Previous Page  14 / 58 Next Page
Information
Show Menu
Previous Page 14 / 58 Next Page
Page Background

edfas.org

ELECTRONIC DEVICE FAILURE ANALYSIS | VOLUME 18 NO. 3

14

(a)

(b)

Figure 7 presents a matrix defining the different

variants of compare vector manipulation and their cor-

responding stringency. As an illustration, Fig. 8(a) and

(b) show the case of the most- and least-stringent sce-

narios, respectively. The compare vectors highlighted in

red are failing on a bad IC. Following the most-stringent

match criteria, all these compare vectors are inverted in

the technical pattern. This is the case described in the

beginning of this section. To demonstrate the method-

ology, the same experiment that was performed earlier

following the hardware approach is repeated, but this

time applying the software approach. The EeLADA

signals obtained are similar to Fig. 4(b). This validates

the method.

Consider the least-stringent case next, using another

experiment based on some random logic of an IC. The

compare vectors are masked in the technical pattern

according to a failed IC’s failure signature, and the EeLADA

signals acquired on a passing IC are shown in Fig. 9(b).

Figure 9(a) shows the conventional LADA signals (pass-

to-fail state transition) acquired using the original test

pattern for comparison. Some signals appear tobemissing

Fig. 9

(a) Conventional LADA signals. (b) EeLADA based on

least-stringent technical test pattern

(a)

(b)

Fig. 10

EeLADA signal overlay images based on (a) first

fail cycle and (b) last fail cycle invert technical test

pattern. The black dot denotes the location of a

programmed defect. Arrow points to signal.