Leaking Wireless ICs via Hardware Trojan-Infected Synchronization

被引:5
作者
Diaz-Rizo, Alin Rodrigo [1 ]
Aboushady, Hassan [1 ]
Stratigopoulos, Haralampos-G. [1 ]
机构
[1] Sorbonne Univ, CNRS, LIP6, F-75005 Paris, France
关键词
OFDM; Integrated circuits; Hardware; Receivers; Payloads; Wireless communication; Wireless sensor networks; Covert communication channel; hardware security and trust; hardware Trojans; information leakage; wireless integrated circuits; INFORMATION-FLOW TRACKING; DATA SECRECY PROTECTION; CHANNEL; ATTACKS; PIRACY; DESIGN; STATES;
D O I
10.1109/TDSC.2022.3218507
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a Hardware Trojan (HT) attack in wireless Integrated Circuits (ICs) that aims at leaking sensitive information within a legitimate transmission. The HT is hidden inside the transmitter modulating the sensitive information into the preamble of each transmitted frame which is used for the synchronization of the transmitter with the receiver. The data leakage does not affect synchronization and is imperceptible by the inconspicuous nominal receiver as it does not incur any performance penalty in the communication. A knowledgeable rogue receiver, however, can recover the data using signal processing that is too expensive and impractical to be used during run-time in nominal receivers. The HT mechanism is designed at circuit-level and is embedded entirely into the digital section of the RF transceiver having a tiny footprint. The proposed HT attack is demonstrated with measurements on a hardware platform. We demonstrate the stealthiness of the attack, i.e., its ability to evade defenses based on testing and run-time monitoring, and the robustness of the attack, i.e., the ability of the rogue receiver to recover the leaked information even under unfavorable channel conditions.
引用
收藏
页码:3845 / 3859
页数:15
相关论文
共 77 条
[1]  
[Anonymous], 2021, Open-source IEEE 802.11 compatible software defined radio VHDL modem (bladeRF-wiphy)
[2]  
[Anonymous], 2013, P ACM SIGSAC C COMP, P697
[3]  
[Anonymous], 2020, SDR bladeRF 2.0 micro xA9
[4]  
[Anonymous], 2016, 802112012 IEEE, P1, DOI DOI 10.1109/IEEESTD.2016.7786995
[5]  
[Anonymous], 2018, The Hardware Trojan War: Attacks Myths and Defenses
[6]   Stealthy dopant-level hardware Trojans: extended version [J].
Becker, Georg T. ;
Regazzoni, Francesco ;
Paar, Christof ;
Burleson, Wayne P. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2014, 4 (01) :19-31
[7]   Hardware Trojan Attacks: Threat Analysis and Countermeasures [J].
Bhunia, Swarup ;
Hsiao, Michael S. ;
Banga, Mainak ;
Narasimhan, Seetharam .
PROCEEDINGS OF THE IEEE, 2014, 102 (08) :1229-1247
[8]   Proof-Carrying Hardware-Based Information Flow Tracking in Analog/Mixed-Signal Designs [J].
Bidmeshki, Mohammad Mahdi ;
Antonopoulos, Angelos ;
Makris, Yiorgos .
IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2021, 11 (02) :415-427
[9]   Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP-Part II: Framework Automation [J].
Bidmeshki, Mohammad-Mahdi ;
Guo, Xiaolong ;
Dutta, Raj Gautam ;
Jin, Yier ;
Makris, Yiorgos .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (10) :2430-2443
[10]  
Cai CL, 2015, IEEE INT SYMP CIRC S, P3020, DOI 10.1109/ISCAS.2015.7169323