp":1534159633000},"page":"17","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Non-Invasive Detection Method for Recycled Flash Memory Using Timing Characteristics \u2020"],"prefix":"10.3390","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6585-5112","authenticated-orcid":false,"given":"Sadman","family":"Sakib","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, The University of Alabama in Huntsville, Huntsville, AL 35899, USA"}]},{"given":"Preeti","family":"Kumari","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, The University of Alabama in Huntsville, Huntsville, AL 35899, USA"}]},{"given":"B. M. S. Bahar","family":"Talukder","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, The University of Alabama in Huntsville, Huntsville, AL 35899, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0010-6388","authenticated-orcid":false,"given":"Md Tauhidur","family":"Rahman","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, The University of Alabama in Huntsville, Huntsville, AL 35899, USA"}]},{"given":"Biswajit","family":"Ray","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, The University of Alabama in Huntsville, Huntsville, AL 35899, USA"}]}],"member":"1968","published-online":{"date-parts":[[2018,8,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1109\/JPROC.2014.2334837","article-title":"Trustworthy Hardware [Scanning the Issue]","volume":"102","author":"Karri","year":"2014","journal-title":"Proc. IEEE"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1435","DOI":"10.1109\/TCAD.2016.2638439","article-title":"Hiding Hardware Trojan Communication Channels in Partially Specified SoC Bus Functionality","volume":"36","author":"Fern","year":"2017","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"ref_3","unstructured":"(2018, January 23). Our E-Waste Problem Is Ridiculous, and Gadget Makers Aren\u2019t Helping. Available online: https:\/\/www.wired.com\/2014\/12\/product-design-and-recycling\/."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Sinanoglu, O., Karimi, N., Rajendran, J., Karri, R., Jin, Y., Huang, K., and Makris, Y. (2013, January 27\u201330). Reconciling the IC test and security dichotomy. Proceedings of the 2013 18th IEEE European Test Symposium (ETS), Avignon, France.","DOI":"10.1109\/ETS.2013.6569368"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1207","DOI":"10.1109\/JPROC.2014.2332291","article-title":"Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain","volume":"102","author":"Guin","year":"2014","journal-title":"Proc. IEEE"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Kumari, P., Talukder, B.M.S.B., Sakib, S., Ray, B., and Rahman, M.T. (May, January 30). Independent detection of recycled flash memory: Challenges and solutions. Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Washington, DC, USA.","DOI":"10.1109\/HST.2018.8383895"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Guo, Z., Xu, X., Tehranipoor, M.M., and Forte, D. (2017). FFD: A Framework for Fake Flash Detection. Proceedings of the 54th Annual Design Automation Conference 2017 (DAC \u201917), ACM.","DOI":"10.1145\/3061639.3062249"},{"key":"ref_8","unstructured":"(2018, January 23). \u201cGlobal Report\u2014eBay Fake Memory 2008\u20142009,\u201d Fake Flash Memory Information\u2014FlashChipDirector, 10 January 2010. Available online: https:\/\/flashfakecentral.wordpress.com\/2010\/01\/10\/global-report-ebay-fake-memory-2008-2009\/."},{"key":"ref_9","unstructured":"(2018, July 29). \u201cFake Flash News\u2014Internet & eBay Fraud\u201d, Fake Flash News\u2014Internet & eBay Fraud. Available online: https:\/\/fakeflashnews.wordpress.com\/."},{"key":"ref_10","unstructured":"(2018, June 18). \u201cFake and Counterfeit USB Flash Drives Spreading on Amazon\u201d, Myce.com. Available online: https:\/\/www.myce.com\/news\/fake-and-counterfeit-usb-flash-drives-spreading-on-amazon-72165\/."},{"key":"ref_11","unstructured":"(2018, July 29). \u201cFeds Close Huge Chip Counterfeiting Case (Exclusive)\u201d, VentureBeat, 25 September 2011. Available online: https:\/\/venturebeat.com\/2011\/09\/25\/feds-close-the-books-on-a-huge-chip-counterfeiting-scheme\/."},{"key":"ref_12","unstructured":"(2018, June 18). \u201cReport A Fake\u201d, SOSFakeFlash, 10 May 2010. Available online: https:\/\/sosfakeflash.wordpress.com\/report-a-fake\/."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Samarin, P., and Lemke-Rust, K. (2017, January 1\u20135). Detection of counterfeit ICs using public identification sequences. Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), McLean, VA, USA.","DOI":"10.1109\/HST.2017.7951827"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Liu, M., and Kim, C.H. (2017, January 5\u20137). A powerless and non-volatile counterfeit IC detection sensor in a standard logic process based on an exposed floating-gate array. Proceedings of the 2017 Symposium on VLSI Technology, Kyoto, Japan.","DOI":"10.23919\/VLSIT.2017.7998211"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MDAT.2016.2582830","article-title":"EM-Based On-Chip Aging Sensor for Detection of Recycled ICs","volume":"33","author":"He","year":"2016","journal-title":"IEEE Des. Test"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Alam, M., Chowdhury, S., Tehranipoor, M.M., and Guin, U. (May, January 30). Robust, Low-Cost, and Accurate Detection of Recycled ICs using Digital Signatures. Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Washington, DC, USA.","DOI":"10.1109\/HST.2018.8383917"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Guin, U., Zhang, X., Forte, D., and Tehranipoor, M. (2014, January 2\u20135). Low-cost On-Chip Structures for Combating Die and IC Recycling. Proceedings of the 2014 51st ACM\/EDAC\/IEEE Design Automation Conference (DAC), San Francisco, CA, USA.","DOI":"10.1145\/2593069.2593157"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Lin, C.W., and Ghosh, S. (2015, January 2\u20134). Novel self-calibrating recycling sensor using Schmitt-Trigger and voltage boosting for fine-grained detection. Proceedings of the Sixteenth International Symposium on Quality Electronic Design, Santa Clara, CA, USA.","DOI":"10.1109\/ISQED.2015.7085470"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Shahbazmohamadi, S., Forte, D., and Tehranipoor, M. (2014, January 9\u201313). Advanced Physical Inspection Methods for Counterfeit IC Detection. Proceedings of the 40th International Symposium for Testing and Failure Analysis (ISTFA), Houston, TX, USA.","DOI":"10.31399\/asm.cp.istfa2014p0055"},{"key":"ref_20","first-page":"94830K","article-title":"Terahertz characterization of electronic components and comparison of terahertz imaging with x-ray imaging techniques","volume":"Volume 9483","author":"Ahi","year":"2015","journal-title":"Terahertz Physics, Devices, and Systems IX: Advanced Applications in Industry and Defense"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1716","DOI":"10.1364\/OL.20.001716","article-title":"Imaging with terahertz waves","volume":"20","author":"Hu","year":"1995","journal-title":"Opt. Lett."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Bushnell, M., and Agrawal, V.D. (2002). Essentials of Electronic Testing for Digital, Memory and Mixed-Signal VLSI Circuits, Springer.","DOI":"10.1007\/b117406"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1233","DOI":"10.1109\/TVLSI.2015.2466551","article-title":"Design of Accurate Low-Cost On-Chip Structures for Protecting Integrated Circuits Against Recycling","volume":"24","author":"Guin","year":"2016","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/s10836-013-5428-2","article-title":"A Comprehensive Framework for Counterfeit Defect Coverage Analysis and Detection Assessment","volume":"30","author":"Guin","year":"2014","journal-title":"J. Electron. Test."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1109\/TCOME.1964.6539498","article-title":"Techniques for the diagnosis of switching circuit failures","volume":"83","author":"Galey","year":"1964","journal-title":"IEEE Trans. Commun. Electron."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Koushanfar, F. (2012, January 3\u20137). Can EDA Combat the Rise of Electronic Counterfeiting?. Proceedings of the 49th Annual Design Automation Conference, New York, NY, USA.","DOI":"10.1145\/2228360.2228386"},{"key":"ref_27","unstructured":"Kahng, A.B., Kirovski, D., Mantik, S., Potkonjak, M., and Wong, J.L. (1999, January 7\u201311). Copy Detection for Intellectual Property Protec-tion of VLSI Designs. Proceedings of the 1999 IEEE\/ACM International Conference on Computer-aided Design, Piscataway, NJ, USA."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Wei, S., Meguerdichian, S., and Potkonjak, M. (2010, January 13\u201318). Gate-level Characterization: Foundations and Hardware Security Applications. Proceedings of the 47th Design Automation Conference, New York, NY, USA.","DOI":"10.1145\/1837274.1837332"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Wei, S., Nahapetian, A., and Potkonjak, M. (2011). Robust Passive Hardware Metering. Proceedings of the International Conference on Computer-Aided Design, IEEE Press.","DOI":"10.1109\/ICCAD.2011.6105421"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Ye, Y., Kim, T., Chen, H., Wang, H., Tlelo-Cuautle, E., and Tan, S.X.D. (2017, January 12\u201315). Comprehensive detection of counterfeit ICs via on-chip sensor and post-fabrication authentication policy. Proceedings of the 2017 14th International Conference on Synthesis, Modeling, Analysis and Simulation Methods and Applications to Circuit Design (SMACD), Giardini Naxos, Italy.","DOI":"10.1109\/SMACD.2017.7981561"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"874","DOI":"10.1109\/JSSC.2008.917502","article-title":"Silicon Odometer: An On-Chip Reliability Monitor for Measuring Frequency Degradation of Digital Circuits","volume":"43","author":"Kim","year":"2008","journal-title":"IEEE J. Solid-State Circuits"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Karl, E., Singh, P., Blaauw, D., and Sylvester, D. (2008, January 3\u20137). Compact In-Situ Sensors for Monitoring Negative-Bias-Temperature-Instability Effect and Oxide Degradation. Proceedings of the 2008 IEEE International Solid-State Circuits Conference\u2014Digest of Technical Papers, San Francisco, CA, USA.","DOI":"10.1109\/ISSCC.2008.4523231"},{"key":"ref_33","first-page":"798","article-title":"On-Chip Aging Sensor Circuits for Reliable Nanometer MOSFET Digital Circuits","volume":"57","author":"Kim","year":"2010","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Dogan, H., Forte, D., and Tehranipoor, M.M. (2014, January 1\u20133). Aging Analysis for Recycled FPGA Detection. Proceedings of the 2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), Amsterdam, The Netherlands.","DOI":"10.1109\/DFT.2014.6962099"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Zhang, X., Xiao, K., and Tehranipoor, M. (2012, January 3\u20135). Path-delay fingerprinting for identification of recovered ICs. Proceedings of the 2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), Austin, TX, USA.","DOI":"10.1109\/DFT.2012.6378192"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Guo, Z., Rahman, M.T., Tehranipoor, M.M., and Forte, D. (2016, January 3\u20135). A zero-cost approach to detect recycled SoC chips using embedded SRAM. Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), McLean, VA, USA.","DOI":"10.1109\/HST.2016.7495581"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1109\/TVLSI.2017.2777262","article-title":"SCARe: An SRAM-Based Countermeasure Against IC Recycling","volume":"26","author":"Guo","year":"2018","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s41635-017-0012-3","article-title":"Systematic Correlation and Cell Neighborhood Analysis of SRAM PUF for Robust and Unique Key Generation","volume":"1","author":"Rahman","year":"2017","journal-title":"J. Hardw. Syst. Secur."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Tehranipoor, M., Guin, U., and Forte, D. (2015). Counterfeit Integrated Circuits: Detection and Avoidance, Springer. [1st ed.].","DOI":"10.1007\/978-3-319-11824-6"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"963","DOI":"10.1109\/TED.2018.2792436","article-title":"True Random Number Generation Using Read Noise of Flash Memory Cells","volume":"65","author":"Ray","year":"2018","journal-title":"IEEE Trans. Electron Devices"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/2\/3\/17\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:18:18Z","timestamp":1760195898000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/2\/3\/17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,12]]},"references-count":40,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2018,9]]}},"alternative-id":["cryptography2030017"],"URL":"https:\/\/doi.org\/10.3390\/cryptography2030017","relation":{"has-preprint":[{"id-type":"doi","id":"10.20944\/preprints201807.0169.v1","asserted-by":"object"}]},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,12]]}}}