Detection Mechanisms for Unauthorized Wireless Transmissions

With increasing diversity of supply chains from design to delivery, there is an increasing risk that unauthorized changes can be made within an IC. One of the motivations for this type of change is to learn important information (such as encryption keys, spreading codes) from the hardware, and trans...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACM transactions on design automation of electronic systems 2018-12, Vol.23 (6), p.1-21, Article 70
Hauptverfasser: Chang, Doohwang, Bhat, Ganapati, Ogras, Umit, Bakkaloglu, Bertan, Ozev, Sule
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 21
container_issue 6
container_start_page 1
container_title ACM transactions on design automation of electronic systems
container_volume 23
creator Chang, Doohwang
Bhat, Ganapati
Ogras, Umit
Bakkaloglu, Bertan
Ozev, Sule
description With increasing diversity of supply chains from design to delivery, there is an increasing risk that unauthorized changes can be made within an IC. One of the motivations for this type of change is to learn important information (such as encryption keys, spreading codes) from the hardware, and transmit this information to a malicious party. To evade detection, such unauthorized communication can be hidden within legitimate bursts of transmit signal. In this article, we present several signal processing techniques to detect unauthorized transmissions which can be hidden within the legitimate signal. We employ a scheme where the legitimate transmission is configured to emit a single sinusoidal waveform. We use time and spectral domain analysis techniques to explore the transmit spectrum. Since every transmission, no matter how low the signal power is, must have a spectral signature, we identify unauthorized transmission by eliminating the desired signal from the spectrum after capture. Experiment results show that when spread spectrum techniques are used, the presence of an unauthorized signal can be determined without the need for decoding the malicious signal. The proposed detection techniques need to be used as enhancements to the regular testing and verification procedures if hardware security is a concern.
doi_str_mv 10.1145/3241046
format Article
fullrecord <record><control><sourceid>acm_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1145_3241046</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3241046</sourcerecordid><originalsourceid>FETCH-LOGICAL-a244t-3d419bc4e7db2f937152480915b10fba25deee08963561d11a24ede4fcd8fa7b3</originalsourceid><addsrcrecordid>eNo9j81LxDAUxIMouK7i3VNvnqrvNUnTghdZP2HFyy4eS5q8sJFtK3n1oH-9lV09zcD8ZmCEOEe4QlT6WhYKQZUHYoZam9xIqA8nD5XK1eSPxQnzOwBoU-qZuLmjkdwYhz57IbexfeSOszCkbN3bz3EzpPhNPnuLibbEnK2S7bmLzFODT8VRsFums73OxfrhfrV4ypevj8-L22VuC6XGXHqFdesUGd8WoZYGdaEqqFG3CKG1hfZEBFVdSl2iR5xq5EkF56tgTSvn4nK369LAnCg0Hyl2Nn01CM3v6WZ_eiIvdqR13T_0F_4A-31R2A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Detection Mechanisms for Unauthorized Wireless Transmissions</title><source>ACM Digital Library Complete</source><creator>Chang, Doohwang ; Bhat, Ganapati ; Ogras, Umit ; Bakkaloglu, Bertan ; Ozev, Sule</creator><creatorcontrib>Chang, Doohwang ; Bhat, Ganapati ; Ogras, Umit ; Bakkaloglu, Bertan ; Ozev, Sule</creatorcontrib><description>With increasing diversity of supply chains from design to delivery, there is an increasing risk that unauthorized changes can be made within an IC. One of the motivations for this type of change is to learn important information (such as encryption keys, spreading codes) from the hardware, and transmit this information to a malicious party. To evade detection, such unauthorized communication can be hidden within legitimate bursts of transmit signal. In this article, we present several signal processing techniques to detect unauthorized transmissions which can be hidden within the legitimate signal. We employ a scheme where the legitimate transmission is configured to emit a single sinusoidal waveform. We use time and spectral domain analysis techniques to explore the transmit spectrum. Since every transmission, no matter how low the signal power is, must have a spectral signature, we identify unauthorized transmission by eliminating the desired signal from the spectrum after capture. Experiment results show that when spread spectrum techniques are used, the presence of an unauthorized signal can be determined without the need for decoding the malicious signal. The proposed detection techniques need to be used as enhancements to the regular testing and verification procedures if hardware security is a concern.</description><identifier>ISSN: 1084-4309</identifier><identifier>EISSN: 1557-7309</identifier><identifier>DOI: 10.1145/3241046</identifier><language>eng</language><publisher>New York, NY, USA: ACM</publisher><subject>Hardware attacks and countermeasures ; Security and privacy ; Security in hardware</subject><ispartof>ACM transactions on design automation of electronic systems, 2018-12, Vol.23 (6), p.1-21, Article 70</ispartof><rights>ACM</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-a244t-3d419bc4e7db2f937152480915b10fba25deee08963561d11a24ede4fcd8fa7b3</citedby><cites>FETCH-LOGICAL-a244t-3d419bc4e7db2f937152480915b10fba25deee08963561d11a24ede4fcd8fa7b3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://dl.acm.org/doi/pdf/10.1145/3241046$$EPDF$$P50$$Gacm$$H</linktopdf><link.rule.ids>314,776,780,2276,27901,27902,40172,75971</link.rule.ids></links><search><creatorcontrib>Chang, Doohwang</creatorcontrib><creatorcontrib>Bhat, Ganapati</creatorcontrib><creatorcontrib>Ogras, Umit</creatorcontrib><creatorcontrib>Bakkaloglu, Bertan</creatorcontrib><creatorcontrib>Ozev, Sule</creatorcontrib><title>Detection Mechanisms for Unauthorized Wireless Transmissions</title><title>ACM transactions on design automation of electronic systems</title><addtitle>ACM TODAES</addtitle><description>With increasing diversity of supply chains from design to delivery, there is an increasing risk that unauthorized changes can be made within an IC. One of the motivations for this type of change is to learn important information (such as encryption keys, spreading codes) from the hardware, and transmit this information to a malicious party. To evade detection, such unauthorized communication can be hidden within legitimate bursts of transmit signal. In this article, we present several signal processing techniques to detect unauthorized transmissions which can be hidden within the legitimate signal. We employ a scheme where the legitimate transmission is configured to emit a single sinusoidal waveform. We use time and spectral domain analysis techniques to explore the transmit spectrum. Since every transmission, no matter how low the signal power is, must have a spectral signature, we identify unauthorized transmission by eliminating the desired signal from the spectrum after capture. Experiment results show that when spread spectrum techniques are used, the presence of an unauthorized signal can be determined without the need for decoding the malicious signal. The proposed detection techniques need to be used as enhancements to the regular testing and verification procedures if hardware security is a concern.</description><subject>Hardware attacks and countermeasures</subject><subject>Security and privacy</subject><subject>Security in hardware</subject><issn>1084-4309</issn><issn>1557-7309</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><recordid>eNo9j81LxDAUxIMouK7i3VNvnqrvNUnTghdZP2HFyy4eS5q8sJFtK3n1oH-9lV09zcD8ZmCEOEe4QlT6WhYKQZUHYoZam9xIqA8nD5XK1eSPxQnzOwBoU-qZuLmjkdwYhz57IbexfeSOszCkbN3bz3EzpPhNPnuLibbEnK2S7bmLzFODT8VRsFums73OxfrhfrV4ypevj8-L22VuC6XGXHqFdesUGd8WoZYGdaEqqFG3CKG1hfZEBFVdSl2iR5xq5EkF56tgTSvn4nK369LAnCg0Hyl2Nn01CM3v6WZ_eiIvdqR13T_0F_4A-31R2A</recordid><startdate>20181201</startdate><enddate>20181201</enddate><creator>Chang, Doohwang</creator><creator>Bhat, Ganapati</creator><creator>Ogras, Umit</creator><creator>Bakkaloglu, Bertan</creator><creator>Ozev, Sule</creator><general>ACM</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20181201</creationdate><title>Detection Mechanisms for Unauthorized Wireless Transmissions</title><author>Chang, Doohwang ; Bhat, Ganapati ; Ogras, Umit ; Bakkaloglu, Bertan ; Ozev, Sule</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a244t-3d419bc4e7db2f937152480915b10fba25deee08963561d11a24ede4fcd8fa7b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Hardware attacks and countermeasures</topic><topic>Security and privacy</topic><topic>Security in hardware</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Chang, Doohwang</creatorcontrib><creatorcontrib>Bhat, Ganapati</creatorcontrib><creatorcontrib>Ogras, Umit</creatorcontrib><creatorcontrib>Bakkaloglu, Bertan</creatorcontrib><creatorcontrib>Ozev, Sule</creatorcontrib><collection>CrossRef</collection><jtitle>ACM transactions on design automation of electronic systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Chang, Doohwang</au><au>Bhat, Ganapati</au><au>Ogras, Umit</au><au>Bakkaloglu, Bertan</au><au>Ozev, Sule</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Detection Mechanisms for Unauthorized Wireless Transmissions</atitle><jtitle>ACM transactions on design automation of electronic systems</jtitle><stitle>ACM TODAES</stitle><date>2018-12-01</date><risdate>2018</risdate><volume>23</volume><issue>6</issue><spage>1</spage><epage>21</epage><pages>1-21</pages><artnum>70</artnum><issn>1084-4309</issn><eissn>1557-7309</eissn><abstract>With increasing diversity of supply chains from design to delivery, there is an increasing risk that unauthorized changes can be made within an IC. One of the motivations for this type of change is to learn important information (such as encryption keys, spreading codes) from the hardware, and transmit this information to a malicious party. To evade detection, such unauthorized communication can be hidden within legitimate bursts of transmit signal. In this article, we present several signal processing techniques to detect unauthorized transmissions which can be hidden within the legitimate signal. We employ a scheme where the legitimate transmission is configured to emit a single sinusoidal waveform. We use time and spectral domain analysis techniques to explore the transmit spectrum. Since every transmission, no matter how low the signal power is, must have a spectral signature, we identify unauthorized transmission by eliminating the desired signal from the spectrum after capture. Experiment results show that when spread spectrum techniques are used, the presence of an unauthorized signal can be determined without the need for decoding the malicious signal. The proposed detection techniques need to be used as enhancements to the regular testing and verification procedures if hardware security is a concern.</abstract><cop>New York, NY, USA</cop><pub>ACM</pub><doi>10.1145/3241046</doi><tpages>21</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1084-4309
ispartof ACM transactions on design automation of electronic systems, 2018-12, Vol.23 (6), p.1-21, Article 70
issn 1084-4309
1557-7309
language eng
recordid cdi_crossref_primary_10_1145_3241046
source ACM Digital Library Complete
subjects Hardware attacks and countermeasures
Security and privacy
Security in hardware
title Detection Mechanisms for Unauthorized Wireless Transmissions
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T23%3A18%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-acm_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Detection%20Mechanisms%20for%20Unauthorized%20Wireless%20Transmissions&rft.jtitle=ACM%20transactions%20on%20design%20automation%20of%20electronic%20systems&rft.au=Chang,%20Doohwang&rft.date=2018-12-01&rft.volume=23&rft.issue=6&rft.spage=1&rft.epage=21&rft.pages=1-21&rft.artnum=70&rft.issn=1084-4309&rft.eissn=1557-7309&rft_id=info:doi/10.1145/3241046&rft_dat=%3Cacm_cross%3E3241046%3C/acm_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true