Skip to main content

2017 | OriginalPaper | Buchkapitel

Study of Hardware Trojans in a Closed Loop Control System for an Internet-of-Things Application

verfasst von : Ranveer Kumar, Karthikeyan Lingasubramanian

Erschienen in: Big Data and Visual Analytics

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A closed-loop system is a primary technology used to automate our critical infrastructure and major industries to improve their efficiency. Their dependability is challenged by probable vulnerabilities in the core computing system. These vulnerabilities can appear on both front (software) and back (hardware) ends of the computing system. While the software vulnerabilities are well researched and documented, the hardware ones are normally overlooked. However, with hardware-inclusive technological evolutions like Cyber-Physical Systems and Internet-of-Things, hardware vulnerabilities should be addressed appropriately. In this work, we present a study of one such vulnerability, called Hardware Trojan (HT), on a closed-loop control system. Since a typical hardware Trojan is a small and stealthy digital circuit, we present a test platform built using FPGA-in-the-loop, where the computing system is represented as a digital hardware. Through this platform, a comprehensive runtime analysis of hardware Trojan is accomplished and we developed four threat models that can lead to destabilization of the closed-loop system causing hazardous conditions. Since the primary objective is to study the effects of hardware Trojans, they are designed in such a way that they can be accessible and controllable.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Shila, D.M., Venugopal, V.: Design, implementation and security analysis of hardware trojan threats in FPGA. In: Communication and Information Systems Security Symposium, IEEE ICC (2014) Shila, D.M., Venugopal, V.: Design, implementation and security analysis of hardware trojan threats in FPGA. In: Communication and Information Systems Security Symposium, IEEE ICC (2014)
4.
Zurück zum Zitat Karri, R., Rajendran, J., Rosenfeld, K., Tehranipoor, M.: Trustworthy hardware: identifying and classifying hardware trojans. Computer. 43(10), 39–46 (2010)CrossRef Karri, R., Rajendran, J., Rosenfeld, K., Tehranipoor, M.: Trustworthy hardware: identifying and classifying hardware trojans. Computer. 43(10), 39–46 (2010)CrossRef
5.
Zurück zum Zitat Adee, S.: the hunt for the kill switch. Spectrum IEEE. 45(5), 34–39 (2008)CrossRef Adee, S.: the hunt for the kill switch. Spectrum IEEE. 45(5), 34–39 (2008)CrossRef
6.
Zurück zum Zitat Jin, Y., Kupp, N., Makris, Y.: Experiences in hardware trojan design and implementation. In: 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, Francisco, CA pp. 50–57 Jin, Y., Kupp, N., Makris, Y.: Experiences in hardware trojan design and implementation. In: 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, Francisco, CA pp. 50–57
7.
Zurück zum Zitat Wang, X., Tehranipoor, M., Plusquellic, J.: Detecting malicious inclusions in secure hardware: challenges and solutions. In: Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, HST’08, IEEE Computer Society, Washington, DC, USA, pp. 15–19 (2008) Wang, X., Tehranipoor, M., Plusquellic, J.: Detecting malicious inclusions in secure hardware: challenges and solutions. In: Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, HST’08, IEEE Computer Society, Washington, DC, USA, pp. 15–19 (2008)
8.
Zurück zum Zitat Soden, J., Anderson, R., Henderson, C.: IC failure analysis tools and techniques – magic, mystery, and science. In: International Test Conference, Lecture Series II “Practical Aspects of IC Diagnosis and Failure Analysis: A Walk through the Process”, pp. 1–11. (1996) Soden, J., Anderson, R., Henderson, C.: IC failure analysis tools and techniques – magic, mystery, and science. In: International Test Conference, Lecture Series II “Practical Aspects of IC Diagnosis and Failure Analysis: A Walk through the Process”, pp. 1–11. (1996)
10.
Zurück zum Zitat Nise Norman, S.: Control system engineering, 3rd edn. John Wiley & Sons, Inc, New York, NY (2000)MATH Nise Norman, S.: Control system engineering, 3rd edn. John Wiley & Sons, Inc, New York, NY (2000)MATH
Metadaten
Titel
Study of Hardware Trojans in a Closed Loop Control System for an Internet-of-Things Application
verfasst von
Ranveer Kumar
Karthikeyan Lingasubramanian
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-63917-8_14