{br} STUCK with your assignment? {br} When is it due? {br} Get FREE assistance. Page Title: {title}{br} Page URL: {url}
UK: +44 748 007-0908, USA: +1 917 810-5386 [email protected]

QUESTION

Chip Set Security  

Supply Chain Security

Describe security vulnerabilities for manufacture and distribution of chipset supplies

 

 Electronic copy available at: http://ssrn.com/abstract=2155540

 

 INDIA: a fab-less wonder: case of SMDP

A.S.Rao

[email protected]

Abstract

From IPod to I Pad, millions of electronics goods have rolled out of China, the global manufacturing hub. India’s share of global electronic product market is less than 3%. Taiwan had $72 billion of investment in Fabs, where as India stands out as one the aspiring nation with no Fab. Yet, top 25 global semiconductor companies now have a presence in India through their captive centers, working in cutting edge technology nodes. Among the top twenty U.S. semiconductor companies, only two have not established a design center in India. While, Government of India is not successful in attracting manufacturing, appear to have made a significant contribution by focusing on talent supply. Department of Information Technology (DIT) implemented Special Manpower Development Programme in the area of VLSI design and related software (SMDP) and trained over 20,000 engineers. This paper is about SMDP as case study and is based on Impact Assessment of SMDP-II assigned by DIT on IIMA.

Prior to 1980s, the semiconductor industry was vertically integrated. Semiconductor companies owned and operated their own silicon wafer fabrication facilities and developed their own process technology for manufacturing their chips. These companies also carried out the fabrication, assembly and testing of their chips. Innovative chip design start-ups and Taiwan’s business model led to the birth of foundry industry.

South Korea and Taiwan

In Tiger Technology: Creation of a Semiconductor Industry in East Asia John A. Mathews and Dong-Sung Cho gave a comparative account of the support given by the Korean and Taiwanese states to their local semiconductor producers. South Korean government considered semiconductors vital to the modernization of domestic industries and manufacturing consumer electronics. The state used Korea’s large conglomerates, or chaebol, as a vehicle to move into the industry through direct brokerage with different firms and by offering substantial financial assistance. Taiwanese government did not have the convenience of large conglomerates that could be directed towards semiconductor production. Instead, the government sponsored initiatives to develop a domestic industry through the establishment of research and production capabilities before the creation of private firms.

At the same time, re-organization of production in the global economy also played an equally integral part for the transformation of East Asia and the development of domestic semiconductor industries in South Korea and Taiwan. In `Globalisation of High Technology Production’, Jeffery Henderson places the focus of analysis on the development of networks of production in the global semiconductor industry. He asserts that these production networks developed after transnational corporations, such as Fairchild and Texas Instruments, found it more cost effective to spread different stages Electronic copy available at: http://ssrn.com/abstract=2155540

 

of production across national borders due to labor costs, looser governmental regulation, or more efficient production methods. He points out that the first off-shoring of production occurred in East Asia by American transnational corporations. From these networks, the diffusion of technology and knowledge to fledgling Korean and Taiwanese firms provided a low level of production that was continuously upgraded until globally competitive firms emerged. According to him, the inclusion of South Korea and Taiwan within this network of production and the exclusion of other semiconductor-producing nations is a primary reason for their success.

Foundry production is the largest segment of Taiwan’s domestic industry; in 1999, foundry related business accounted for almost 60 percent of Taiwan’s total industrial revenue. Two largest foundries in the world, Taiwanese Semiconductor Manufacturing Company (TSMC) and United Microelectronics Company(UMC) dominate the Taiwanese semiconductor industry. Combined, these two companies possess 70 percent of the global market.

Fabs in India

India’s only foundry, Semiconductor Complex Limited (SCL) was set up in 1997 as Public Sector Undertaking under Department of Electronics with an investment of $100 million for a 6 inch wafer fabrication. The facility and capability remained marginal and finally in 2005 it was handed over to Department of Space.

Fabless chip manufacturing

Gradually, Foundries emerged as the cornerstone of the fabless model – providing a non-competitive manufacturing partner for fabless companies. Qualcomm tops the list of Fabless suppliers. The ranking of fabless chip companies continues to be dominated by U.S. companies that occupy eight of the top ten slots by sales volume. Europe is well represented in the lower ranks with Dialogue growing strongly with 77 per cent annual growth, according to IC Insights. Japan has only one company in the ranks of the top 25 fabless chip companies, MegaChips Corp. (Osaka, Japan), a developer of chips for games makers, camera companies, cell phone makers and security companies. Taiwan is represented Media Tek, MStar, Novatek, Realtek and Himax. China has some of the fastest growing firm like Spreadtrum growing at 95%.

India has no presence either in integrated firms with fab or fab less chip firms. However, segmentation of design work has provided an opening to India, in the form of design firms.

Fabless semiconductor design

The development and manufacturing of chips involve three primary activities in the value chain: design, fabrication, test and assembly. During design, the desired electronic circuits progress through a series of abstract representations of increasing detail. During fabrication, the circuits of the chips are built up on the surface of a flat, round silicon wafer in successive layers. Assembly is, typically, the process of cutting the wafer into individual chips (or die), which can number in the thousands, depending on die size, and packaging the delicate chip in a protective shell that includes connections to other components.

The economic characteristics of each step of the process differ significantly. Design is skill intensive, and requires expensive EDA (electronic design automation) software, which is typically licensed per design engineer. Fabrication requires a huge fixed investment (currently on the order of $2 billion) to build a plant (called a fab) that holds a wide variety of expensive equipment and that meets extreme requirements of cleanliness. Assembly also requires expensive equipment, but the overall costs of plant

and equipment are much lower than for the fab, as are the average skill requirements. Overall, worker skill requirements go down along the value chain (i.e., design is more skill-intensive than manufacturing, which is more skill-intensive than assembly).

All parts of chip design and development, from specification to finished chips, can be done by different teams, either in-house or outsourced, and either locally or offshore. The easiest part of chip design to offshore or outsource is physical design because it is a relatively standardized task. It is also the least sensitive part of design in terms of revealing the customer’s intellectual property. Low-cost design engineering resources can be tapped through international outsourcing, although to date most design outsourcing by U.S. companies takes place domestically. The leading suppliers of design services worldwide are the leading design automation software vendors, Cadence Design Systems, Synopsys, and Mentor graphics. Their annual services

revenue is about $300 million out of a total outsourced design market estimated at $2.5 billion. As this suggests, the remaining market is highly fragmented.

Case of “Special Manpower Development Programme” (SMDP)

Unlike East Asian nations, Indian government intervention was more focused on manpower development. A strong thrust was given to Microelectronics, including VLSI, by MHRD in the early and mid 1980’s. This led to some highly trained graduates in this area in the job market. It is likely that this attracted the first design companies to India in the mid and late-1980’s. This led to a further interest and increase in VLSI courses in the country, and a virtuous cycle ensued. A notable role was played by the Department of Information Technology, which launched 2 phases of the “Special Manpower Development Programme” (SMDP) in 1998 and 2004.

A long term perspective was taken by the department to develop skilled manpower to design VLSI and related software. In the first phase 7 institutes were selected, 5 IITs, IISc and CEERI. They were equipped with latest EDA tools, provided for recruitment of Lab engineer to anchor student projects and liberal grants given to faculty to carry out research. In the 2nd phase 25 additional institutes, mostly NITs were selected. The first 7 institutes were categorized as Resource Centers (RC) with an additional responsibility to mentor the new batch of 25 institutes, called Participating Institutes (PI). Model curriculum was developed and RCs under Instruction Enhancement Programme (IEP) trained 522 faculty/ lab engineers of PI.

Under SMDP-II, a total of 20,114 engineering graduates in Electronics/ Communication/ Computer Science/ Instrumentation etc had taken a graduate level course in VLSI design. At PG level, 4,395 students had taken at least two courses in various aspects of VLSI Design and CAD. An addition 2,701 PG students had their specialization at ME/MTech in VLSI design & CAD. Further PhDs were awarded to 255 researchers in various aspects of VLSI design & CAD.

SMDP-II

(VLSI Design)

 

20114 Engineering Graduates (a course)

4395 Post Graduates (at least 2 courses)

2701 Post Graduate Students (Specialization)

255 PhD Researchers

 

According to the ISA-Evalueserve study 2008, 70–75% of semiconductor research activities are concentrated in the IITs, IISc and in BITS, Pilani. Nearly 78% of the projects are related to chip design and 22% are in the fields of testing and verification. Around 47% of the projects are in the areas of analog and mixed signals. Of the IEEE papers published between 2003 and 2007, Indian institutes show maximum activity in the process/manufacturing segment (47%), followed by chip design (26%) and embedded software (13%).

Availability of skilled manpower enabled industry to take up value added design work.

Finally it attracted MNCs to set up R&D Centers in India. Among the top twenty U.S. semiconductor companies, only two have not established a design center in India. This movement to establish design centers in India is quite recent, and for most companies is in a very early stage. The size of the operations varies widely, from about several thousand engineers at Intel and TI to fewer than 100 at smaller companies.

India Design Centers of the 20 Largest US Chip Companies Company

Global rank(2005)

No of employees (2005)

Intel, Bangalore

1

2700

TI, Bangalore

3

1100

Freescale, Delhi

12

780

AMD, Bangalore

16

120

IBM, Bangalore

17

100

QUALCOMM, Bangalore

18

150

Broadcom, Bangalore

23

150

Analog Devices, Bangalore

24

100

SanDisk, Bangalore

26

60

National, Bangalore

27

25

Agilent, Delhi

30

50

ATI, Hyderabad

31

100

Maxim, Bangalore

35

25

Agere, Bangalore

36

250

Xilinx, Hyderabad

37

75

Marvell, Bangalore

38

75

 

 

 

 

Subject Law and governance Pages 6 Style APA

Answer

Security Vulnerabilities for Manufacture and Distribution of Chipset Supplies

Supply chains are characterized with a wide variety of threats and vulnerabilities. Meltdown (2018) reasons that anything associated with technology often has some vulnerability and risks linked with it owing to the possible variables associated with technology. Several flaws have lately been noted with CPUs/processors, components that power the computing capability of everything ranging from desktops to internet-of things (IoT), and from cloud-enabled servers to phones (Lemos, 2018). Chipsets function as the brain of everything that creates several susceptibilities since when they are added to other knowhow, they create loopholes (Sahoo et al., 2017). A common vulnerability is referred to as spectre. Spectre creates susceptibilities by allowing hackers to enter machines’ users through the machines’ chipsets and permitting them to see information in the machines’ memories (Lemos, 2018). According to Meltdown (2018), spectre is dangerous since there are no traces of any kind of attack taking place. With regard to scepter, security susceptibilities are limitless since technology continues to change, and users will continue blaming manufacturers and distributors for security flaws in products.  Additionally, encryption plays a crucial role owing to how much data a chipset has admittance to.

Faulty defenses are also security vulnerabilities for distribution and manufacture of chipset supplies. Faulty defenses, according to Sahoo et al. (2017), connote porous defense actions that fail to safeguard an organization or machine user from intruders. Among the defense mechanisms currently available are authentication, encryption, and authorization (Lemos, 2018). Whereas proper employment of these mechanisms has been shown to protect organizations and individuals from cyber-attacks, poor implementation can create security illusion that can expose individuals or organizations to great threats (Sahoo et al., 2017). Weak network monitoring, poor authentication management, substandard recovery and back-up, end-user misuses and/or errors, and insufficient end-point security are serious security vulnerabilities to manufacture and distribution of chipset supplies.

Another category of security vulnerabilities for distribution and manufacture of chipset are insecure connections between elements. When there is insecure interaction between components of a network or system, an individual or organization is exposed to several threats, like open redirect, SQL injection, and cross-site, among other security vulnerabilities (Meltdown, 2018).

To safeguard machine users from such security vulnerabilities, therefore, there is a need to pay utmost attention to the manner in which data flows across an organization’s systems and networks.

 

 

 

 

 

 

 

.

References

 

Related Samples

WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, how can I help?