IC chip burning procedures and methods:
1, Firstly connect the recorder data line, and the corresponding IC socket into the burning seat; turn on the computer and burner power.
2. Run the burning software: (different burning socket correspond to different burning software).
3, Select the IC brand: After the program start screen appears, click on the "Device" menu, call up the IC brand selection table, and then select the brand you want to burn IC corresponding, and then click "OK";
4. Select the IC model: At this time, the IC model of the company where the IC to be burned will appear. Select the model of the IC and click “Run”. If you want to select the jumper, then follow the instruction in computer to set the jumper. After the setting, click "OK". If there is no jumper in the burner block, it will enter the burning interface directly;
5, Import the software to be burnt: click on the menu "File", select "Load File To Programmer Buffer", then choose to burn software, click "Open", then select "00", click OK.
6, Check the software check code (Buffer Checksum): After the software is loaded, a four-digit check code appears after the Buffer Checksum. This code must indicate the check code of the Electronic Design Document Notice. The software to be burned is correct. If it is incorrect, it should immediately respond to relevant departments to solve.
7, Burning software: Click "Program" button, the IC to be burned into the IC seat, installed after burning the seat on the burn button. After the burning is completed, “OK” will be displayed if the burning is successful, “Error” is displayed in red if the burning is failed, and the indicator of each burning seat corresponding to the IC of the burning OK is bright, indicating that the burning of the IC is successful. .
8. Make a burn mark, burn the OK IC with a sticker, and burn the failed one into the other burning seat and reburn it once. Make sure that the IC is damaged and put it in the defective product box and make a mark.
IC burning failure and Recovery steps:
1, Repeat steps 1~6 above;
2, After the burning interface appears, click the "Auto" button, use the mouse to select "Erase, Program, Verify" three options;
3, The ICs to be burnt is loaded into the IC sockets, and then press the burning button on the burning sockets. When the burning is completed, "OK" is displayed if the burning is successful, and "Error" is displayed in red if the burning is failed.
4, The OK IC put on stickers, failed IC to re-insert other burning seats to re-burn one more time, to determine if the IC is damaged. Later the Failure ICs are to be returned for testing.
IC Chip Burning Process Highlight:
1, Be careful when placing the IC to avoid damaging the IC and burning the seat.
2. The IC must not be placed on opposite way. The IC must be checked before removing the pins for short circuit. Otherwise, the IC may be damaged.
3, Burning personnel must be trained before going to the post. During burning, they must not use other computer programs.
4, such as bad phenomena immediately feedback relevant technicians to solve.
Sourced From Fast PCB Studio
Reverse engineering technology plays an importance role in the development of integrated circuit industry. However, since the birth of the entire concept, it has been widely in argued for its legitimacy.
Reverse engineering is committed to the second development of the original product design ideas, through the circuit analysis and data extraction, product design, adding new design concepts and functional modules, based on the original product to achieve rapid innovation and update Replacement, help enhance the overall competitiveness of the electronics industry.
January 2007 China's Supreme People's Court promulgated the "Interpretation on Several Issues Concerning the Application of Law in the Trial of Unfair Competition in Civil Cases," stipulating that trade secrets obtained by means of self-development or reverse engineering shall not be deemed as relevant to the Unfair Competition Law The provisions of the violation of trade secrets.
The judicial interpretation also stipulates that reverse engineering refers to the technical means obtained from the open channel demolition of products, mapping, analysis and access to the product of the technical information. After the parties know the commercial secrets of others by improper means, they also advocate that the act of acquisition is lawful and not supported on the ground of reverse engineering.
The judicial interpretation of the February 1, 2007 came into effect.
Reverse engineering plays an important role in the development of integrated circuit industry. Since the birth of the entire concept, its legitimate has been widely argued.
So far, many Reverse Engineering Organizations have stated that all clients who requesting reverse engineering from a company must have a legal design copyright source statement in order to protect the legitimate rights and interests of the original design copyright holder, and the customers are required to promise to utilize the results for teaching, analysis, technical research and other legitimate uses.
Reverse engineering technologies applying on teaching; analyzing and evaluating the concept, technology or layout used in the layout design, the layout of the circuit, the logic structure, the component layout and copy layout design and the analysis and evaluation results are applied to the original layout Design or manufacturing integrated circuits accordingly, are not considered infringement. However, the production of integrated circuits by simply copying a protected layout design of others for the purpose of marketing is considered a tort.
Fast PCB Studio
Source From Baidu.com @https://baike.baidu.com/item/PCB%E6%8A%84%E6%9D%BF
Copy PCB Design, also known as PCB Reverse Engineering, simply saying, is to firstly scan the the board to be copied, record the detailed location of the components. Then remove the components to make a bill of materials (BOM). After that arrange material procurement, bare board is scanned into the image copy board software Processing and reverting to PCB board image file, and then sending the PCB file to PCB factories for sampling.
Specific technical steps are as follows:
1. The first step, get a printed circuit board, first of all recording on paper for all the components of the model, parameters, and location, especially the diode, transistor direction, IC notch direction. It's better to use a digital camera to take two photos to record components location. A lot of PCB circuit boards are getting more and more complex, and the diode diodes on top may be neglected sometimes when you do not pay enough attention when checking them by raw eyes.
2. The second step, remove all the components, and remove the tin from the PAD hole. Clean the PCB with alcohol and put it into the scanner. The scanner needs adjust to a little more high pixels to get a clearer image. Then re-use water yarn paper to the top and bottom slightly polished, polishing until the copper film shiny, into the scanner. Start PHOTOSHOP, color the two layers were swept in. Please note that the PCB must be placed in a horizontal and vertical position in the scanner, otherwise the scanned image will not work.
3. The third step is to adjust the canvas contrast, brightness, so that part of the copper film and non-copper film contrast strongly, and then change the secondary map to black and white color, check the lines are clear, if not clear, repeat this step. If clear, the picture will be saved as black and white BMP format files, TOP BMP and BOT BMP, if you find that there are problems with graphics, PHOTOSHOP can also be used for fix and correction.
4. Next, the two BMP format files were converted to PROTEL format file transferred into the PROTEL two layers. If two layers of PAD and VIA basically overlap, it indicates that the first few steps to do well. If If there is deviation, repeat the third step.
(PCB copy board needs to be very patient, because a small problem will affect the quality and copy board after the match.)
5. Then, you could convert the top-level BMP to the TOP PCB. Please note that the conversion to the SILK layer is the yellow one, and then you are tracing the top-level and placing the device according to the second-step drawing. SILK deleted after painting. Repeat until you have drawn all the layers.
6. In the PROTEL, you need to import TOP PCB and BOT PCB, and emerge into one file.
7. Use laser printer to print out TOP LAYER, BOTTOM LAYER as transparent films (1: 1 ratio). Place the films on the PCB copper layers, compare the error, if not, you're done.
A PCB Design now has been copied from the original board. But it was done in half. After testing the electronic performance of the copied board, and if it's same as the original board.
For multilayer board copy, you need to be very carefully polishing to the inner layer, then repeating the third to fifth copy board steps. Of course, the name of the graphic is also different. Generally, 2 layer PCB copy is much simpler than multi-layer board. It's common to have misalignment issues if you are not experienced on Multi-layer board copy. For high layer PCB, there was a lot of Plated Thru Holes, and Non Plated Thru Holes. The differences of the holes are very small, so some the conductivity will be messed up if you made any mistakes at this stage for high layer boards copy.
There are a lot of other methods for delayer multi-layer PCBs. Apart from manually sanding, we also suggest sand blasting machine, CNC milling machine to delayer the inner layers. 3D X-ray is also a very effective way to obtain the drawings for multilayer PCBs, if you can get access to 3D X-ray machine.
Source from Fast PCB Studio
A schematic diagram is a convenient and informative method for documenting electronic circuitry. The basic building blocks of schematic diagrams use a set of standardized symbols to represent different component types.
Fast PCB Studio engineers will reverse the schematic diagram according to the PCB module received. The Schematic diagram is to be provided to customers for future uses, e.g. PCB module modification for production version upgrade.
In the case of a PCB design, the bill of materials is a list of all the parts needed to build that specific printed circuit board.
Normally, all the components mounted on PCB module will be take off from the PCB bare board. The location of the each component will be recorded, and models with quantities will be listed in the BOM list. The BOM list is be provided to customers finally for PCB module Copy.
The Gerber format is an open 2D binary vector image file format. It is the standard file used by printed circuit board (PCB) industry software to describe the printed circuit board images: copper layers, solder mask, legend, etc.
PCB manufacturers are able to produce bare PCB according to the Gerber files provided.
PCB hardware clone technology enables the possibility on reversing the PCB module from the physical item to engineering drawings. Physical PCB modules will be translated into PCB Gerber (the production engineering file), PCB BOM List (PCB component list), & PCB Schematic Diagram. With these engineering files, you are able to re-produce / clone a PCB module. The files could also be used for design modification or product upgrade.
The current main technology for PCB Reverse Engineering is relatively simple by taking the simple 9 steps as below:
1.Remove all the components and record the placement of every components on the board to create a BOM List
2.Scan outer layer PCB circuits to software for editing & comparison
3.Remove the dielectric layer PCB, and scan the inner layer PCB circuit to the software for editing & comparison
4.Remove copper layer scanned, and repeat step 3 until all layers are recorded
5.Reverse the images taken to PCB Gerber file (The engineering file for manufacturing)
6.Convert the Gerber file obtained to PCB layout design, and add all the components in the drawings according the placement recorded
7.Check the layout drawing to make sure there is not open /break circuit
8.Convert the layout drawing to Schematic Diagram
9.Check the schematic drawing
Source from Fast PCB Studio
IC Unlock is also known as IC Crack, IC Attack or IC Decryption. Normally, the IC of the final products are encrypted. IC unlock services is to decrypt the IC through the semiconductor reverse engineering approaches. The program of ICs will be readable by programmer after IC unlocking.
There are mainly 8 approaches we using to attack an IC.
1. Software attacking
The technology typically attacking ICs by using the processor communication interfaces and exploits protocols, cryptographic algorithms, or security holes in these algorithms. A typical
example of software attack was the attack on the early ATMELAT89C family of microcontrollers. The attacker took advantage of the loopholes in the timing design of the erasing operation of the series of microcontrollers: by using a self designed program, stopped the next step of erasing the program memory data, after erasing the encryption locking bit. The program became non encrypted and then just read out the on-chip program by programmer.
It also possible to utilize the encryption methods to attack IC, based on the development of new attacking devices, with some software to do software attacks. Recently, there has been attacking device in China named Kai Ke Di Technology 51 chip decryption equipment ( Developed by an IC attacking Pro from Chengdu, China), this device unlock IC mainly through SyncMos.Winbond, due to the loopholes in the IC production process. The method is to use some programmers to locate inserted bytes , Through this method to find whether the chip has a continuous slot (find the chip continuous FFFF bytes). The bytes inserted is able to to perform the instruction to send the internal program out, and then use the decryption device to intercrypt, to obtain the program.
2. Electronic detection attacks
The technology typically monitors the processor's analog characteristics of all power and interface connections during normal operation with high temporal resolution and attacks by monitoring its electromagnetic radiation characteristics. Because the microcontroller is an active electronic device, the corresponding power consumption changes as it executes different instructions. This allows the attacker to acquire specific critical information in the microcontroller by analyzing and detecting these changes using special electronic measuring instruments and mathematical statistics. As for the RF programmer can directly read the old model of the encryption MCU program is to use this principle.
3. Error Generation Attack Technology
The technology uses abnormal operating conditions to cause processor errors and then processor provides additional access to enable the attacks. The most widely used errors generation technologies include voltage and clock strikes. Low-voltage and high-voltage attacks can be used to disable the protection to circuit or force the processor to perform incorrect operations. A clock transition may reset the protection circuitry without disrupting the protected information. Power and clock transitions can affect the decoding and execution of a single instruction in some processors.
4. probe technology
The technology is to directly expose the chip internal connections, and then observe, manipulate, interfere with the microcontroller to achieve the purpose of attack.
5. UV attack method
UV attack, is to apply ultraviolet radiation on chip, and convert the encrypted chip into a non-encrypted chip, and then use the programmer to read the program directly. This method is suitable for OTP chips, engineers who designing microcontrollers know that OTP chips can only be erased by UV light. So to wipe off encryption need to use UV. At present, most OTP chips produced in Taiwan can be decrypted using this method. Half of the OTP chip ceramic package will have quartz window. This kind of IC can be directly irradiated with ultraviolet light. If it is plastic package, we need to open the chip first, the wafer can be exposed to ultraviolet light exposure . Because of this chip encryption is relatively poor, the basic decryption does not require any cost, so the market price of the chip decryption is very cheap, e.g SONIX SN8P2511 decryption, Infineon SCM decryption.
6. Chip loopholes
Many chips have cryptographic vulnerabilities at design time. Such chips can exploit vulnerabilities to attack the chip to read out the code in memory, such as the exploit of the chip code mentioned in our another article: If we can find the continuous FF code that can be inserted bytes, we could reverse out the program. Or if some search code contains a special byte, if there is such a byte, we can use this byte to reverse the program out. The chips such as Winbond or Shimao MCU chips, for example, W78E516 decryption, N79E825 decryption, ATMEL 51 series AT89C51 decryption is to use the byte loopholes in the code to attack.
In addition there are some obvious loopholes in the chip, such as a pin in the encryption will become a non-encrypted chip, when adding the electronic signal. Because the attacking technology involves a Chinese MCU manufacturer, we will not listed the models out at here. Chip decryption devices that can be seen on the market today all utilize the loopholes in the chip or the program to realize IC unlock. However, the approaches that can be bought / shared outside is basically only able to unlock very limited number of models, as the detailed attacking approaches are highly confidential to each lab or companies. At Fast PCB Studio, we developed our own decryption equipment for internal uses only. We have the technology with our developed tools whick is able to unlock e.g. MS9S09AW32, or the device that can specifically unlock LPC2119LPC2368 and other similar ARM IC. The outcomes will be very reliable by using the specialized approaches & tools for specific IC catalog.
7. FIB recovery encryption fuse method
This method is suitable for many chips with fuse encryption, the most typical example is TI's MSP430 unlocking. Because the MSP430 encryption is to burn fuse, as long as the fuse can be restored, then the IC changes to non-encrypted chips. More models such as MSP430F1101A, MSP430F149, MSP430F425 and so on. We normally use the probe to achieve the fuse re-connection. If there is no equipment, it's still achievable by modifying lines contracting to semiconductor modification companies. General it could use the FIB (focused ion beam) Equipment to connect the line, or with a dedicated laser modification of equipment to restore the line. This approach is not a preferred solution because of the needs for equipment and consumables which increases the customers' cost for IC unlock work. We will use the technology if there is no a better method.
8. Modifying the Encryption Circuit
Currently on the market, CPLD and DSP chip design is complex, with high encryption performance, using the above method is difficult to do decryption. Then we need to make the previously mentioned analysis for the chip's structure, and then find the encryption circuit, and use the chip circuit modifying equipment to make some changes, and to make the encryption circuit fails. The encrypted DSP or CPLD then will be into a non-encrypted status which the codes can be read out. We use the technology for TMS320LF2407A, TMS320F28335, TMS320F2812 & etc.
We are keep researching the new attacking methods. Currently we have been able to unlock a lot of IC Models. Would be glad to share more if we have new findings on IC Unlocking.
Source From Fast PCB Studio
The cost of the PCB Reverse Engineering is associated with the size and the layer of PCB mainly. The minimum PCB reverse engineering cost at Fast PCB Studio is USD100, for single layer PCB with 50mm by 50mm. However, the hole & trace intensity, the quantity of the components will affect the price as well.
We've received the IC unlock questions from a lot of customers that if the IC model has been grind off, is the IC still unlockable ? The answer is yes.
But how to unlock IC if it's model had been grind off? We could diagnose the IC model from the surrounding circuit design. If it's not identifiable, we will open the IC cover to check the wafer of the IC, and find the IC model. However, this working procedure relies on the rich experiences on hardware structure of the various IC, since there are so many IC types & brands.
With 10+ years experiences on IC unlock, and the Circuit & IC design professionals in team, Fast PCB Studio is ready to help on your project if you have the similar issue with your IC.