The Big Hack Explained

Over the past two decades, globalized outsourcing in the semiconductor supply chain has lowered manufacturing costs and shortened the time-to-market for original equipment manufacturers (OEMs). However, such outsourcing has rendered the printed circuit boards (PCBs) vulnerable to malicious activities and alterations on a global scale. In this article, we take an in-depth look into one such attack, called the “Big Hack,” that was recently reported by Bloomberg Buisnessweek. The article provides background on the Big Hack from three perspectives: an attacker, a security investigator, and the societal impacts. This study provides details on vulnerabilities in the modern PCB supply chain, the possible attacks, and the existing and emerging countermeasures. The necessity for novel visual inspection techniques for PCB assurance is emphasized throughout the article. Further, a review of various imaging modalities, image analysis algorithms, and open research challenges are provided for automated visual inspection.

[1]  Yafang Xue,et al.  Optical Character Recognition , 2022 .

[2]  Aditya Gupta JTAG Debugging and Exploitation , 2019 .

[3]  Ian S. Anderson,et al.  Neutron Imaging and Applications , 2009 .

[4]  Vinod K. Agarwal,et al.  Testing and diagnosis of interconnects using boundary scan architecture , 1988, International Test Conference 1988 Proceeding@m_New Frontiers in Testing.

[5]  Mark Mohammad Tehranipoor,et al.  Investigation of obfuscation-based anti-reverse engineering for printed circuit boards , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[6]  J. M. Lloyd,et al.  Thermal Imaging Systems , 1975 .

[7]  Tao Peng,et al.  Algorithms and models for 3-D shape measurement using digital fringe projections , 2007 .

[8]  Ujjwal Guin,et al.  Counterfeit Integrated Circuits , 2015 .

[9]  SeungGeun Youn,et al.  Automatic classification of SMD packages using neural network , 2014, 2014 IEEE/SICE International Symposium on System Integration.

[10]  M. Nuss,et al.  Imaging with terahertz waves. , 1995, Optics letters.

[11]  Waleed Khalil,et al.  Defense-in-Depth: A Recipe for Logic Locking to Prevail , 2019, Integr..

[12]  O.M. Ramahi,et al.  Electromagnetic interference (EMI) reduction from printed circuit boards (PCB) using electromagnetic bandgap structures , 2004, IEEE Transactions on Electromagnetic Compatibility.

[13]  Swarup Bhunia,et al.  Hardware Security: A Hands-on Learning Approach , 2018 .

[14]  Jason Geng,et al.  Structured-light 3D surface imaging: a tutorial , 2011 .

[15]  Ujjwal Guin,et al.  Invasion of the hardware snatchers , 2017, IEEE Spectrum.

[16]  Navid Asadizanjani,et al.  Non-Destructive PCB Reverse Engineering Using X-Ray Micro Computed Tomography , 2015, International Symposium for Testing and Failure Analysis.

[17]  Mark Mohammad Tehranipoor,et al.  A Survey on Chip to System Reverse Engineering , 2016, JETC.

[18]  TsunekawaShou,et al.  Automatic PCB Inspection Algorithms , 1996 .

[19]  R. Smith,et al.  An Overview of the Tesseract OCR Engine , 2007, Ninth International Conference on Document Analysis and Recognition (ICDAR 2007).

[20]  Domenic Forte,et al.  EOP: An Encryption-Obfuscation Solution for Protecting PCBs Against Tampering and Reverse Engineering , 2019, ArXiv.

[21]  James C. Wyant,et al.  White light interferometry , 2002, SPIE Defense + Commercial Sensing.

[22]  C. Quate,et al.  Acoustic microscope—scanning version , 1974 .

[23]  Michael Vollmer,et al.  Infrared Thermal Imaging: Fundamentals, Research and Applications , 2010 .

[24]  Huihui. Wu,et al.  Automated visual inspection of surface mounted chip components , 2010, 2010 IEEE International Conference on Mechatronics and Automation.

[25]  Cihan H. Dagli,et al.  Automatic PCB Inspection Algorithms: A Survey , 1996, Comput. Vis. Image Underst..

[26]  Simon Kind,et al.  Advanced Technologies in Life Cycle Engineering , 2014 .

[27]  K. Dransfeld,et al.  Scanning near-field acoustic microscopy , 1989 .

[28]  J. Grzyb,et al.  All-silicon integrated THz harmonic source and receiver components for future active imaging modalities , 2014, 2014 39th International Conference on Infrared, Millimeter, and Terahertz waves (IRMMW-THz).

[29]  Farinaz Koushanfar,et al.  A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.

[30]  G. Hroundas Economics of Bare Printed Circuit Board Testing , 1986 .

[31]  Ray Smith An Overview of the Tesseract OCR Engine , 2007 .

[32]  T. Feng,et al.  Penetrative imaging of sub-surface microstructures with a near-field microwave microscope , 2014 .

[33]  Mark Mohammad Tehranipoor,et al.  Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain , 2014, Proceedings of the IEEE.

[34]  Georg Sigl,et al.  Secure Physical Enclosures from Covers with Tamper-Resistance , 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst..

[35]  Mark Mohammad Tehranipoor,et al.  Trustworthy Hardware: Identifying and Classifying Hardware Trojans , 2010, Computer.

[36]  Ramesh Karri,et al.  Attacks and Defenses for JTAG , 2010, IEEE Design & Test of Computers.

[37]  Hojjat Adeli,et al.  A New Approach for Health Monitoring of Structures: Terrestrial Laser Scanning , 2007, Comput. Aided Civ. Infrastructure Eng..

[38]  A. Verma Optimizing test strategies during PCB design for boards with limited ICT access , 2002, 27th Annual IEEE/SEMI International Electronics Manufacturing Technology Symposium.

[39]  Ramesh Karri,et al.  Security and Testing , 2012 .

[40]  Ross B. Girshick,et al.  Mask R-CNN , 2017, 1703.06870.

[41]  Cliff Wang,et al.  Introduction to Hardware Security and Trust , 2011 .

[42]  Paolo Cignoni,et al.  A low cost 3D scanner based on structured light , 2001 .