Vintage Fairchild IC Proves Tough To Decap

You’d think that something called “white fuming nitric acid” would be more than corrosive enough to dissolve just about anything. Heck, it’s rocket fuel – OK, rocket fuel oxidizer – and even so it still it wasn’t enough to pop the top on this vintage Fairchild μL914 integrated circuit, at least not without special measures.

As [John McMaster], part of the team that analyzed the classic dual 2-input NOR gate RTL chip from the 1960s, explains it, decapping modern chips is a straightforward if noxious process. Generally a divot is milled into the epoxy, providing both a reservoir for the WFNA and a roughened surface for it to attack. But the Fairchild chip, chosen for dissection for the Maker Faire Bay Area last week specifically because the features on the die are enormous by modern standards, was housed in an eight-lead TO-99 case with epoxy that proved nigh invulnerable to WFNA. [John] tried every chemical and mechanical trick in the book, going so far as to ablate epoxy with a Nd:YAG laser. He eventually got the die exposed, only to discover that it was covered with silicone rather than the silicon dioxide passivation layer of modern chips. Silicone can be tough stuff to remove, and [John] resorted to using lighter fluid as a solvent and a brush with a single bristle to clean up the die.

We applaud the effort that this took, which only proves that decapping is more art than science sometimes. And the results were fabulous; as Hackaday editor-in-chief [Mike Szczys] notes, the decapping led to his first real “a-ha moment” about how chips really work.

Continue reading “Vintage Fairchild IC Proves Tough To Decap”

Ken Shirriff Explains His Techniques For Reverse Engineering Silicon

When it comes to reverse engineering silicon, there’s no better person to ask than Ken Shirriff. He’s the expert at teasing the meaning out of layers of polysilicon and metal. He’s reverse engineered the ubiquitous 555 timer, he’s taken a look at the inside of old-school audio chips, and he’s found butterflies in his op-amp. Where there’s a crazy jumble of microscopic wires and layers of silicon, Ken’s there, ready to do the teardown.

For this year’s talk at the Hackaday Superconference, Ken walked everyone through the techniques for reverse engineering silicon. Surprisingly, this isn’t as hard as it sounds. Yes, you’ll still need to drop acid to get to the guts of an IC (of course, you could always find a 555 stuck in a metal can, but then you can’t say ‘dropping acid’), but even the most complex devices on the planet are still made of a few basic components. You’ve got n-doped silicon, p-doped silicon, and some metal. That’s it, and if you know what you’re looking for — like Ken does — you have all the tools you need to figure out how these integrated circuits are made.

Continue reading “Ken Shirriff Explains His Techniques For Reverse Engineering Silicon”

Lessons In Disposable Design From A Cheap Blinky Ball

Planned obsolescence, as annoying as it is when you’re its victim, still has to be admired. You can’t help but stand in awe of the designer who somehow managed to optimize a product to live one day longer than its warranty period. Seriously, why is it always the next day?

The design of products that are never intended to live long enough to go obsolete must be similarly challenging, and [electronupdate] did a teardown of a cheap LED blinky toy to see what’s involved. You’ve no doubt seen these seizure-triggering silicone balls before, mostly at checkout counters and the like where they’re sold at prices many hundreds of times what it took to make them. This particular device, which seems representative of the species, has two bright LEDs, a small controller chip, a trio of button cells for power, and a springy switch to activate it. All this is mounted to a cheap scrap of phenolic resin PCB, with the controller chip and one of the LEDs covered by a blob of clear epoxy.

This teardown one-ups most others, as [electronupdate] disrobes the chip and points a microscope at the die; the video below shows just how few transistors are employed and proposes a likely circuit. Everything about this ball just oozes cheapness, and it’s likely these things cost essentially nothing to build. Which makes sense for something destined for the landfill within a week or so.

Yes, this annoying blinky-thing is low-end garbage, but there are still design lessons to be learned from it. Anything that’s built for a broad market has to be built to a price point, and understanding those constraints is important to understanding how planned obsolescence works.

Continue reading “Lessons In Disposable Design From A Cheap Blinky Ball”

Cracking The Case Of Capcom’s CPS2 Security

We love a good deep-dive on a specialized piece of technology, the more obscure the better. You’re getting a sneak peek into a world that, by rights, you were never meant to know even existed. A handful of people developed the system, and as far as they knew, nobody would ever come through to analyze and investigate it to find out how it all went together. But they didn’t anticipate the tenacity of a curious hacker with time on their hands.

[Eduardo Cruz] has done a phenomenal job of documenting one such system, the anti-piracy mechanisms present in the Capcom CPS2 arcade board. He recently wrote in to tell us he’s posted his third and final entry on the system, this time focusing on figuring out what a mysterious six pin header on the CPS2 board did. Hearing from others that fiddling with this header occasionally caused the CPS2 board to automatically delete the game, he knew it must be something important. Hackaday Protip: If there’s a self-destruct mechanism attached to it, that’s probably the cool part.

He followed the traces from the header connector, identified on the silkscreen as C9, back to a custom Capcom IC labeled DL-1827. After decapping the DL-1827 and putting it under the microscope, [Eduardo] made a pretty surprising discovery: it wasn’t actually doing anything with the signals from the header at all. Once the chip is powered up, it simply acts as a pass-through for those signals, which are redirected to another chip: the DL-1525.

[Eduardo] notes that this deliberate attempt at obfuscating which chips are actually connected to different headers on the board is a classic trick that companies like Capcom would use to try to make it harder to hack into their boards. Once he figured out DL-1525 was what he was really after, he was able to use the information he gleaned from his earlier work to piece together the puzzle.

This particular CPS2 hacking journey only started last March, but [Eduardo] has been investigating the copy protection systems on arcade boards since 2014.

[Thanks to Arduino Enigma for the tip.]

Fail Of The Week: The Semiconductor Lapping Machine That Can’t Lap Straight

It seemed like a good idea to build a semiconductor lapping machine from an old hard drive. But there’s just something a little off about [electronupdate]’s build, and we think the Hackaday community might be able to pitch in to help.

For those not into the anatomy and physiology of semiconductors, getting a look at the inside of the chip can reveal valuable information needed to reverse engineer a device, or it can just scratch the itch of curiosity. Lapping (the gentle grinding away of material) is one way to see the layers that make up the silicon die that lies beneath the epoxy. Hard drives designed to spin at 7200 rpm or more hardly seem a suitable spinning surface for a gentle lapping, but [electronupdate] just wanted the platter for its ultra-smooth, ultra-flat surface.

He removed the heads and replaced the original motor with a gear motor and controller to spin the platter at less than 5 rpm. A small holder for the decapped die was fashioned, and pinched between the platter hub and an idler. It gently rotates the die against the abrasive-covered platter as it slowly revolves. But the die wasn’t abrading evenly. He tried a number of different fixtures for the die, but never got to the degree of precision needed to see through the die layer by layer. We wonder if the weight of the die fixture is deflecting the platter a bit?

Failure is a great way to learn, if you can actually figure out where you went wrong. We look to the Hackaday community for some insight. Check out the video below and sound off in the comments if you’ve got any ideas.

Continue reading “Fail Of The Week: The Semiconductor Lapping Machine That Can’t Lap Straight”

Fake Ram: Identifying A Counterfeit Chip

[Robert Baruch‏] had something strange on his hands. He had carefully decapped 74LS189 16×4 static RAM, only to find that it wasn’t a RAM at all. The silicon die inside the plastic package even had analog elements, which is not what one would expect to find in an SRAM. But what was it? A quick tweet brought in the cavalry, in the form of chip analysis expert [Ken Shirriff].

[Ken] immediately realized the part [Robert] had uncovered wasn’t a 74 series chip at all. The power and ground pins were in the wrong places. Even the transistors were small CMOS devices, where a 74 series part would use larger bipolar transistors. The most glaring difference between the mystery device and a real LS819 was the analog elements. The mystery chip had a resistor network, arranged as an R-2R ladder. This configuration is often used as a simple Digital to Analog Converter (DAC).

Further analysis of the part revealed that the DAC was driven by a mask ROM that was itself indexed using a linear feedback shift register. [Ken] used all this information to plot out the analog signal the chip would generate. It turned out to be a rather sorry looking sine wave.

The mystery part didn’t look like any function generator or audio chip of the era. [Ken] had to think about what sort of commodity part would use lookup tables to generate an audio waveform. The answer was as close as his telephone — a DTMF “touch tone” generator, specifically a knockoff of a Mostek MK5085.

Most investigators would have stopped there. Not [Ken] though. He delved into the construction and function of the DTMF generator. You can find the full analysis on his site. This isn’t [Ken’s] first rodeo with decapped chips. He’s previously examined the Intel 8008 and presented a talk on silicon reverse engineering at the 2016 Hackaday Superconference. [Robert] has also shown us how to pop the top of classic ceramic integrated circuits.


What Lies Within: SMT Inductor Teardown

Ever wonder what’s inside a surface-mount inductor? Wonder no more as you watch this SMT inductor teardown video.

“Teardown” isn’t really accurate here, at least by the standard of [electronupdate]’s other component teardowns, like his looks inside LED light bulbs and das blinkenlights. “Rubdown” is more like it here, because what starts out as a rather solid looking SMT component needs to be ground down bit by bit to reveal the inner ferrite and copper goodness. [electronupdate] embedded the R30 SMT inductor in epoxy and hand lapped the whole thing until the windings were visible. Of course, just peeking inside is never enough, so he set upon an analysis of the inductor’s innards. Using a little careful macro photography and some simple image analysis, he verified the component’s data sheet claims; as an aside, is anyone else surprised that a tiny SMT component can handle 30 amps?

Looking for more practical applications for decapping components? How about iPhone brain surgery?

Continue reading “What Lies Within: SMT Inductor Teardown”