Reverse Engineering Integrated Circuits Using Finite State Machine Analysis

Total Page:16

File Type:pdf, Size:1020Kb

Reverse Engineering Integrated Circuits Using Finite State Machine Analysis PNNL-25330 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Reverse Engineering Integrated Circuits Using Finite State Machine Analysis Kiri Oler Carl Miller March 2016 DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor Battelle Memorial Institute, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof, or Battelle Memorial Institute. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof. PACIFIC NORTHWEST NATIONAL LABORATORY operated by BATTELLE for the UNITED STATES DEPARTMENT OF ENERGY under Contract DE-AC05-76RL01830 Printed in the United States of America Available to DOE and DOE contractors from the Office of Scientific and Technical Information, P.O. Box 62, Oak Ridge, TN 37831-0062; ph: (865) 576-8401 fax: (865) 576-5728 email: [email protected] Available to the public from the National Technical Information Service, U.S. Department of Commerce, 5285 Port Royal Rd., Springfield, VA 22161 ph: (800) 553-6847 fax: (703) 605-6900 email: [email protected] online ordering: http://www.ntis.gov/ordering.htm This document was printed on recycled paper. (9/2003) PNNL-25330 Reverse Engineering Integrated Circuits Using Finite State Machine Analysis Kiri Oler Carl Miller March 2016 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Pacific Northwest National Laboratory Richland, Washington 99352 Reverse Engineering Integrated Circuits Using Finite State Machine Analysis Abstract structed by evaluating every possible input stream on the IC. Each evaluation tree is unique for each FSM, and Due to the lack of a secure supply chain, it is not possi- any two FSMs that share the same evaluation tree are ble to fully trust the integrity of electronic devices. Cur- equivalent. It should be noted that evaluation trees are rent methods of verifying integrated circuits are either normal, as defined in [2], meaning the ordering on the destructive or non-specific. Here we expand upon prior nodes is preserved, allowing for the concept of descen- work, in which we proposed a novel method of reverse dant nodes and subtrees, which will be necessary as we engineering the finite state machines that integrated cir- proceed. Through basic pattern matching we can reduce cuits are built upon in a non-destructive and highly spe- the nodes and subtrees to work backwards towards the cific manner. In this paper, we present a methodology original state machine. This work will verify that both for reverse engineering integrated circuits, including a operations yield a state machine equivalent to the im- mathematical verification of a scalable algorithm used to plemented machine. In addition, to mathematical veri- generate minimal finite state machine representations of fication, we tested our approach using a combined hard- integrated circuits. ware/software implementation. We begin by discussing the motivation behind this 1 Introduction work in greater detail. We then present our contribu- tion to the problem by first providing the mathematical The integrity of our computing hardware is of criti- foundation and then outlining the software and hardware cal concern in industries such as energy generation and implementation used to test our theory. distribution, aviation, and health care. Currently, there is no way of verifying the integrity of the entire supply 2 Motivation chain, from design to use, to ensure the level of integrity needed. In dividing this work into smaller, more feasible Many of the ICs that control our desktop computers, pieces, we have chosen to focus on examining the end servers, SCADA systems, and a range of other devices product–the integrated circuit (IC). Many modern ICs are are designed in the U.S. but put into silicon overseas. built upon finite state machines (FSMs). In this research, [6] This creates a large gap in our control of the sup- we have developed a method for rediscovering the FSM ply chain which puts all systems that use this hardware that an IC is built upon using a nondestructive and intel- at risk for modification or injection attacks. Today, many ligent brute force method. Prior work has focused on de- organizations spend enormous amounts of money veri- structive reverse engineering methods that use images of fying the integrity of a given piece of hardware; they are the transistor levels to determine function [1], and non- then locked in to that hardware for decades afterwards, destructive characterization techniques like power usage, resulting in obsolete hardware and software running crit- timing delays, current leakage, and EM imaging which ical systems. can be used to certify an IC against a known-good IC. There are a few destructive existing methods for deter- [7, 3, 9]. mining if an IC deviates from the original design; these The mathematical theory behind our approach is pre- are expensive and time consumptive but extremely accu- sented in two parts. First, we construct a tree represent- rate. Alternatively, there are a variety of non-destructive ing the IC, and then we determine the underlying state imaging methods for determining if an unknown IC is machine based on said tree. The evaluation tree is con- different from an assumed-good benchmark IC. How- 1 ever, these methods often only work for large or active 0 differences, and are based on the assumption that the 0 1 2 3 benchmark chip has not been corrupted. What is needed, 1 and what we will detail in the following sections, is an 2 3 4 algorithm to enable a fast, non-destructive method of re- 0 1 2 3 0 1 2 3 0 1 2 3 0 1 2 3 verse engineering ICs to ensure their veracity. We must 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 assume the worst case scenario in which we have no prior knowledge, no design documents, no labeling, or an out- Figure 1: Example of a tree with nodes and edges labeled of-production IC. and an example path highlighted in red. 3 Prerequisites FSM will be modeled using a tree structure. More specif- Below we define the structures and notation relevant ically, an FSM is represented as a tree T with a set of to the proposed method, culminating with the concept of nodes N, where each node has, at most, c = 2x children, tree equality for the purpose of manipulating those trees where x 2 N+, implying the FSM being modeled has x representing the FSMs. input pins. A node without any children is referred to as a leaf. For algorithmic purposes, nodes are labeled numer- 3.1 Assumptions ically (top to bottom, left to right), beginning with 0 for the root node and reading left to right down each level of The work presented here relies upon a few critical as- the tree. Likewise, edges originating from the same par- sumptions: ent node are grouped together and labeled numerically from left to right. See Figure 1 for an illustration of the • The IC state machine must be a Moore FSM (i.e. node and edge labeling conventions. Each node in the the output depends only on the machine’s state), and tree represents a state in the FSM, with the child nodes more specifically, not a Mealy FSM (i.e. the output representing the states that can be transitioned into from depends on both current state and the input). the given node or state. The root node of the tree is the • An isolated state machine. FSM’s initial state. A tree with no nodes or children is The FSM must be in isolation and separated from referred to as the empty tree and denoted 0. As with the any outside source which may affect the states or formal definition of a tree, each tree is a set N with c state transitions. In practice, this means that the functions defined as follows: S FSM cannot be connected to any sort of non-volatile !i : N ! N [ 0 memory. Also, it cannot be allowed to take any in- put outside of that which is provided via the algo- For example, if node n has children s1;s2;:::;sc, then rithmic testing apparatus. Si n ! si for 1 ≤ i ≤ c or Si(t) = si. Additionally, conven- tions dictate that a tree T is referred to by its root node, • Scalability is possible. meaning notationally S (T) refers to the leftmost child Though we have a theoretic basis for trees with any 1 of node T, which is, in turn, the root node of the leftmost number of children/input pins, the larger this num- subtree of T. Likewise, the subtree labels proceed in as- ber, the greater the impact to the efficiency of our al- cending order from left to right. Therefore, S T refers to gorithm, which is a topic to be explored more thor- c the rightmost child of T and rightmost subtree of T. We oughly in future work. write Si(T) ≤ T to denote that Si(T) is a subtree of T. • The single origin point is always accessible.
Recommended publications
  • Smart Contracts for Machine-To-Machine Communication: Possibilities and Limitations
    Smart Contracts for Machine-to-Machine Communication: Possibilities and Limitations Yuichi Hanada Luke Hsiao Philip Levis Stanford University Stanford University Stanford University [email protected] [email protected] [email protected] Abstract—Blockchain technologies, such as smart contracts, present a unique interface for machine-to-machine communication that provides a secure, append-only record that can be shared without trust and without a central administrator. We study the possibilities and limitations of using smart contracts for machine-to-machine communication by designing, implementing, and evaluating AGasP, an application for automated gasoline purchases. We find that using smart contracts allows us to directly address the challenges of transparency, longevity, and Figure 1. A traditional IoT application that stores a user’s credit card trust in IoT applications. However, real-world applications using information and is installed in a smart vehicle and smart gasoline pump. smart contracts must address their important trade-offs, such Before refueling, the vehicle and pump communicate directly using short-range as performance, privacy, and the challenge of ensuring they are wireless communication, such as Bluetooth, to identify the vehicle and pump written correctly. involved in the transaction. Then, the credit card stored by the cloud service Index Terms—Internet of Things, IoT, Machine-to-Machine is charged after the user refuels. Note that each piece of the application is Communication, Blockchain, Smart Contracts, Ethereum controlled by a single entity. I. INTRODUCTION centralized entity manages application state and communication protocols—they cannot function without the cloud services of The Internet of Things (IoT) refers broadly to interconnected their vendors [11], [12].
    [Show full text]
  • Understanding Performance Numbers in Integrated Circuit Design Oprecomp Summer School 2019, Perugia Italy 5 September 2019
    Understanding performance numbers in Integrated Circuit Design Oprecomp summer school 2019, Perugia Italy 5 September 2019 Frank K. G¨urkaynak [email protected] Integrated Systems Laboratory Introduction Cost Design Flow Area Speed Area/Speed Trade-offs Power Conclusions 2/74 Who Am I? Born in Istanbul, Turkey Studied and worked at: Istanbul Technical University, Istanbul, Turkey EPFL, Lausanne, Switzerland Worcester Polytechnic Institute, Worcester MA, USA Since 2008: Integrated Systems Laboratory, ETH Zurich Director, Microelectronics Design Center Senior Scientist, group of Prof. Luca Benini Interests: Digital Integrated Circuits Cryptographic Hardware Design Design Flows for Digital Design Processor Design Open Source Hardware Integrated Systems Laboratory Introduction Cost Design Flow Area Speed Area/Speed Trade-offs Power Conclusions 3/74 What Will We Discuss Today? Introduction Cost Structure of Integrated Circuits (ICs) Measuring performance of ICs Why is it difficult? EDA tools should give us a number Area How do people report area? Is that fair? Speed How fast does my circuit actually work? Power These days much more important, but also much harder to get right Integrated Systems Laboratory The performance establishes the solution space Finally the cost sets a limit to what is possible Introduction Cost Design Flow Area Speed Area/Speed Trade-offs Power Conclusions 4/74 System Design Requirements System Requirements Functionality Functionality determines what the system will do Integrated Systems Laboratory Finally the cost sets a limit
    [Show full text]
  • Chap01: Computer Abstractions and Technology
    CHAPTER 1 Computer Abstractions and Technology 1.1 Introduction 3 1.2 Eight Great Ideas in Computer Architecture 11 1.3 Below Your Program 13 1.4 Under the Covers 16 1.5 Technologies for Building Processors and Memory 24 1.6 Performance 28 1.7 The Power Wall 40 1.8 The Sea Change: The Switch from Uniprocessors to Multiprocessors 43 1.9 Real Stuff: Benchmarking the Intel Core i7 46 1.10 Fallacies and Pitfalls 49 1.11 Concluding Remarks 52 1.12 Historical Perspective and Further Reading 54 1.13 Exercises 54 CMPS290 Class Notes (Chap01) Page 1 / 24 by Kuo-pao Yang 1.1 Introduction 3 Modern computer technology requires professionals of every computing specialty to understand both hardware and software. Classes of Computing Applications and Their Characteristics Personal computers o A computer designed for use by an individual, usually incorporating a graphics display, a keyboard, and a mouse. o Personal computers emphasize delivery of good performance to single users at low cost and usually execute third-party software. o This class of computing drove the evolution of many computing technologies, which is only about 35 years old! Server computers o A computer used for running larger programs for multiple users, often simultaneously, and typically accessed only via a network. o Servers are built from the same basic technology as desktop computers, but provide for greater computing, storage, and input/output capacity. Supercomputers o A class of computers with the highest performance and cost o Supercomputers consist of tens of thousands of processors and many terabytes of memory, and cost tens to hundreds of millions of dollars.
    [Show full text]
  • Microscope Systems and Their Application in Machine Vision
    Microscope Systems And Their Application in Machine Vision 1 1 Agenda • What is a microscope system? • Basic setup of a microscope • Differences to standard lenses • Parameters of microscope systems • Illumination options in a microscope setup • Special contrast enhancement techniques • Zoom components • Real-world examples What is a microscope systems? Greek: μικρός mikrós „small“; σκοπεῖν skopeín „observe“ Microscopes help us to look at small things, by enlarging them until we can see them with bare eyes or an image sensor. A microscope system is a system that consists of compatible components which can be combined into different configurations We only look at visible light microscopes We only look at digial microscopes no eyepiece but an image sensor in the object plane The optical magnification is ≥1 Basic setup of a microscope microscopes always show the same basic configuration: Sensor Tube lens: - Images onto the sensor - Defines the maximum sensor size Collimated beam path (infinity conjugated) Objective: - Images to infinity - Holds the system aperture - Defines the resolution of the system Object Differences to standard lenses microscope Finite-finite lens Sensor Sensor Collimated beam path (infinity conjugate) EnthältSystem apertureSystemblende Object Object Differences to standard lenses • Collimated beam path offers several options - Distance between objective and tube lens can be changed . Focusing by moving the objective without changing any optical parameter . Integration of filters, mirrors and beam splitters . Beam
    [Show full text]
  • Second Machine Age Or Fifth Technological Revolution? Different
    Second Machine Age or Fifth Technological Revolution? Different interpretations lead to different recommendations – Reflections on Erik Brynjolfsson and Andrew McAfee’s book The Second Machine Age (2014). Part 1 Introduction: the pitfalls of historical periodization Carlota Perez January 2017 Blog post: http://beyondthetechrevolution.com/blog/second-machine-age-or-fifth-technological- revolution/ This is the first instalment in a series of posts (and a Working Paper in progress) that reflect on aspects of Erik Brynjolfsson and Andrew McAfee’s influential book, The Second Machine Age (2014), in order to examine how different historical understandings of technological revolutions can influence policy recommendations in the present. Over the next few weeks, we will discuss the various criteria used for identifying a technological revolution, the nature of the current moment, and the different implications that stem from taking either the ‘machine ages’ or my ‘great surges’ point of view. We will look at what we see as the virtues and limits of Brynjolfsson and McAfee’s policy proposals, and why implementing policies appropriate to the stage of development of any technological revolution have been crucial to unleashing ‘Golden Ages’ in the past. 1 Introduction: the pitfalls of historical periodization Information technology has been such an obvious disrupter and game changer across our societies and economies that the past few years have seen a great revival of the notion of ‘technological revolutions’. Preparing for the next industrial revolution was the theme of the World Economic Forum at Davos in 2016; the European Union (EU) has strategies in place to cope with the changes that the current ‘revolution’ is bringing.
    [Show full text]
  • Photovoltaic Couplers for MOSFET Drive for Relays
    Photocoupler Application Notes Basic Electrical Characteristics and Application Circuit Design of Photovoltaic Couplers for MOSFET Drive for Relays Outline: Photovoltaic-output photocouplers(photovoltaic couplers), which incorporate a photodiode array as an output device, are commonly used in combination with a discrete MOSFET(s) to form a semiconductor relay. This application note discusses the electrical characteristics and application circuits of photovoltaic-output photocouplers. ©2019 1 Rev. 1.0 2019-04-25 Toshiba Electronic Devices & Storage Corporation Photocoupler Application Notes Table of Contents 1. What is a photovoltaic-output photocoupler? ............................................................ 3 1.1 Structure of a photovoltaic-output photocoupler .................................................... 3 1.2 Principle of operation of a photovoltaic-output photocoupler .................................... 3 1.3 Basic usage of photovoltaic-output photocouplers .................................................. 4 1.4 Advantages of PV+MOSFET combinations ............................................................. 5 1.5 Types of photovoltaic-output photocouplers .......................................................... 7 2. Major electrical characteristics and behavior of photovoltaic-output photocouplers ........ 8 2.1 VOC-IF characteristics .......................................................................................... 9 2.2 VOC-Ta characteristic ........................................................................................
    [Show full text]
  • COSC 6385 Computer Architecture - Multi-Processors (IV) Simultaneous Multi-Threading and Multi-Core Processors Edgar Gabriel Spring 2011
    COSC 6385 Computer Architecture - Multi-Processors (IV) Simultaneous multi-threading and multi-core processors Edgar Gabriel Spring 2011 Edgar Gabriel Moore’s Law • Long-term trend on the number of transistor per integrated circuit • Number of transistors double every ~18 month Source: http://en.wikipedia.org/wki/Images:Moores_law.svg COSC 6385 – Computer Architecture Edgar Gabriel 1 What do we do with that many transistors? • Optimizing the execution of a single instruction stream through – Pipelining • Overlap the execution of multiple instructions • Example: all RISC architectures; Intel x86 underneath the hood – Out-of-order execution: • Allow instructions to overtake each other in accordance with code dependencies (RAW, WAW, WAR) • Example: all commercial processors (Intel, AMD, IBM, SUN) – Branch prediction and speculative execution: • Reduce the number of stall cycles due to unresolved branches • Example: (nearly) all commercial processors COSC 6385 – Computer Architecture Edgar Gabriel What do we do with that many transistors? (II) – Multi-issue processors: • Allow multiple instructions to start execution per clock cycle • Superscalar (Intel x86, AMD, …) vs. VLIW architectures – VLIW/EPIC architectures: • Allow compilers to indicate independent instructions per issue packet • Example: Intel Itanium series – Vector units: • Allow for the efficient expression and execution of vector operations • Example: SSE, SSE2, SSE3, SSE4 instructions COSC 6385 – Computer Architecture Edgar Gabriel 2 Limitations of optimizing a single instruction
    [Show full text]
  • The History of Computing in the History of Technology
    The History of Computing in the History of Technology Michael S. Mahoney Program in History of Science Princeton University, Princeton, NJ (Annals of the History of Computing 10(1988), 113-125) After surveying the current state of the literature in the history of computing, this paper discusses some of the major issues addressed by recent work in the history of technology. It suggests aspects of the development of computing which are pertinent to those issues and hence for which that recent work could provide models of historical analysis. As a new scientific technology with unique features, computing in turn can provide new perspectives on the history of technology. Introduction record-keeping by a new industry of data processing. As a primary vehicle of Since World War II 'information' has emerged communication over both space and t ime, it as a fundamental scientific and technological has come to form the core of modern concept applied to phenomena ranging from information technolo gy. What the black holes to DNA, from the organization of English-speaking world refers to as "computer cells to the processes of human thought, and science" is known to the rest of western from the management of corporations to the Europe as informatique (or Informatik or allocation of global resources. In addition to informatica). Much of the concern over reshaping established disciplines, it has information as a commodity and as a natural stimulated the formation of a panoply of new resource derives from the computer and from subjects and areas of inquiry concerned with computer-based communications technolo gy.
    [Show full text]
  • Rapid Mapping of Digital Integrated Circuit Logic Gates Via Multi-Spectral Backside Imaging
    RAPID MAPPING OF DIGITAL INTEGRATED CIRCUIT LOGIC GATES VIA MULTI-SPECTRAL BACKSIDE IMAGING RONEN ADATO1;4;∗, AYDAN UYAR1;4, MAHMOUD ZANGENEH1;4, BOYOU ZHOU1;4, AJAY JOSHI1;4, BENNETT GOLDBERG1;2;3;4 AND M SELIM UNL¨ U¨ 1;3;4 Abstract. Modern semiconductor integrated circuits are increasingly fabricated at untrusted third party foundries. There now exist myriad security threats of malicious tampering at the hardware level and hence a clear and pressing need for new tools that enable rapid, robust and low-cost validation of circuit layouts. Optical backside imaging offers an attractive platform, but its limited resolution and throughput cannot cope with the nanoscale sizes of modern circuitry and the need to image over a large area. We propose and demonstrate a multi-spectral imaging approach to overcome these obstacles by identifying key circuit elements on the basis of their spectral response. This obviates the need to directly image the nanoscale components that define them, thereby relaxing resolution and spatial sampling requirements by 1 and 2 - 4 orders of magnitude respectively. Our results directly address critical security needs in the integrated circuit supply chain and highlight the potential of spectroscopic techniques to address fundamental resolution obstacles caused by the need to image ever shrinking feature sizes in semiconductor integrated circuits. 1. Introduction Semiconductor integrated circuits (ICs) are pervasive and essential components in virtually all modern devices, from personal computers, to medical equipment, to varied military systems and technologies. Their functionality is defined by a massive number (∼ 106 − 109 currently) of in- terconnected logic gates that correspond physically to various nanoscale doped regions, polysilicon and metal (usually copper and tungsten) structures.
    [Show full text]
  • Basic Design of MOSFET, Four-Phase, Digital Integrated Circuits
    Scholars' Mine Masters Theses Student Theses and Dissertations 1969 Basic design of MOSFET, four-phase, digital integrated circuits Earl Morris Worstell Follow this and additional works at: https://scholarsmine.mst.edu/masters_theses Part of the Electrical and Computer Engineering Commons Department: Recommended Citation Worstell, Earl Morris, "Basic design of MOSFET, four-phase, digital integrated circuits" (1969). Masters Theses. 5304. https://scholarsmine.mst.edu/masters_theses/5304 This thesis is brought to you by Scholars' Mine, a service of the Missouri S&T Library and Learning Resources. This work is protected by U. S. Copyright Law. Unauthorized use including reproduction for redistribution requires the permission of the copyright holder. For more information, please contact [email protected]. BASIC DESIGN OF MOSFET, FOUR-PHASE, DIGITAL INTEGRATED CIRCUITS By t_fL/ () Earl Morris Worstell , Jr./ J q¥- 2., A Thesis submitted to the faculty of THE UNIVERSITY OF MISSOURI - ROLLA in partial fulfillment of the requirements for the Degree of MASTER OF SCIENCE IN ELECTRICAL ENGINEERING Ro 11 a , M i sous ri 1969 Approved By i BASIC DESIGN OF MOSFET, FOUR-PHASE, DIGITAL INTEGRATED CIRCUITS by Earl M. Worstell, Jr. Abstract MOSFET is defined as metal oxide semiconductor field-effect transis­ tor. The integrated circuit design relates strictly to logic and switch­ ing circuits rather than linear circuits. The design of MOS circuits is primarily one of charge and discharge of stray capacitance through MOSFETS used as switches and active loads. To better take advantage of the possibilities of MOS technology, four­ phase (4¢) circuitry is developed. It offers higher speeds and lower power while permitting higher circuit density than does static or two­ phase (2cj>) logic.
    [Show full text]
  • Integrated Circuit Design Macmillan New Electronics Series Series Editor: Paul A
    Integrated Circuit Design Macmillan New Electronics Series Series Editor: Paul A. Lynn Paul A. Lynn, Radar Systems A. F. Murray and H. M. Reekie, Integrated Circuit Design Integrated Circuit Design Alan F. Murray and H. Martin Reekie Department of' Electrical Engineering Edinhurgh Unit·ersity Macmillan New Electronics Introductions to Advanced Topics M MACMILLAN EDUCATION ©Alan F. Murray and H. Martin Reekie 1987 All rights reserved. No reproduction, copy or transmission of this publication may be made without written permission. No paragraph of this publication may be reproduced, copied or transmitted save with written permission or in accordance with the provisions of the Copyright Act 1956 (as amended), or under the terms of any licence permitting limited copying issued by the Copyright Licensing Agency, 7 Ridgmount Street, London WC1E 7AE. Any person who does any unauthorised act in relation to this publication may be liable to criminal prosecution and civil claims for damages. First published 1987 Published by MACMILLAN EDUCATION LTD Houndmills, Basingstoke, Hampshire RG21 2XS and London Companies and representatives throughout the world British Library Cataloguing in Publication Data Murray, A. F. Integrated circuit design.-(Macmillan new electronics series). 1. Integrated circuits-Design and construction I. Title II. Reekie, H. M. 621.381'73 TK7874 ISBN 978-0-333-43799-5 ISBN 978-1-349-18758-4 (eBook) DOI 10.1007/978-1-349-18758-4 To Glynis and Christa Contents Series Editor's Foreword xi Preface xii Section I 1 General Introduction
    [Show full text]
  • Application Notes
    U-118 ul B UNITRODE APPLICATION NOTES NEW DRIVER ICs OPTIMIZE HIGH SPEED POWER MOSFET SWITCHING CHARACTERISTICS Bill Andreycak UNITRODE Integrated Circuits Corporation, Merrimack, N.H. ABSTRACT systems and, in the process opened the way to new performance Although touted as a high impedance, voltage controlled device, levels and new topologies. prospective users of Power MOSFETs soon learn that it takes high A major factor in this regard is the potential for extemely fast drive currents to achieve high speed switching. This paper switching. Not only is there no storage time inherent with MOSFETs, describes the construction techniques which lead to the parasitic but the switching times can be user controlled to suit the application. effects which normally limit FETperformance, and discusses several This or course, requires that the designer have an understanding approaches useful to improve switching speed. A series of drivers of the switching dynamics inherent in these devices. Even though ICs, the UC3705, UC3706, UC3707 and UC3709 are featured and power MOSFETs are majority carrier devices, the speed at which their performance is highlighted. This publication supercedes they can switch is dependent upon many parameters and parasitic Unitrode Application Note U-98, originally written by R. Patel and effects related to the device’s construction. R. Mammano of Unitrode Corporation. THE POWER MOSFET MODEL INTRODUCTION An understanding of the parasitic elements in a power MOSFET can An investigation of Power MOSFET construction techniques will be gained by comparing the construction details of a MOSFET with identify several parasitic elements which make the highly-touted its electrical model as shown in Figure 1.
    [Show full text]