PCB Hardware Trojans: Attack Modes and Detection Strategies

Ensuring security of electronic hardware has recently attracted much attention. While a majority of the work in this domain has focused on integrated circuits, printed circuit boards are just as susceptible to unwanted and unauthorized modifications during their manufacturing. Prior work in this domain has shown some examples of failures that can stem from intentional and unintentional board-level modifications. In this paper, we provide an in-depth analysis of previously unexplored board-level modifications and show that a number of attack modes cannot be detected using traditional methods. We also show that it is possible to detect attack modes that are most damaging to the board operation by redesigning the board with additional accessibility and adding specialized test sequences.

[1]  Siegfried Selberherr,et al.  Physically based models of electromigration: From Black's equation to modern TCAD models , 2010, Microelectron. Reliab..

[2]  Gordon W. Roberts,et al.  An Introduction to Mixed-Signal IC Test and Measurement , 2000 .

[3]  Fatih Karabacak,et al.  Detection of malicious hardware components in mobile platforms , 2016, 2016 17th International Symposium on Quality Electronic Design (ISQED).

[4]  I. Blech Electromigration in thin aluminum films on titanium nitride , 1976 .

[5]  T. Guena,et al.  How Depth of Discharge Affects the Cycle Life of Lithium-Metal-Polymer Batteries , 2006, INTELEC 06 - Twenty-Eighth International Telecommunications Energy Conference.

[6]  Kentaro Uesugi,et al.  Synchrotron Micro-XRF Measurements of Trace Element Distributions in BGA Type Solders and Solder Joints , 2010 .

[7]  J. Black Mass transport of aluminum by momentum exchange with conducting electrons , 1967, 2005 IEEE International Reliability Physics Symposium, 2005. Proceedings. 43rd Annual..

[8]  Kwang-Ting Cheng,et al.  Transition fault testing for sequential circuits , 1993, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[9]  A. Palevski,et al.  Activation Energy of Electromigration in Copper Thin Film Conductor Lines , 1996 .

[10]  Farinaz Koushanfar,et al.  A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.

[11]  Yu Zheng,et al.  JTAG-based robust PCB authentication for protection against counterfeiting attacks , 2016, 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC).

[12]  Fatih Karabacak,et al.  Remote detection of unauthorized activity via spectral analysis: work-in-progress , 2017, CODES+ISSS.

[13]  Mark Mohammad Tehranipoor,et al.  Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution , 2013, IEEE Design & Test.

[14]  Mark Mohammad Tehranipoor,et al.  Timing-based delay test for screening small delay defects , 2006, 2006 43rd ACM/IEEE Design Automation Conference.

[15]  Ingrid Verbauwhede,et al.  Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions , 2010, Towards Hardware-Intrinsic Security.

[16]  Swaroop Ghosh,et al.  How Secure Are Printed Circuit Boards Against Trojan Attacks? , 2015, IEEE Design & Test.

[17]  Shri Agarwal NASA Electronic Parts and Packaging (NEPP) Program , 2012 .

[18]  Vinod K. Agarwal,et al.  Testing and diagnosis of interconnects using boundary scan architecture , 1988, International Test Conference 1988 Proceeding@m_New Frontiers in Testing.