Skip to main content

2018 | OriginalPaper | Buchkapitel

6. Hardware Trojans and Piracy of PCBs

verfasst von : Anirudh Iyengar, Swaroop Ghosh

Erschienen in: The Hardware Trojan War

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Malicious modification of a design in a foundry or design house (via hardware Trojan attacks) and counterfeiting attacks are intended to modify/disrupt and syphon information and profits from the host manufacturer. While these attacks have emerged as major security concerns for integrated circuits (ICs), a similar vulnerability, at a higher level, i.e., printed circuit board (PCB), can be more easily realized due to the highly distributed supply chain. Furthermore, the increasing complexity of modern PCBs and growing reliance on third-party entities make Trojan and counterfeiting attacks in PCBs highly feasible. In this chapter, we first describe the possible attack models and demonstrate instances of hardware Trojan insertion in fabricated PCBs that can either cause malfunction or leak secret information. We review the effectiveness of traditional PCB test methodologies in detecting these Trojans. We also present possible protection approaches against such attacks including a reverse engineering-based detection approach and a low-overhead preventive design solution. We then describe how extending integrated circuits (ICs) authentication techniques such as physically unclonable function (PUF) to isolate cloned PCBs can be realized. Additionally, analysis of various sources of variations in PCB and qualitatively studying the quality metrics to evaluate the PCB PUFs are also performed. Lastly, we describe few flavors of PCB PUFs by exploiting the manufacture-induced process variations.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat R.S. Chakraborty, S. Narasimhan, S. Bhunia, Hardware Trojan: Threats and Emerging Solutions. in Proceedings of the IEEE International HLDVT Workshop, pp. 166–171, 2009 R.S. Chakraborty, S. Narasimhan, S. Bhunia, Hardware Trojan: Threats and Emerging Solutions. in Proceedings of the IEEE International HLDVT Workshop, pp. 166–171, 2009
3.
Zurück zum Zitat Y. Alkabani, F. Koushanfar, Consistency-based characterization for IC Trojan detection, International Conference on Computer-Aided Design, 2009 Y. Alkabani, F. Koushanfar, Consistency-based characterization for IC Trojan detection, International Conference on Computer-Aided Design, 2009
4.
Zurück zum Zitat H. Salmani, M. Tehranipoor, J. Plusquellic, A layout-aware approach for improving localized switching to detect hardware Trojans in Integrated Circuits, IEEE International Workshop on Information Forensics and Security (WIFS), 2010 H. Salmani, M. Tehranipoor, J. Plusquellic, A layout-aware approach for improving localized switching to detect hardware Trojans in Integrated Circuits, IEEE International Workshop on Information Forensics and Security (WIFS), 2010
6.
Zurück zum Zitat K. Rosenfeld, R. Karri, Attacks and defenses for JTAG. IEEE Des Test Comput 27(1), 36–47 (2010)CrossRef K. Rosenfeld, R. Karri, Attacks and defenses for JTAG. IEEE Des Test Comput 27(1), 36–47 (2010)CrossRef
7.
Zurück zum Zitat A. Hennessy, Y. Zheng, S. Bhunia, JTAG-based robust PCB authentication for protection against counterfeiting attacks. In Design Automation Conference (ASP-DAC), 2016 21st Asia and South Pacific (pp. 56–61). IEEE, January 2016 A. Hennessy, Y. Zheng, S. Bhunia, JTAG-based robust PCB authentication for protection against counterfeiting attacks. In Design Automation Conference (ASP-DAC), 2016 21st Asia and South Pacific (pp. 56–61). IEEE, January 2016
8.
Zurück zum Zitat K. Rosenfeld, R. Karri, Security and Testing, Introduction to Hardware Security and Trust (Springer, 2012) K. Rosenfeld, R. Karri, Security and Testing, Introduction to Hardware Security and Trust (Springer, 2012)
9.
Zurück zum Zitat N. Asadizanjani, A new methodology to protect PCBs from non-destructive reverse engineering, in 42nd International Symposium for Testing and Failure Analysis (6–10 November 2016). Asm N. Asadizanjani, A new methodology to protect PCBs from non-destructive reverse engineering, in 42nd International Symposium for Testing and Failure Analysis (6–10 November 2016). Asm
10.
Zurück zum Zitat S. Ghosh, A. Basak, S. Bhunia, How secure are printed circuit boards against trojan attacks? IEEE Des Test 32(2), 7–16 (2015)CrossRef S. Ghosh, A. Basak, S. Bhunia, How secure are printed circuit boards against trojan attacks? IEEE Des Test 32(2), 7–16 (2015)CrossRef
11.
Zurück zum Zitat S. Paley, T. Hoque, S. Bhunia, Active protection against PCB physical tampering, in Quality Electronic Design (ISQED), 2016 17th International Symposium on, pp. 356–361. IEEE, March 2016 S. Paley, T. Hoque, S. Bhunia, Active protection against PCB physical tampering, in Quality Electronic Design (ISQED), 2016 17th International Symposium on, pp. 356–361. IEEE, March 2016
14.
Zurück zum Zitat J. Carlsson, Crosstalk on Printed Circuit Boards, 2nd edn., 1994 J. Carlsson, Crosstalk on Printed Circuit Boards, 2nd edn., 1994
15.
Zurück zum Zitat B. Sood, M. Pecht, Controlling Moisture in Printed Circuit Boards, IPC Apex EXPO Proceedings, 2010 B. Sood, M. Pecht, Controlling Moisture in Printed Circuit Boards, IPC Apex EXPO Proceedings, 2010
16.
Zurück zum Zitat G.E. Suh, S. Devadas, Physical unclonable functions for device authentication and secret key generation, in Proceedings of the 44th annual Design Automation Conference (ACM, 2007) pp. 9–14 G.E. Suh, S. Devadas, Physical unclonable functions for device authentication and secret key generation, in Proceedings of the 44th annual Design Automation Conference (ACM, 2007) pp. 9–14
17.
Zurück zum Zitat L. Wei, C. Song, Y. Liu, J. Zhang, F. Yuan, X. Qiang, BoardPUF: Physical Unclonable Functions for printed circuit board authentication, in Computer-Aided Design (ICCAD), 2015 IEEE/ACM International Conference on, pp. 152–158. IEEE, 2015 L. Wei, C. Song, Y. Liu, J. Zhang, F. Yuan, X. Qiang, BoardPUF: Physical Unclonable Functions for printed circuit board authentication, in Computer-Aided Design (ICCAD), 2015 IEEE/ACM International Conference on, pp. 152–158. IEEE, 2015
18.
Zurück zum Zitat F. Zhang, A. Hennessy, S. Bhunia, Robust counterfeit PCB detection exploiting intrinsic trace impedance variations, in 2015 IEEE 33rd VLSI Test Symposium (VTS), pp. 1–6. IEEE, 2015 F. Zhang, A. Hennessy, S. Bhunia, Robust counterfeit PCB detection exploiting intrinsic trace impedance variations, in 2015 IEEE 33rd VLSI Test Symposium (VTS), pp. 1–6. IEEE, 2015
19.
Zurück zum Zitat A.S. Iyengar, Authentication of Printed Circuit Boards. In 42nd International Symposium for Testing and Failure Analysis (November 6–10, 2016). Asm A.S. Iyengar, Authentication of Printed Circuit Boards. In 42nd International Symposium for Testing and Failure Analysis (November 6–10, 2016). Asm
20.
Zurück zum Zitat H. Rau, C.-H. Wu, Automatic optical inspection for detecting defects on printed circuit board inner layers. Int. J. Adv. Manuf. Technol. 25(9–10), 940–946 (2005)CrossRef H. Rau, C.-H. Wu, Automatic optical inspection for detecting defects on printed circuit board inner layers. Int. J. Adv. Manuf. Technol. 25(9–10), 940–946 (2005)CrossRef
Metadaten
Titel
Hardware Trojans and Piracy of PCBs
verfasst von
Anirudh Iyengar
Swaroop Ghosh
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-68511-3_6

Neuer Inhalt