Malicious Activity Detection in Lightweight Wearable and IoT Devices Using Signal Stitching

The integrated circuit (IC) manufacturing process involves many players, from chip/board design and fabrication to firmware design and installation. In today’s global supply chain, any of these steps are prone to interference from rogue players, creating a security risk. Therefore, manufactured devices need to be verified to perform only their intended operations since it is not economically feasible to control the supply chain and use only trusted facilities. This paper presents a detection technique for malicious activity that can stem from hardware or firmware Trojans. The proposed technique relies on (i) repetitious side-channel sample collection of the active device, (ii) time-domain stitching, and (iii) frequency domain analysis. Since finding a trusted sample is generally impractical, the proposed technique is based on self-referencing to remove the effects of environmental or device-to-device variation in the frequency domain. We first observe that the power spectrum of the Trojan activity is confined to a low-frequency band. Then, we exploit this fact to achieve self-referencing using signal detection theory. The proposed technique’s effectiveness is demonstrated through experiments on a wearable electronics prototype and system-on-chip (SoC) under a variety of practical scenarios. Experimental results show the proposed detection technique enables a high overall detection coverage for malicious activities of varying types with 0.8 s monitoring time overhead, which is negligible.

[1]  Salvatore J. Stolfo,et al.  When Firmware Modifications Attack: A Case Study of Embedded Exploitation , 2013, NDSS.

[2]  Hyung Gyu Lee,et al.  Energy-Optimal Gesture Recognition using Self-Powered Wearable Devices , 2018, 2018 IEEE Biomedical Circuits and Systems Conference (BioCAS).

[3]  Maire O'Neill,et al.  Insecurity by Design: Today's IoT Device Security Problem , 2016 .

[4]  Ahmad-Reza Sadeghi,et al.  Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[5]  Yiorgos Makris,et al.  Hardware Trojans in Analog, Mixed-Signal, and RF ICs , 2018 .

[6]  Mark Mohammad Tehranipoor,et al.  Hacking and protecting IC hardware , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[7]  Lok-Won Kim,et al.  A Trojan-resistant system-on-chip bus architecture , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[8]  Umit Y. Ogras,et al.  Flexibility-Aware System-on-Polymer (SoP): Concept to Prototype , 2017, IEEE Transactions on Multi-Scale Computing Systems.

[9]  Jakob Rieck Attacks on fitness trackers revisited: a case-study of unfit firmware security , 2016, Sicherheit.

[10]  Devu Manikantan Shila,et al.  I can detect you: Using intrusion checkers to resist malicious firmware attacks , 2016, 2016 IEEE Symposium on Technologies for Homeland Security (HST).

[11]  Benjamin Morin,et al.  What If You Can't Trust Your Network Card? , 2011, RAID.

[12]  Song Guo,et al.  Just-in-Time Code Offloading for Wearable Computing , 2015, IEEE Transactions on Emerging Topics in Computing.

[13]  Ümit Y. Ogras,et al.  PCB Hardware Trojans: Attack Modes and Detection Strategies , 2019, 2019 IEEE 37th VLSI Test Symposium (VTS).

[14]  Christof Paar,et al.  MOLES: Malicious off-chip leakage enabled by side-channels , 2009, 2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers.

[15]  Yiorgos Makris,et al.  Toward automatic proof generation for information flow policies in third-party hardware IP , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[16]  Arnab Raha,et al.  Powering the Internet of Things , 2014, 2014 IEEE/ACM International Symposium on Low Power Electronics and Design (ISLPED).

[17]  Fatih Karabacak,et al.  Detection of malicious hardware components in mobile platforms , 2016, 2016 17th International Symposium on Quality Electronic Design (ISQED).

[18]  Yiorgos Makris,et al.  Hardware Trojans in Wireless Cryptographic ICs , 2010, IEEE Design & Test of Computers.

[19]  Jaehyun Park,et al.  Near-optimal energy allocation for self-powered wearable systems , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[20]  Hannes Tschofenig,et al.  Securing the Internet of Things: A Standardization Perspective , 2014, IEEE Internet of Things Journal.

[21]  Domenic Forte,et al.  Leveraging Side-Channel Information for Disassembly and Security , 2019, ACM J. Emerg. Technol. Comput. Syst..

[22]  Giorgio Di Natale,et al.  Hardware Trojan Attacks in Analog/Mixed-Signal ICs via the Test Access Mechanism , 2020, 2020 IEEE European Test Symposium (ETS).

[23]  Yiorgos Makris,et al.  Trusted and Secure Design of Analog/RF ICs: Recent Developments , 2019, 2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS).

[24]  Farinaz Koushanfar,et al.  A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.

[25]  Michail Maniatakos,et al.  Impact of firmware modification attacks on power systems field devices , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[26]  Qassim Nasir,et al.  Firmware Update Attacks and Security for IoT Devices: Survey , 2019, ArabWIC 2019.

[27]  Christos A. Papachristou,et al.  Process reliability based trojans through NBTI and HCI effects , 2010, 2010 NASA/ESA Conference on Adaptive Hardware and Systems.

[28]  H. Shill,et al.  Trends in Technology Usage for Parkinson's Disease Assessment: A Systematic Review , 2021, medRxiv.

[29]  Zhenkai Liang,et al.  Jump-oriented programming: a new class of code-reuse attack , 2011, ASIACCS '11.

[30]  Srivaths Ravi,et al.  Security in embedded systems: Design challenges , 2004, TECS.

[31]  Qiaoyan Yu,et al.  Exploiting error control approaches for Hardware Trojans on Network-on-Chip links , 2013, 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS).

[32]  Swarup Bhunia,et al.  Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme , 2008, 2008 Design, Automation and Test in Europe.

[33]  Fatih Karabacak,et al.  Work-in-progress: remote detection of unauthorized activity via spectral analysis , 2017, 2017 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).

[34]  Yann Bachy,et al.  Smart-TV Security Analysis: Practical Experiments , 2015, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.

[35]  Mark Mohammad Tehranipoor,et al.  A Novel Built-In Self-Authentication Technique to Prevent Inserting Hardware Trojans , 2014, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[36]  Michail Maniatakos,et al.  ConFirm: Detecting firmware modifications in embedded systems using Hardware Performance Counters , 2015, 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[37]  Debdeep Mukhopadhyay,et al.  RAPPER: Ransomware Prevention via Performance Counters , 2018, ArXiv.

[38]  Srivaths Ravi,et al.  Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..

[39]  Fatih Karabacak,et al.  Remote detection of unauthorized activity via spectral analysis: work-in-progress , 2017, CODES+ISSS.

[40]  Michael S. Hsiao,et al.  A Novel Sustained Vector Technique for the Detection of Hardware Trojans , 2009, 2009 22nd International Conference on VLSI Design.

[41]  Jeyavijayan Rajendran,et al.  Hardware security: Threat models and metrics , 2013, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[42]  Michail Maniatakos,et al.  The Cybersecurity Landscape in Industrial Control Systems , 2016, Proceedings of the IEEE.

[43]  Swarup Bhunia,et al.  TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.

[44]  Berk Sunar,et al.  Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[45]  Farinaz Koushanfar,et al.  High-sensitivity hardware Trojan detection using multimodal characterization , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[46]  Sandeep K. Gupta,et al.  Trojan detection via delay measurements: A new approach to select paths and vectors to maximize effectiveness and minimize cost , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).