Previous Page  5 / 66 Next Page
Information
Show Menu
Previous Page 5 / 66 Next Page
Page Background

edfas.org

5

ELECTRONIC DEVICE FAILURE ANALYSIS | VOLUME 18 NO. 4

the silicon backside while the DUT is exercised. The laser

beam reflects from the interface between the backside

silicon and the active regions, such as drain and channel.

The reflected laser beamhas amodulated amplitude and

phase. Because the modulated amplitude is dependent

on the transistor state, namely the electrical field in the

drain area and/or the free carrier density in the channel,

extraction of the modulated amplitude of the reflected

laser beam indicates the states of the transistor, onwhich

the laser beam is focused. Figure 1 is a simplified LVP sche-

matic. Initially, the application of LVPwasmainly in design

debug and device characterization, rather than fault isola-

tion. This is because the waveforms obtained with LVP at

any given time come from a particular point, namely one

transistor or one node. To search for a defective transistor

or node, it is necessary to probe each transistor or node

one by one. It is time-consuming.

Rather than acquiring data at a single point on a DUT

in the time domain, LVI

[7-9]

collects data in the frequency

domain from numerous points in the field of view on a

DUT. The LVI technique rasters a laser beamacross an area

of a DUT through the backside silicon. At each point, the

reflected laser beam is modulated in both amplitude and

phase at the switching frequency of the transistor under

the area on which the laser is focused. The modulated

reflected laser beam shoots on a photodetector with

transimpedance and radio-frequency amplifiers, and then

amodulated electrical signal is generated. After spectrum

analysis, a signal with a particular frequency is generated.

The signal synchronizes with the laser scan and forms an

LVI image, overlappingwith a normal optical image of the

laser scanning area. Figure 2 is an example of an LVI image,

showing the data and clock signals. Because LVI collects

data in the frequency domain, it is necessary to map the

transistor switching at a particular frequency. It is conve-

nient to run the clock and data at different frequencies so

that both the clock and data paths in the scan chain can

be individually and simultaneously traced. Thus, it quickly

became apowerful fault isolation technique for scan chain

failures. With subsequent LVP, the defect for a scan chain

failure can be narrowed down to an inverter or a node.

IN-LINE SCAN CHAIN LOGIC MACRO

DESCRIPTION

The in-line scan chain logic macro can first be tested

at metal-4 layer for early yield learning. It is comprised

of several scan chains organized in 16 blocks. Each block

has six packs, and each pack has six scan chains, which

share the same clock buffer and preload data buffer (Fig.

3). Each scan chain group/block is composed of a differ-

ent type of level-sensitive scan design and general scan

Fig. 2

Example of LVI image for a scan chain: blue for data

signal, yellowfor clock signal, and redarrows for data

propagation direction

Fig. 3

Diagram of scan chains in a pack showing the latches at the same position for six scan chains in a pack that share the

same preload data buffer and clock buffer