How Secure Are Printed Circuit Boards Against Trojan Attacks?

被引:48
作者
Ghosh, Swaroop [1 ]
Basak, Abhishek [2 ]
Bhunia, Swarup [3 ]
机构
[1] Univ S Florida, Tampa, FL 33620 USA
[2] Case Western Reserve Univ, Comp Engn, Cleveland, OH 44106 USA
[3] Case Western Reserve Univ, Elect Engn & Comp Sci, Cleveland, OH 44106 USA
关键词
D O I
10.1109/MDAT.2014.2347918
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojan attacks at the integrated circuit (IC) level have been studied extensively in recent times. Researchers have analyzed the impact of these attacks and explored possible countermeasures for ICs. However, vulnerability with respect to hardware Trojan attacks at higher levels of system abstraction, e.g., at printed circuit board (PCB) level, have not been reported earlier. Previous studies have covered security of PCBs against piracy and various post-fabrication tampering attacks. JTAG (Joint Test Access Group) and other field programmability features, e.g., probe pins, unused sockets and USB have been extensively exploited by hackers to gain access to internal features of the designs as well as snooping of secret key, collection of test responses, and manipulating JTAG test pins. One instance demonstrated that Xbox can be hacked by disabling the Digital Rights Management (DRM) policy using JTAG. The emerging business model of PCB design and fabrication that favors extensive outsourcing and integration of untrusted components/entities in the PCB life-cycle to lower manufacturing cost, makes hardware Trojan attacks in PCBs highly feasible. © 2013 IEEE.
引用
收藏
页码:7 / 16
页数:10
相关论文
共 10 条
  • [1] [Anonymous], P INT C COMP AID DES
  • [2] Artur J., 2004, P EUR TEST S
  • [3] Carlsson J., 1994, CROSSTALK PRINTED CI
  • [4] Chakraborty R. S., 2009, HLDVT
  • [5] Domke F., 2009, Blackbox JTAG reverse engineering
  • [6] Jillek W., 2005, P INT J ADV MANUFACT
  • [7] Attacks and defenses for JTAG
    Rosenfeld K.
    Karri R.
    [J]. IEEE Design and Test of Computers, 2010, 27 (01): : 36 - 47
  • [8] Salmani H., 2010, P IEEE INT WORKSH IN
  • [9] Sood B., 2010, IPC AP EXPO P
  • [10] Tehranipoor M, 2012, INTRODUCTION TO HARDWARE SECURITY AND TRUST, P1, DOI 10.1007/978-1-4419-8080-9