A PCB cannot be reproduced for cloning purposes unless the attacker steals the original PCB layout from the manufacturer.
1. Most IC authentication techniques can be directly used for PCB authentication.
2. Identical traces within the same board would have identical path delay and impedance.
3. Boundary-scan chain architecture (BSA) can be used for enabling design-for-test (DFT) solutions.
4. Capacitor units implanted for signature generation could be buried into the internal layers of PCB for noise immunity.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here