Test and Failure Analysis Implications of a Novel Inter-Bit Dependency in a Non-Volatile Memory

Author(s):  
D. Boyne ◽  
J. Goertz ◽  
D. Parsons

Abstract Failure analysis of non-volatile memory arrays can be complicated by the history of bits elsewhere in the array. This generally is in contrast to volatile memories, in which the state of all bits can quickly be reset by over-writing the bits, or by simply removing power from the array. On one of our products, EEPROM bits failed to program if certain patterns of bits were programmed elsewhere in the EEPROM array. During programming, high voltages (>18 volts) are present within the EEPROM array. Such voltage levels caused a narrow field oxide region to break down, thereby pulling down the programming voltage and preventing the successful programming of EEPROM transistors. What complicated the analysis, however, was that the breakdown only occurs if a checkerboard pattern is being programmed in one part of the array, while specific other EEPROM bits had previously been programmed elsewhere in the array. Until the failure mechanism was well understood, electrical screens were difficult to implement, because they typically do not account for complicated interactions between bits. This is especially true for nonvolatile memories, for which test time costs often prohibit the use of complicated test patterns with improved test coverage. This paper reviews the failure analysis, and proceeds to highlight the importance of knowing the contents of nonvolatile arrays prior to performing either failure analysis or automated testing on such an array. The case study therefore applies to both test and failure analysis engineers.

2020 ◽  
Vol 69 (4) ◽  
pp. 1387-1397
Author(s):  
Mohammad Nasim Imtiaz Khan ◽  
Swaroop Ghosh

Author(s):  
DILEEP KUMAR

This paper presents an upcoming nonvolatile memories (NVM) overview. Non-volatile memory devices are electrically programmable and erasable to store charge in a location within the device and to retain that charge when voltage supply from the device is disconnected. The non-volatile memory is typically a semiconductor memory comprising thousands of individual transistors configured on a substrate to form a matrix of rows and columns of memory cells. Non-volatile memories are used in digital computing devices for the storage of data. In this paper we have given introduction including a brief survey on upcoming NVM's such as FeRAM, MRAM, CBRAM, PRAM, SONOS, RRAM, Racetrack memory and NRAM. In future Non-volatile memory may eliminate the need for comparatively slow forms of secondary storage systems, which include hard disks.


Author(s):  
Hoang-Yen To ◽  
Dat Nguyen ◽  
Clyde Dunn ◽  
Detric Davis

Abstract The flash considered for failure analysis in this paper is a non volatile memory with a NOR architecture in the array and a stacked gate for the bit cell. The flash failure was from data gain reported from various stages and at different temperatures after leaving the wafer fabrication. The failure can be single bit failure (SBF) or multiple bit failure (MBF). The FA process is comprised of two steps termed electrical failure analysis (EFA) and physical failure analysis (PFA). This paper discusses the method to differentiate failure modes and the efforts of fault isolation. Micro probing and nano probe characterization were important in the understanding of the failure mechanism. As seen in the EFA/PFA section, the reported SBF/MBF failures were actually due to a defect in the Mux and not at the bit cell.


Author(s):  
Xiang-Dong Wang ◽  
Arnold Yazzie ◽  
John Buchert ◽  
Laurel Will ◽  
Ping Wang ◽  
...  

Abstract Embedded non-volatile memory (NVM) technologies are used in almost all areas of semiconductor chip applications, as it becomes increasingly vital to retain information when the electronics power is off. Nano-probing techniques, such as atomic force probe (AFP), allow us to access individual devices at contact or via levels and characterize the details as much as possible before a decision can be made for physical analysis. This paper reports the application of AFP to characterize each individual bit at contact level or individual column at via1 level. It presents two cases to identify the failures encountered in fabricated embedded NVM: column-column leakage and single bit erase failure. The first case shows that silicide residual could cause column to column leakage by creating electrical path between active areas of adjacent columns, while the second case shows that single bit failures due to low erase current can be recovered with repeated program/erase cycle.


Author(s):  
Odile Moreau

This chapter explores movement and circulation across the Mediterranean and seeks to contribute to a history of proto-nationalism in the Maghrib and the Middle East at a particular moment prior to World War I. The discussion is particularly concerned with the interface of two Mediterranean spaces: the Middle East (Egypt, Ottoman Empire) and North Africa (Morocco), where the latter is viewed as a case study where resistance movements sought external allies as a way of compensating for their internal weakness. Applying methods developed by Subaltern Studies, and linking macro-historical approaches, namely of a translocal movement in the Muslim Mediterranean, it explores how the Egypt-based society, al-Ittihad al-Maghribi, through its agent, Aref Taher, used the press as an instrument for political propaganda, promoting its Pan-Islamic programme and its goal of uniting North Africa.


2010 ◽  
Vol 1 (1) ◽  
pp. 75-93
Author(s):  
Jessica Moberg

Immediately after the Second World War Sweden was struck by a wave of sightings of strange flying objects. In some cases these mass sightings resulted in panic, particularly after authorities failed to identify them. Decades later, these phenomena were interpreted by two members of the Swedish UFO movement, Erland Sandqvist and Gösta Rehn, as alien spaceships, or UFOs. Rehn argued that ‘[t]here is nothing so dramatic in the Swedish history of UFOs as this invasion of alien fly-things’ (Rehn 1969: 50). In this article the interpretation of such sightings proposed by these authors, namely that we are visited by extraterrestrials from outer space, is approached from the perspective of myth theory. According to this mythical theme, not only are we are not alone in the universe, but also the history of humankind has been shaped by encounters with more highly-evolved alien beings. In their modern day form, these kinds of ideas about aliens and UFOs originated in the United States. The reasoning of Sandqvist and Rehn exemplifies the localization process that took place as members of the Swedish UFO movement began to produce their own narratives about aliens and UFOs. The question I will address is: in what ways do these stories change in new contexts? Texts produced by the Swedish UFO movement are analyzed as a case study of this process.


Author(s):  
Masashi TAWADA ◽  
Shinji KIMURA ◽  
Masao YANAGISAWA ◽  
Nozomu TOGAWA

Author(s):  
Erick Kim ◽  
Kamjou Mansour ◽  
Gil Garteiz ◽  
Javeck Verdugo ◽  
Ryan Ross ◽  
...  

Abstract This paper presents the failure analysis on a 1.5m flex harness for a space flight instrument that exhibited two failure modes: global isolation resistances between all adjacent traces measured tens of milliohm and lower resistance on the order of 1 kiloohm was observed on several pins. It shows a novel method using a temperature controlled air stream while monitoring isolation resistance to identify a general area of interest of a low isolation resistance failure. The paper explains how isolation resistance measurements were taken and details the steps taken in both destructive and non-destructive analyses. In theory, infrared hotspot could have been completed along the length of the flex harness to locate the failure site. However, with a field of view of approximately 5 x 5 cm, this technique would have been time prohibitive.


Sign in / Sign up

Export Citation Format

Share Document