Data Remanence in Semiconductor Devices
Data Remanence in Semiconductor Devices
Data Remanence in Semiconductor Devices
Peter Gutmann
IBM T.J.Watson Research Center
pgut001@cs.auckland.ac.nz
Abstract
A paper published in 1996 examined the problems involved in truly deleting data from magnetic storage media and
also made a mention of the fact that similar problems affect data held in semiconductor memory. This work extends
the brief coverage of this area given in the earlier paper by providing the technical background information
necessary to understand remanence issues in semiconductor devices. Data remanence problems affect not only
obvious areas such as RAM and non-volatile memory cells but can also occur in other areas of the device through
hot-carrier effects (which change the characteristics of the semiconductors in the device), electromigration (which
physically alter the device itself), and various other effects which are examined alongside the more obvious
memory-cell remanence problems. The paper concludes with some design and device usage guidelines which can
be useful in reducing remanence effects.
Conduction
Electron band
energy Band gap
Valence
band
1
Passivation
layer
p-type
n-type
Ohmic
contact
Gate
Source Drain
Passivation
n-type n-type layer
p-type substrate
Ohmic
contact
2. Semiconductor Memories
Having covered the basic building blocks used to create memories, we can now go into the makeup of the memory
devices themselves. In practice we distinguish between two main memory types, static RAM (SRAM) in which
information is stored by setting the state of a bistable flip-flop which remains in this state as long as power is applied
and no new data are written, and dynamic RAM (DRAM) in which information is stored by charging a capacitor
which must be refreshed periodically as the charge bleeds away (a later section will cover EEPROM-based non-
2
volatile memories). Because of their more complex circuitry, SRAMs typically only allow 25% of the density of
DRAMs, but are sometimes preferred for their faster access times and low-power operation [3].
2.1. SRAM
SRAM cells are typically made up of cross-coupled inverters using the structure shown in Figure 4. The load
devices can be polysilicon load resistors in older R-load cells, enhancement or depletion mode MOSFETs in an
NMOS cell, or PMOS MOSFETs in a CMOS cell (providing an example of the previously mentioned combination
of n-and p-channel MOSFET parts in a circuit). The purpose of the load devices is to offset the charge leakage at
the drains of the data storage and cell selection MOSFETs. When the load is implemented with PMOS MOSFETs,
the resulting CMOS cell has virtually no current flowing through it except during switching, leading to a very low
power consumption.
+V
Load
L L
devices
Data Data
Select Select
Operation of the cell is very simple: When the cell is selected, the value written via Data/ Data is stored in the cross-
coupled flip-flops. The cells are arranged in an n m matrix, with each cell individually addressable. Most SRAMs
select an entire row of cells at a time, and read out the contents of all the cells in the row along the column lines.
2.2. DRAM
DRAM cells are made up of some device performing the function of a capacitor and transistors which are used to
read/write/refresh the charge in the capacitors. Early designs used three-transistor (3T) cells, newer ones use a one-
transistor (1T) cell as shown in Figure 5. Data is stored in the cell by setting the data line to a high or low voltage
level when the select line is activated. Compare the simplicity of this circuit to the six-transistor SRAM cell!
Select
Storage
capacitor
Data
3
won’t be considered here). Later improvements in sense amplifiers reduced sensitivity to noise and compensated for
differences in threshold voltages among devices.
Select
Figure 6: DRAM cells: Trench (left), inverted trench (middle), stacked (right)
Newer DRAM cells of 16 Mb and higher capacity moved from a menagerie of trench capacitor types to stacked
capacitor cells (STCs), which stack the storage capacitor above the transistor rather than burying it in the silicon
underneath. STCs used varying types of horizontal or vertical fins to further increase the surface area, and thus the
capacitance. The cell at the right of Figure 6 employs a double-stacked STC. Another alternative to fins is spread-
stacking, in which capacitors for different cells are layered over one another. As with trench capacitors, many
further capacitor design variants exist [6][7].
4
4.1. Electromigration
Electromigration involves the relocation of metal atoms due to high current densities, a phenomenon in which atoms
are carried along by an “electron wind” in the opposite direction to the conventional current flow, producing voids at
the negative electrode and hillocks and whiskers at the positive electrode (if there’s a passivation layer present the
excess matter extrudes out to form a whisker, if not it distributes itself to minimise total surface area and forms a
hillock). Void formation leads to a local increase in current density and Joule heating (the interaction of electrons
and metal ions to produce thermal energy), producing further electromigration effects. When the external stress is
removed, the disturbed system tends to relax back to its original equilibrium state, resulting in a backflow which
heals some of the electromigration damage. In the long term though this can cause device failure (the excavated
voids lead to open circuits, the grown whiskers to short circuits), but in less extreme cases simply serves to alter a
device’s operating characteristics in noticeable ways. For example the excavations of voids leads to increased
wiring resistance, and the growth of whiskers leads to contact formation and current leakage. An example of a
conductor which exhibits whisker growth due to electromigration is shown in Figure 7, and one which exhibits void
formation (in this case severe enough to have lead to complete failure) is shown in Figure 8. Electromigration is a
complex topic, an excellent introduction to the subject is contained in the overview paper by Lloyd [8].
5
Figure 8: Void formation in a conductor due to electromigration
Although recent trends in clock speeds and device feature size reduction are resulting in devices with characteristics
such as thin, sub-1.0μm lines, short sub-50-100μm line lengths, and utilisation of high frequencies which have
traditionally been regarded as electromigration-resistant [10][11], they merely provide an ameliorative effect which
is balanced by other (in some cases yet-to-be-understood) electromigration phenomena which occur as device
dimensions shrink. Even the move to copper interconnects is no panacea, since although the actual copper
electromigration mechanisms differ somewhat from those in aluminium, the problem still occurs [9][12][13].
6
Hot-carrier stressing of cells can also affect other cell parameters such as the cell’s access and refresh times. For
example the precharge time (the time in which it takes to set the DRAM data lines to their preset values before an
access) is increased by hot-carrier degradation, although the specific case of precharge time change affects only
older NMOS cells and not newer CMOS ones. In addition hot carriers can produce visible or near-infrared photon
emission in saturated FETs [21][22], but use of this phenomenon would require that an attacker be physically
present while the device is being operated.
Hot carrier effects occur in logic circuits in general and not just in RAM cells. When MOS transistors are employed
in digital logic, the logic steady states are regions of low stress because there is either a high field near the drain but
the gate is low and the channel is off, or the electric field near the drain is low, in both cases leading to no generation
of hot carriers. Hot carriers are generated almost exclusively during switching transitions [23][24]. The effects of
the hot-carrier stressing can be determined by measuring a variety of device parameters, including assorted currents,
voltages, and capacitances for the device [25].
7
functionality is rendered unusable, which is why high-end tamper-responsive crypto devices include sensors to
detect the presence of ionising radiation [30].
A final problem area which is familiar to anyone who has examined the problems of erasing data stored on magnetic
media is the fact that some of the more sophisticated memory designs include facilities to map out failing or failed
cells in the same way that hard drives will map out bad sectors. This is performed using spare row/column line
substitution (SLS), which substitutes problem cells with spare, redundant ones [31]. This technology is fairly rare
and is usually applied only to correct initial hard failures so it isn’t really a major concern, however it does become a
problem in EEPROM/flash storage which is examined in Section 6.
8
the deep submicron lines. In addition standard mechanical probing isn’t able to access buried lines in devices with
multiple metallisation layers. Both of these limits can be overcome through the use of focused ion beam (FIB)
workstations, which can be used both to expose buried conductors and to deposit new, easily-accessible probe points
on an existing device [40] (this technique was used by the Canadian reverse-engineering lab Chipworks to rebuild an
ATMEL EEPROM from a crashed aircraft in order to recover data from it [41][42]). The top metal layers are
typically broad power buses, so no serious harm is caused by FIB milling of small holes to access lower-layer
conductors. The only potential problem is that the FIB process can cause local charging of the device surface, which
is usually avoided by grounding all pins in the device and shielding surrounding areas with conducting tape,
however the FIB-induced charging can still affect floating gates so it’s a good idea to avoid performing FIB surgery
in their general vicinity [43]. In addition some technologies such as trench and STC DRAM cells are naturally
resistant to being accessed in this manner, although it’s still possible to get to transistors indirectly connected with
the cell, for example the ones in the sense amplifiers.
9
initially set to 0, and access is protected though a mutex keyMutex. The code to flip and use the bits is shown in
Figure 9.
while( TRUE )
{ acquire keyMutex;
acquire keyMutex; if( keyState == 1 )
key ^= 1111…1111; key ^= 1111…1111;
keyState ^= 1; encrypt/decrypt;
release keyMutex; if( keyState == 1 )
key ^= 1111…1111;
sleep( 60 ); release keyMutex;
}
10
decrypt data), and leads to increased power consumption and decreased device lifetime. In addition, it assumes that
the device isn’t occupied at all times with handling real data, leaving no chance to process any dummy data.
Unfortunately alternating dummy and real data is complicated by the design of typical crypto devices. For example
encryption hardware will typically contain multiple key registers from which the currently selected key is expanded
into storage reserved for the scheduled key, which is then used to encrypt a block of data. This means that switching
keys incurs the overhead of a key schedule (although many devices, particularly DES hardware, will do an on-the-
fly key schedule which is effectively free in hardware). In addition, pipelined implementations of block ciphers are
generally not interruptible, requiring completion of processing of the current block (and in some cases several more
blocks to force the pipeline to be flushed) before a key change can take effect.
In order to economise on chip real estate (and therefore on device cost), virtually all real-world/non-research DES
hardware implementations iterate a single round 16 times, with on-the-fly key scheduling. Non-DES iterated
algorithms (as well as non-crypto algorithms such as MD5 and SHA-1) are also implemented by iterating one round
rather than by unrolling the operation. These can (with a little redesign) be interrupted at any point in the
encryption/decryption cycle and new data can be substituted. In addition the fact that a single round is reused with
multiple sets of key bits means that there’s a very mixed set of data patterns in use which minimises the effects of
any one pattern.
The crypto cores of large-integer maths accelerators (for example RSA accelerators) are less vulnerable to long-term
effects since they typically iterate a simple operation such as addition or bit shifting in a loop to achieve
multiplication, exponentiation, or whatever else is required. For example a typical RSA accelerator [50] might
consist of one of more 512- or 1024-bit adders and/or shift registers which are used to perform RSA encryption
using a series of squaring and modular multiplication steps, with a 1024-bit multiplication being performed with
1024 additions. Since the operations reuse the basic add/shift circuitry with constantly-changing bit patterns, the
problem of data retention in these parts of the circuit are greatly reduced. However, the iterated application of the
same keying data exacerbates the retention problem in other parts of the circuit, since a single modular
exponentiation can result in key components travelling over the same data paths thousands or even millions of times.
The RSA accelerator mentioned above, and others like it, perform a 1 kb modular multiplication with 1k modular
additions, and a modular exponentiation with 1k modular multiplications, for a total of 1M applications of the same
cryptovariables per RSA operation, and potentially trillions of applications per day of operation in a loaded SSL
server.
11
Floating
gate Gate
Gate Tunnel
oxide N+ N+ oxide
P-substrate
Source Drain
nn e
ain ide
t
ga
ide
Dr ox
ng
ox
el
ati
te
te
Flo
Ga
Ga
Tu
eee
Gate at
+ve
eeeeeeee
Gate eeeeeeee
at gnd
12
+12V
Gate
Floating gate
CHE Injection
Source Drain
GND +~6V
GND
Gate
Floating gate
FN Tunneling
Source Drain
+12V
13
Bit line
Select gate (source)
Word line 1
Word line 2
Word line 3
Word line 4
14
operation. The changes are particularly apparent in virgin and freshly-programmed cells, where the first set of
write/erase cycles causes a (comparatively) large shift in the cell thresholds, after which changes are much more
gradual [53][66] (as usual, this is device-dependant, for example the high injection MOS or HIMOS cell exhibits
somewhat different behaviour than FLOTOX and ETOX cells [69]). Because of this it’s possible to differentiate
between programmed-and-erased and never-programmed cells, particularly if the cells have only been programmed
and erased once, since the virgin cell characteristics will differ from the erased cell characteristics. Another
phenomenon which helps with this is overerasing, in which an erase cycle applied to an already-erased cell leaves
the floating gate positively charged, thus turning the memory transistor into a depletion-mode transistor. To avoid
this problem, some devices first program all cells before erasing them (for example Intel’s original ETOX-based
devices did this, programming the cells to 0s before erasing them to 1s [55]), although the problem is more generally
solved by redesigning the cell to avoid excessive overerasing, however even with this protection there’s still a
noticeable threshold shift when a virgin cell is programmed and erased.
EEPROM/flash memory can also have its characteristics altered through hot carriers which are generated by band-
to-band tunnelling and accelerated in the MOSFET’s depletion region, resulting in changes in the threshold voltages
of erased cells. As with other factors which affect EEPROM/flash cells, the changes are particularly apparent in
fresh cells but tend to become less noticeable after around 10 program/erase cycles [62].
Finally, as with SLS features in RAM, EEPROM/flash memory often contains built-in features which allow the
recovery of data long after it should have, in theory, been deleted. The mapping out of failing sectors which
parallels the sector sparing used in disk drives has already been mentioned, there also exist device-specific
peculiarities such as the fact that data can be recovered from the temporary buffers used in the program-without-
erase mode employed in some high-density flash memories, allowing recovery of both the new data which was
written and the original data in the sector being written to [61].
Working at a slightly higher level than the device itself are various filesystem-level wear-levelling techniques which
are used to decrease the number of erase operations which are necessary to update data, and the number of writes to
a single segment of flash [70]. Flash file systems are generally log-structured file systems which write changed data
to a new location in memory and garbage-collect leftover data in the background or as needed, with the exact details
being determined by a cleaning policy which determines which memory segments to clean, when to clean them, and
where to write changed data [71][72][73]. Because of this type of operation it’s not possible to cycle fresh cells to
reduce remanence effects without bypassing the filesystem, in fact the operation of the wear-levelling system acts to
create a worst-case situation in which data is always written to fresh cells. Trying to burn in an area of storage by
creating a file and overwriting it 10-100 times will result in that many copies of the data being written to different
storage locations, followed by the actual data being written to yet another fresh storage location. Even writing
enough data to cycle through all storage locations (which may be unnecessarily painful when the goal is to secure a
1 kB data area on a device containing 256 MB of non-critical data) may not be sufficient, since pseudorandom
storage location selection techniques can result in some locations being overwritten many times and others being
overwritten only a handful of times.
There is no general solution to this problem, since the goal of wear-levelling is the exact opposite of the (controlled)
wearing which is needed to avoid remanence problems. Some possible application-specific solutions could include
using direct access to memory cells if available, or using knowledge of the particular device- or filesystem’s
cleaning policy to try and negate it and provide the required controlled wearing. Since this involves bypassing the
primary intended function of the filesystem, it’s a somewhat risky and tricky move.
7. Conclusion
Although the wide variety of devices and technologies in use, and the continuing introduction of new technologies
not explicitly addressed in this work, make providing specific guidelines impossible, the following general design
rules should help in making it harder to recover data from semiconductor memory and devices:
Don’t store cryptovariables for long time periods in RAM. Move them to new locations from time to time
and zeroise the original storage, or flip the bits if that’s feasible.
Cycle EEPROM/flash cells 10-100 times with random data before writing anything sensitive to them to
eliminate any noticeable effects arising from the use of fresh cells (but see also the point further down
about over-intelligent non-volatile storage systems).
15
Don’t assume that a key held in RAM in a piece of crypto hardware such as an RSA accelerator, which
reuses the same cryptovariable(s) constantly, has been destroyed when the RAM has been cleared. Hot-
carrier and electromigration effects in the crypto circuitry could retain an afterimage of the key long after
the original has leaked away into the substrate.
As a corollary, try and design devices such as RSA accelerators which will reuse a cryptovariable over and
over again in such a way that they avoid repeatedly running the same signals over dedicated data lines.
Remember that some non-volatile memory devices are a little too intelligent, and may leave copies of
sensitive data in mapped-out memory blocks after the active copy has been erased. Devices and/or
filesystems which implement wear-levelling techniques are also problematic since there’s no way to know
where your data is really going unless you can access the device at a very low level.
Finally, however, the best defence against data remanence problems in semiconductor memory is, as with the related
problem of data stored on magnetic media, the fact that ever-shrinking device dimensions (DRAM density is
increasing by 50% per year [74]), and the use of novel techniques such as multilevel storage (which is being used in
flash memory and may eventually make an appearance in DRAM as well [75]) is making it more and more difficult
to recover data from devices. As the 1996 paper suggested for magnetic media, the easiest way to make the task of
recovering data difficult is to use the newest, highest-density (and by extension most exotic) storage devices
available.
Acknowledgements
The author would like to thank Steve Weingart and the referees for their feedback and comments on this paper and
Dr.Veng-cheong Lo for permission to reproduce the electromigration images.
References
[1] “Introductory Semiconductor Device Physics”, Greg Parker, Prentice Hall, 1994.
[2] “Fundamentals of Modern VLSI Devices”, Yuan Taur and Tak Ning, Cambridge University Press, 1998.
[3] “Semiconductor Memories: Technology, Testing, and Reliability”, Ashok Sharma, IEEE Press, 1997.
[4] “DRAM Variable Retention Time”, P.Restle, J.Park, and B.Lloyd, International Electron Devices Meeting
(IEDM’92) Technical Digest, December 1992, p.807.
[5] “A Numerical Analysis of the Storage Times of Dynamic Random-Access Memory Cells Incorporating
Ultrathin Dielectrics”, Alex Romanenko and W.Milton Gosney, IEEE Transactions on Electron Devices,
Vol.45, No.1 (January 1998), p.218.
[6] “Advanced Cell Structures for Dynamic RAMs”, Nicky Lu, IEEE Circuits and Devices Magazine, Vol.5, No.1
(January 1989), p.27.
[7] “DRAM Technology Perspective for Gigabit Era”, Kinam Kim, Chang-Gyu Hwang, and Jong Gil Lee, IEEE
Transactions on Electron Devices, Vol.45, No.3 (March 1998), p.598.
[8] “Electromigration for Designers: An Introduction for the Non-Specialist”, J.Lloyd,
http://www.simplex.com/udsm/whitepapers/electromigration1/index.html.
[9] “In situ scanning electron microscope comparison studies on electromigration of Cu and Cu(Sn) alloys for
advanced chip interconnects”, K.Lee, C.Hu, and K.Tu, Journal of Applied Physics, Vol.78, No.7 (1 October
1995), p.4428.
[10] “Electromigration in Metals”, Paul Ho and Thomas Kwok, Reports on Progress in Physics, Vol.52, Part 1
(1989), p.301.
[11] “Theoretical and Experimental Study of Electromigration”, Jian Zhao, “Electromigration and Electronic Device
Degradation”, John Wiley and Sons, 1994, p.167.
[12] “On the unusual electromigration behaviour of copper interconnects”, E.Glickman and M.Nathan, Journal of
Applied Physics, Vol.80, No.7 (1 October 1996), p.3782.
[13] “Surface Electromigration in Copper Interconnects”, N.McCusker, H.Gamble, and B.Armstrong, Proceedings
of the International Reliability Physics Symposium (IRPS 1999), March 1999, p.270.
16
[14] “Hot-Carrier Effects in MOS Devices”, Eiji Takeda, Cary Yang, and Akemi Miura-Hamada, Academic Press,
November 1995.
[15] “Dynamic Degradation in MOSFET’s — Part I: The Physical Effects”, Martin Brox and Werner Weber, IEEE
Transactions on Electron Devices, Vol.38, No.8 (August 1991), p.1852.
[16] “Data Storage in NOS: Lifetime and Carrier-to-Noise Measurements”, Bruce Terris and Robert Barrett, IEEE
Transactions on Electron Devices, Vol.42, No.5 (May 1995), p.944.
[17] “How do Hot Carriers Degrade N-Channel MOSFETs?”, Kaizad Mistry and Brian Doyle, IEEE Circuits and
Devices, Vol.11, No.1 (January 1995), p.28.
[18] “Hot-carrier Damage in AC-Stressed Deep Submicrometer CMOS Technologies”, A.Bravaix, D.Doguenheim,
N.Revil, and E.Vincent, IEEE Integrated Reliability Workshop (IRW’99) Final Report, October 1999, p.61.
[19] “Hot-carrier Degradation Evolution in Deep Submicrometer CMOS Technologies”, A.Bravaix, IEEE
Integrated Reliability Workshop (IRW’99) Final Report, October 1999, p.174.
[20] “Reduction of Signal Voltage of DRAM Cell Induced by Discharge of Trapped Charges in Nano-meter Thick
Dual Dielectric Film”, J.Kumagai, K.Toita, S.Kaki, and S.Sawada, Proceedings of the International Reliability
Physics Symposium (IRPS 1990), April 1990, p.170.
[21] “Extended (1.1-2.9eV) Hot-Carrier Induced Photon Emission in n-Channel MOSFETs”, M.Lanzoni,
E.Sangiorgi, C.Fiegna, and B.Riccò, International Electron Devices Meeting (IEDM’90) Technical Digest,
December 1990, p.69.
[22] “Time-Resolved Optical Characterisation of Electrical Activity in Integrated Circuits”, James Tsang, Jeffrey
Kash, and David Vallett, Proceedings of the IEEE, Vol.88, No.9 (September 2000), p.1440.
[23] “Setting the Trap for Hot Carriers”, Shian Aur, Charvaka Duvvury, and William Hunter, IEEE Circuits and
Devices, Vol.11, No.4 (July 1995), p.18.
[24] “Design Considerations for CMOS Digital Circuits with Improved Hot-Carrier Reliability”, Yusuf Leblebici,
IEEE Journal of Solid-state Circuits, Vol.31, No.7 (July 1996), p.1014.
[25] “Hot-Carrier-Induced Alterations of MOSFET Capacitances: A Quantitative Monitor for Electrical
Degradation”, David Esseni, Augusto Pieracci, Manrico Quadrelli, and Bruno Riccò, IEEE Transactions on
Electron Devices, Vol.45, No.11 (November 1998), p.2319.
[26] “Mobile ion effects in low-temperature silicon oxides”, N.Young, A.Gill, and I.Clarence, Journal of Applied
Physics, Vol.66, No.1 (1 July 1989), p.187.
[27] “Built-in Reliability Through Sodium Elimination”, Jeff Chinn, Yueh-Se Ho, and Mike Chang, Proceedings of
the International Reliability Physics Symposium (IRPS 1994), April 1994, p.249.
[28] “Failure Modes and Mechanisms for VLSI ICs — A Review”, Fausto Fantini and Carlo Morandi, IEE
Proceedings — Part G: Electronic Circuits and Systems, Vol.132, No.3 (June 1985), p.74.
[29] “An Accelerated Sodium Resistance Test for IC Passivation Films”, Charlie Hong, Brent Henson, Tony Scelsi,
and Robert Hance, Proceedings of the International Reliability Physics Symposium (IRPS 1996), May 1996,
p.318.
[30] “Building a High-Performance, Programmable Secure Coprocessor”, Sean Smith and Steve Weingart,
Computer Networks, Vol.31, No.4 (April 1999), p.831.
[31] “Memory LSI Reliability”, Masao Fukuma, Hiroshi Furuta, and Masahide Takada, Proceedings of the IEEE,
Vol.81, No.5 (May 1993), p.768.
[32] “Low Cost Attacks on Tamper Resistant Devices”, Ross Anderson and Markus Kuhn, Proceedings of the 5th
International Workshop on Security Protocols, Springer-Verlag LNCS No.1361, April 1997, p.125.
[33] “IDDQ Testing for High Performance CMOS — The Next Ten Years”, T.Williams, R.Kapur, M.Mercer,
R.Dennard, and W.Maly, Proceedings of the European Design and Test Conference (EDTC’96), 1996, p.578.
[34] “Electrical Characterization”, Steven Frank, Wilson Tan, and John West, in “Failure Analysis of Integrated
Circuits: Tools and Techniques”, Kluwer Academic Publishers, 1999, p.13.
[35] “Semiconductor Material and Device Characterization (2nd Ed)”, Dieter Schroder, John Wiley and Sons, 1998.
17
[36] “Characterization of Hot-Electron-Stressed MOSFET’s by Low-Temperature Measurements of the Drain
Tunnel Current”, Alexandre, Acovic, Michel Dutoit, and Marc Ilegems, IEEE Transactions on Electron
Devices, Vol.37, No.6 (June 1990), p.1467.
[37] “Monitoring Trapped Charge Generation for Gate Oxide Under Stress”, Yung Hao Lin, Chung Len Lee, and
Tan Fu Lei, IEEE Transactions on Electron Devices, Vol.44, No.9 (September 1997), p.1441.
[38] “Characteristic length and time in electromigration”, Morris Shatzkes and Yusue Huang, Journal of Applied
Physics, Vol.74, No.11 (December 1993), p.6609.
[39] “IC Failure Analysis: Techniques and Tools for Quality and Reliability Improvement”, Jerry Soden and Richard
Anderson, Proceedings of the IEEE, Vol.81, No.5 (May 1993), p.703.
[40] “The role of focused ion beams in physical failure analysis”, G.Matusiewicz, S.Kirch, V.Seeley, and P.Blauner,
Proceedings of the International Reliability Physics Symposium (IRPS 1991), April 1991, p.167.
[41] “Ottawa firm rescues data from Swissair black box”, Pauline Tam, The Ottowa Citizen, 21 March 2000.
[42] “Chip Detectives”, Jean Kumagai, IEEE Spectrum, Vol.37, No.11 (November 2000), p.43.
[43] “Probing Technology for IC Diagnosis”, Christopher Talbot, in “Failure Analysis of Integrated Circuits: Tools
and Techniques”, Kluwer Academic Publishers, 1999, p.113.
[44] “Relation between the hot carrier lifetime of transistors and CMOS SRAM products”, Jacob van der Pol and Jan
Koomen, Proceedings of the International Reliability Physics Symposium (IRPS 1990), April 1990, p.178.
[45] “Hot-carrier-induced Circuit Degradation in Actual DRAM”, Yoonjong Huh, Dooyoung Yang, Hyungsoon
Shin, and Yungkwon Sung, Proceedings of the International Reliability Physics Symposium (IRPS 1995), April
1995, p.72.
[46] “Secure Deletion of Data from Magnetic and Solid-State Memory”, Peter Gutmann, Proceedings of the 6th
Usenix Security Symposium, July 1996, p.77.
[47] “Metal Electromigration Damage Healing Under Bidirectional Current Stress”, Jiang Tao, Nathan Cheung, and
Chenming Ho, IEEE Electron Device Letters, Vol.14, No.12 (December 1993), p.554.
[48] “An Electromigration Failure Model for Interconnects Under Pulsed and Bidirectional Current Stressing”, Jiang
Tao, Nathan Cheung, and Chenming Ho, IEEE Transactions on Electron Devices, Vol.41, No.4 (April 1994),
p.539.
[49] “New Write/Erase Operation Technology for Flash EEPROM Cells to Improve the Read Disturb
Characteristics”, Tetsuo Endoh, Hirohisa Iizuka, Riichirou Shirota, and Fujio Masuoka, IEICE Transactions on
Electron Devices, Vol.E80-C, No.10 (October 1997), p.1317.
[50] “A High-Speed RSA Encryption LSI with Low Power Dissipation”, A.Satoh, Y.Kobayashi, H.Niijima, N.Ooba,
S.Munetoh, and S.Sone, Proceedings of the Information Security Workshop (ISW’97), Springer-Verlag LNCS
No.1396, September 1997.
[51] “Nonvolatile Semiconductor Memory Technology: A Comprehensive Guide to Understanding and Using
NVSM Devices”, William Brown and Joe Brewer (eds), IEEE Press, 1998.
[52] “Hot-electron injection into the oxide in n-channel MOS devices”, Boaz Eitan and Dov Frohman-
Bentchkowsky, IEEE Transactions on Electron Devices, Vol.28, No.3 (March 1981), p.328.
[53] “Analysis and Modeling of Floating-gate EEPROM Cells”, Avinoam Kolodny, Sidney Nieh, and Boaz Eitan,
IEEE Transactions on Electron Devices, Vol.33, No.6 (June 1986), p.835
[54] “An In-System Reprogrammable 256K CMOS Flash Memory”, Virgil Kynett, Alan Baker, Mickey Fandrich,
George Hoekstra, Owen Jungroth, Jerry Kreifels, and Steven Wells, Proceedings of the IEEE International
Solid State Circuits Conference, February 1988, p.132.
[55] “An In-System Reprogrammable 32K×8 CMOS Flash Memory”, Virgil Kynett, Alan Baker, Mick Fandrich,
George Hoekstra, Owen Jungroth, Jerry Kreifels, Steven Wells, and Mark Winston, IEEE Journal of Solid-state
Circuits, Vol.23, No.5 (October 1988), p.1157.
[56] “New Ultra High Density EPROM and Flash EPROM Cell with NAND Structure”, Fujio Masuoka, Masaki
Momodomi, Yoshihisa Iwata, and Riichirou Shirota, International Electron Devices Meeting (IEDM’87)
Technical Digest, 1987, p.552.
18
[57] “A 4-Mb NAND EEPROM with Tight Programmed Vt Distribution”, Masaki Momodomi, Tomoharu Tanaka,
Yoshihisa Iwata, Yoshiyuki Tanaka, Hideko Oodaira, Yasuo Itoh, Riichirou Shirota, Kazunori Ohuchi, and
Fujio Masuoka, IEEE Journal of Solid-state Circuits, Vol.26, No.4 (April 1991), p.492.
[58] “A Quick Intelligent Page-Programming Architecture and a Shielded Bitline Sensing Method for 3V-Only
NAND Flash Memory”, Tomoharu Tanaka, Yoshiyuki Tanaka, Hiroshi Nakamura, Koji Sakui, Hideko
Oodaira, Riichirou Shirota, Kazunori Ohuchi, Fujio Masuoka, and Hisashi Hara, IEEE Journal of Solid-state
Circuits, Vol.29, No.11 (November 1994), p.1366.
[59] “Flash Memory Cells — An Overview”, Paolo Pavan, Roberto Bez, Piero Olivo, and Enrico Zanoni,
Proceedings of the IEEE, Vol.85, No.8 (August 1997), p.1248.
[60] “A multilevel-cell 32Mb flash memory”, M.Bauer, R.Alexis, B.Atwood, K.Fazio, K.Frary, M.Hensel, M.Ishac,
J.Javanifard, M.Landgraf, D.Leak, K.Loe, D.Mills, P.Ruby, R.Rozman, S.Sweha, K.Talreja, and
K.Wojciechowski, Proceedings of the IEEE International Solid State Circuits Conference, February 1995,
p.132.
[61] “A 256-Mb Multilevel Flash Memory with 2-MB/s Program Rate for Mass Storage Applications”, Atsushi
Nozoe, Hiroaki Kotani, Tetsuya Tsujikawa, Keiichi Yoshida, Kazunori Furusawa, Masataka Kato, Toshiaki
Nishimoto, Hitoshi Kume, Hideaki Kurata, Naoki Miyamoto, Shoji Kubono, Michitaro Kanamitsu, Kenji Koda,
Takeshi Nakayama, Yasuhiro Kouro, Akira Hosogane, Natsuo Ajika, and Kiyoteru Kobayashi, IEEE Journal of
Solid-state Circuits, Vol.34, No.11 (November 1999), p.1544.
[62] “Degradations due to Hole Trapping in Flash Memory Cells”, Sameer Haddad, Chi Chang, Balaji
Swaminathan, and Jih Lien, IEEE Electron Device Letters, Vol.10, No.3 (March 1989), p.117.
[63] “Degradation of Tunnel-Oxide Floating-Gate EEPROM Devices and the Correlation with High Field-Current-
Induced Degradation of Thin Gate Oxides”, Johan Witters, Guido Groeseneken, and Herman Maes, IEEE
Transactions on Electron Devices, Vol.36, No.9 (September 1989), p.1663.
[64] “Determination of Trapped Oxide Charge in Flash EPROMs and MOSFETs with Thin Oxides”, K.Tamer San
and Tso-Ping Ma, IEEE Electron Device Letters, Vol.13, No.8 (August 1992), p.439.
[65] “Reliability Issues of Flash Memory Cells”, Seiichi Aritome, Riichiro Shirota, Gertjan Hemink, Tetsuo Endoh,
and Fujio Masuoka, Proceedings of the IEEE, Vol.81, No.5 (May 1993), p.776.
[66] “Effects of Erase Source Bias on Flash EPROM Device Reliability”, K.Tamer San, Çetin Kaya, and T.P.Ma,
IEEE Transactions on Electron Devices, Vol.42, No.1 (January 1995), p.150.
[67] “Flash EPROM Disturb Mechanisms”, Clyde Dunn, Çetin Kaya, Terry Lewis, Tim Strauss, John Schreck, Pat
Hefly, Matt Middendorf, and Tamer San, Proceedings of the International Reliability Physics Symposium (IRPS
1994), April 1994, p.299.
[68] “Retention characteristics of single-poly EEPROM cells”, C.Papadas, G.Ghibaudo, G.Pananakakis, C.Riva,
P.Ghezzi, C.Gounelle, and P.Mortini, Proceedings of the European Symposium on Reliability of Electron
Devices, Failure Physics and Analysis, October 1991, p.517.
[69] “Write/Erase Degradation in Source Side Injection Flash EEPROMs: Characterization Techniques and Wearout
Mechanisms”, Dirk Wellekens, Jan Van Houdt, Lorenzo Faraone, Guido Groeseneken, and Herman Maes,
IEEE Transactions on Electron Devices, Vol.42, No.11 (November 1995), p.1992.
[70] “Designing with Flash Memory”, Brian Dipert, Annabooks, 1993.
[71] “Non-volatile memory for fast, reliable file systems”, Mary Baker, Satoshi Asami, Etienne Deprit, John
Ouseterhout and Margo Seltzer, Proceedings of the Fifth International Conference on Architectural Support for
Programming Languages and Operating Systems (ASPLOS-V), October 1992, p.10.
[72] “A Flash-Memory Based File System”, Atsuo Kawaguchi, Shingo Nishioka, and Hiroshi Motoda, Proceedings
of the 1995 Usenix Technical Conference, January 1995.
[73] “Cleaning policies in mobile computers using flash memory”, M.-L. Chiang and R.-C. Chang, Journal of
Systems and Software, Vol.48, No.3 (1 November 1999), p.213.
[74] “High-Speed DRAM Architecture Development”, Hiroaki Ikeda and Hidemori Inukai, IEEE Journal of Solid-
state Circuits, Vol.34, No.5 (May 1999), p.685.
[75] “A Four-Level Storage 4-Gb DRAM”, Takashi Okuda and Tatsunori Murotani, IEEE Journal of Solid-state
Circuits, Vol.32, No.11 (November 1997), p.1743.
19