An Automated Framework for Board-level Trojan Benchmarking

03/27/2020
by   Tamzidul Hoque, et al.
1

Economic and operational advantages have led the supply chain of printed circuit boards (PCBs) to incorporate various untrusted entities. Any of the untrusted entities are capable of introducing malicious alterations to facilitate a functional failure or leakage of secret information during field operation. While researchers have been investigating the threat of malicious modification within the scale of individual microelectronic components, the possibility of a board-level malicious manipulation has essentially been unexplored. In the absence of standard benchmarking solutions, prospective countermeasures for PCB trust assurance are likely to utilize homegrown representation of the attacks that undermines their evaluation and does not provide scope for comparison with other techniques. In this paper, we have developed the first-ever benchmarking solution to facilitate an unbiased and comparable evaluation of countermeasures applicable to PCB trust assurance. Based on a taxonomy tailored for PCB-level alterations, we have developed high-level Trojan models. From these models, we have generated a custom pool of board-level Trojan designs of varied complexity and functionality. We have also developed a tool-flow for automatically inserting these Trojans into various PCB designs and generate the Trojan benchmarks (i.e., PCB designs with Trojan). The tool-based Trojan insertion facilitate a comprehensive evaluation against large number of diverse Trojan implementations and application of data mining for trust verification. Finally, with experimental measurements from a fabricated PCB, we analyze the stealthiness of the Trojan designs.

READ FULL TEXT

page 1

page 4

page 6

research
04/25/2022

Hardware Trojan Detection using Graph Neural Networks

The globalization of the Integrated Circuit (IC) supply chain has moved ...
research
06/11/2020

Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking

Integrated circuits (ICs) are the foundation of all computing systems. T...
research
04/14/2022

Trust2Vec: Large-Scale IoT Trust Management System based on Signed Network Embeddings

A trust management system (TMS) is an integral component of any IoT netw...
research
04/05/2022

PDNPulse: Sensing PCB Anomaly with the Intrinsic Power Delivery Network

The ubiquitous presence of printed circuit boards (PCBs) in modern elect...
research
03/05/2023

Reverse Engineering Word-Level Models from Look-Up Table Netlists

Reverse engineering of FPGA designs from bitstreams to RTL models aids i...
research
06/08/2023

Jigsaw-based Benchmarking for Learning Robotic Manipulation

Benchmarking provides experimental evidence of the scientific baseline t...

Please sign up or login with your details

Forgot password? Click here to reset