skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: A Golden-Free Approach to Detect Trojans in COTS Multi-PCB Systems
Untrusted third parties in commercial-off-the-shelf (COTS) printed circuit board (PCB) supply chains may poison PCBs with hardware, firmware, and software implants. Hence, we focus on detection of malicious implants in PCBs. State-of-the-art hardware Trojan detection methods require a golden PCB system/model to detect malicious implants and do not scale to large-scale COTS PCB systems. We map a COTS PCB system to a graph and propose a golden-free methodology comprising a graph-based mathematical construction on node and edge equivalences, and clustering of identical nodes and paths and validation of hypothesized statistical properties on measured sidechannel data. We evaluate the methodology on a multi-PCB testbed with hierarchically networked PCB devices and several types of Trojans.  more » « less
Award ID(s):
2039615
PAR ID:
10522259
Author(s) / Creator(s):
; ; ; ; ;
Publisher / Repository:
IEEE
Date Published:
Journal Name:
IEEE Micro
Volume:
43
Issue:
5
ISSN:
0272-1732
Page Range / eLocation ID:
64 to 76
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. As the crisis of confidence and trust in overseas foundries arises, the industry and academic community are paying increasing attention to Printed Circuit Board (PCB) security. PCB, the backbone of any electronic system hardware, always draws attackers’ attention as it carries system and design information. Numerous ways of PCB tampering (e.g., adding/replacing a component, eavesdropping on a trace and bypassing a connection) can lead to more severe problems, such as Intellectual Property (IP) violation, password leaking, the Internet of Things (IoT) attacks or even more. This paper proposes a technique of active self-defense PCB modules with zero performance overhead. Those protection modules will only be activated when the boards are exposed to the attacks. A set of PCBs with proposed protection modules is fabricated and tested to prove the effectiveness and efficiency of the techniques. 
    more » « less
  2. null (Ed.)
    Reliability and trustworthiness are dominant factors in designing System-on-Chips (SoCs) for a variety of applications. Malicious implants, such as hardware Trojans, can lead to undesired information leakage or system malfunction. To ensure trustworthy computing, it is critical to develop efficient Trojan detection techniques. While existing delay-based side-channel analysis is promising, it is not effective due to two fundamental limitations: (i) The difference in path delay between the golden design and Trojan inserted design is negligible compared with environmental noise and process variations. (ii) Existing approaches rely on manually crafted rules for test generation, and require a large number of simulations, making it impractical for industrial designs. In this paper, we propose a novel test generation method using reinforcement learning for delay-based Trojan detection. This paper makes three important contributions. 1) Unlike existing methods that rely on the delay difference of a few gates, our proposed approach utilizes critical path analysis to generate test vectors that can maximize the side-channel sensitivity. 2) To the best of our knowledge, our approach is the first attempt in applying reinforcement learning for efficient test generation to detect Trojans using delay-based analysis. 3) Our experimental results demonstrate that our method can significantly improve both side-channel sensitivity (59% on average) and test generation time (17x on average) compared to state-of-the-art test generation techniques. 
    more » « less
  3. This paper presents a new paradigm for abnormality detection using a novel power signature that characterizes the rising and descending patterns of energy consumption. The proposed methodology includes a low-overhead power signature generation circuit, computation-light analysis methods, and optimal generation of the golden signature used in the analysis. The proposed power signature generation circuit is designed using 90 nm CMOS technology, and its operation is validated via circuit simulations. The effectiveness of the proposed method in detecting the insertion of potentially malicious code is demonstrated with data obtained from hardware experiments and circuit simulations. 
    more » « less
  4. Due to the increasing complexity of hardware designs, third-party hardware Intellectual Property (IP) cores are often incorporated to alleviate the burden on hardware designers. However, the prevalent use of third-party IPs has raised security concerns such as hardware Trojans. These Trojans inserted in the soft IPs are very difficult to detect through functional testing and no single detection methodology has been able to completely address this issue. Based on a Register- Transfer Level (RTL) soft IP analysis method named Structural Checking, this paper presents a hardware Trojan detection methodology and tool by detailing the implementation of a Golden Reference Library for matching an unknown IP to a functionally similar Golden Reference. The matching result is quantified in percentages so that two different IPs with similar functions have a higher percentage match. A match of the unknown IP to a whitelist IP advances it to be identified with a known functionality, while a match to a blacklist IP causes it to be detected as Trojan-infested. 
    more » « less
  5. Polychlorinated biphenyls (PCBs) are a group of 209 highly stable molecules that were used extensively in industry. Although their commercial use ceased in 1979, they are still present in many aquatic ecosystems due to improper disposal, oceanic currents, atmospheric deposition, and hydrophobic nature. PCBs pose a significant and ongoing threat to the development and sustainability of aquatic organisms. In areas with PCB exposure high mortality rates of organisms inhabiting them are still seen today, posing a significant threat to local species. Zebrafish were exposed to a standard PCB mixture (Aroclor 1254) for the first 5 days post fertilization, as there is a gap in knowledge during this important developmental period for fish (i.e., organization of the body). This PCB mixture was formally available commercially and has a high prevalence in PCB-contaminated sites. We tested for the effects of PCB dosage (control (embryo water only; 0 mg/L), methanol (solvent control; 0 mg/L); PCB 1 (0.125 mg/L), PCB 2 (0.25 mg/L), PCB 3 (0.35 mg/L), and PCB 4 (0.40 mg/L)) on zebrafish survival, rate of metamorphosis, feeding efficiency, and growth. We found significant, dose-dependent effects of PCB exposure on mortality, feeding efficiency, and growth, but no clear effect of PCBs on the rate of zebrafish metamorphosis. We identified a concentration in which there were no observable effects (NOEC), PCB concentration above the NOEC had a significant impact on life-critical processes. This can further inform local management decisions in environments experiencing PCB contamination. 
    more » « less