Affiliation:
1. Arizona State University
2. Arizona State University, Tempe, AZ
Abstract
Unauthorized hardware or firmware modifications, known as trojans, can steal information, drain the battery, or damage IoT devices. Since trojans may be triggered in the field at an unknown instance, it is important to detect their presence at runtime. However, it is difficult to run sophisticated detection algorithms on these devices due to limited computational power and energy and, in some cases, lack of accessibility. This article presents a stand-off self-referencing technique for detecting unauthorized activity. The proposed technique processes involuntary electromagnetic emissions on a separate hardware, which is physically decoupled from the device under test.
When the device enters the test mode
, a predefined test application is run on the device repetitively for a known period. The periodicity ensures that the spectral electromagnetic power of the test application concentrates at known frequencies, leaving the remaining frequencies within the operating bandwidth at the noise level. Any deviations from the noise level for these unoccupied frequency locations indicate the presence of unknown (unauthorized) activity. Hence, we are able to differentiate trojan activity
without using a golden reference
, or any knowledge of the attributes of the trojan activity. Experiments based on hardware measurements show that the proposed technique achieves close to 100% detection accuracy at up to 120cm distance.
Publisher
Association for Computing Machinery (ACM)
Subject
Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Computer Science Applications
Reference59 articles.
1. Mohammad Abdullah Al Faruque Sujit Rokka Chhetri A. Canedo and J. Wan. 2016. Forensics of Thermal Side-Channel in Additive Manufacturing Systems. Technical Report. Retrieved from http://cecs.uci.edu/files/2016/01/CECS-TR-01-16.pdf. Mohammad Abdullah Al Faruque Sujit Rokka Chhetri A. Canedo and J. Wan. 2016. Forensics of Thermal Side-Channel in Additive Manufacturing Systems. Technical Report. Retrieved from http://cecs.uci.edu/files/2016/01/CECS-TR-01-16.pdf.
2. Fiber optic Fabry–Perot pressure sensor with low sensitivity to temperature changes for downhole application
3. On application of one-class SVM to reverse engineering-based hardware Trojan detection
4. Hardware Trojan Horses in Cryptographic IP Cores
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献