A Novel Method for Malicious Implanted Computer Video Cable Detection via Electromagnetic Features

Electromagnetic (EM) radiation is an inherent phenomenon in the operation of electronic information equipment. The side-channel attack, malicious hardware and software implantation attack by using the EM radiation are implemented to steal information. This form of attacks can be used in air-gap information equipment, which bring great danger for information security. The malicious implantation hidden in circuits are difficult to detect. How to detect the implantation is a challenging problem. In this paper, a malicious hardware implantation is analyzed. A method that leverages EM signals for Trojan-embedded computer video cable detection is proposed. The method neither needs activating the Trojan nor requires near-field probe approaching at close. It utilizes recognizable patterns in the spectrum of EM to predict potential risks. This paper focuses on the extraction of feature vectors via the empirical mode decomposition (EMD) algorithm. Intrinsic mode functions (IMFs) are analyzed and selected to be eigenvectors. Using a common classification technique, we can achieve both effective and reliable detection results.

[1]  Fatih Karabacak,et al.  Remote detection of unauthorized activity via spectral analysis: work-in-progress , 2017, CODES+ISSS.

[2]  Ingrid Verbauwhede,et al.  Electromagnetic circuit fingerprints for Hardware Trojan detection , 2015, 2015 IEEE International Symposium on Electromagnetic Compatibility (EMC).

[3]  Jeyavijayan Rajendran,et al.  Hardware security: Threat models and metrics , 2013, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[4]  Yiqiang Zhao,et al.  Golden chip free Trojan detection leveraging electromagnetic side channel fingerprinting , 2019, IEICE Electron. Express.

[5]  Sylvain Guilley,et al.  Hardware Trojan detection by delay and electromagnetic measurements , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[6]  Mordechai Guri,et al.  USBee: Air-gap covert-channel via electromagnetic emission from USB , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[7]  Apostolos P. Fournaris,et al.  An efficient multi-parameter approach for FPGA hardware Trojan detection , 2019, Microprocess. Microsystems.

[8]  Ahmad Taher Azar,et al.  Performance analysis of support vector machines classifiers in breast cancer mammography recognition , 2013, Neural Computing and Applications.

[9]  Wim van Eck,et al.  Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..

[10]  Lan Chen,et al.  Application of SVM Machine Learning to Hardware Trojan Detection Using Side-channel Analysis , 2020 .

[11]  Degang Sun,et al.  Computer recognition based on the compromising emanations fingerprint , 2016, 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).

[12]  Harold Joseph Highland,et al.  Electromagnetic radiation revisited , 1986, Computers & security.

[13]  Jianxin Wang,et al.  A hardware Trojan detection method based on the electromagnetic leakage , 2019, China Communications.

[14]  N. Huang,et al.  The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis , 1998, Proceedings of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences.

[15]  Takeshi Kumaki,et al.  Detection technique for hardware Trojans using machine learning in frequency domain , 2015, 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE).

[16]  Youhua Shi,et al.  Hardware Trojan Detection Utilizing Machine Learning Approaches , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[17]  Markus G. Kuhn,et al.  Electromagnetic Eavesdropping Risks of Flat-Panel Displays , 2004, Privacy Enhancing Technologies.

[18]  Farinaz Koushanfar,et al.  A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.