Detection Mechanisms for Unauthorized Wireless Transmissions
With increasing diversity of supply chains from design to delivery, there is an increasing risk that unauthorized changes can be made within an IC. One of the motivations for this type of change is to learn important information (such as encryption keys, spreading codes) from the hardware, and trans...
Gespeichert in:
Veröffentlicht in: | ACM transactions on design automation of electronic systems 2018-12, Vol.23 (6), p.1-21, Article 70 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 21 |
---|---|
container_issue | 6 |
container_start_page | 1 |
container_title | ACM transactions on design automation of electronic systems |
container_volume | 23 |
creator | Chang, Doohwang Bhat, Ganapati Ogras, Umit Bakkaloglu, Bertan Ozev, Sule |
description | With increasing diversity of supply chains from design to delivery, there is an increasing risk that unauthorized changes can be made within an IC. One of the motivations for this type of change is to learn important information (such as encryption keys, spreading codes) from the hardware, and transmit this information to a malicious party. To evade detection, such unauthorized communication can be hidden within legitimate bursts of transmit signal. In this article, we present several signal processing techniques to detect unauthorized transmissions which can be hidden within the legitimate signal. We employ a scheme where the legitimate transmission is configured to emit a single sinusoidal waveform. We use time and spectral domain analysis techniques to explore the transmit spectrum. Since every transmission, no matter how low the signal power is, must have a spectral signature, we identify unauthorized transmission by eliminating the desired signal from the spectrum after capture. Experiment results show that when spread spectrum techniques are used, the presence of an unauthorized signal can be determined without the need for decoding the malicious signal. The proposed detection techniques need to be used as enhancements to the regular testing and verification procedures if hardware security is a concern. |
doi_str_mv | 10.1145/3241046 |
format | Article |
fullrecord | <record><control><sourceid>acm_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1145_3241046</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3241046</sourcerecordid><originalsourceid>FETCH-LOGICAL-a244t-3d419bc4e7db2f937152480915b10fba25deee08963561d11a24ede4fcd8fa7b3</originalsourceid><addsrcrecordid>eNo9j81LxDAUxIMouK7i3VNvnqrvNUnTghdZP2HFyy4eS5q8sJFtK3n1oH-9lV09zcD8ZmCEOEe4QlT6WhYKQZUHYoZam9xIqA8nD5XK1eSPxQnzOwBoU-qZuLmjkdwYhz57IbexfeSOszCkbN3bz3EzpPhNPnuLibbEnK2S7bmLzFODT8VRsFums73OxfrhfrV4ypevj8-L22VuC6XGXHqFdesUGd8WoZYGdaEqqFG3CKG1hfZEBFVdSl2iR5xq5EkF56tgTSvn4nK369LAnCg0Hyl2Nn01CM3v6WZ_eiIvdqR13T_0F_4A-31R2A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Detection Mechanisms for Unauthorized Wireless Transmissions</title><source>ACM Digital Library Complete</source><creator>Chang, Doohwang ; Bhat, Ganapati ; Ogras, Umit ; Bakkaloglu, Bertan ; Ozev, Sule</creator><creatorcontrib>Chang, Doohwang ; Bhat, Ganapati ; Ogras, Umit ; Bakkaloglu, Bertan ; Ozev, Sule</creatorcontrib><description>With increasing diversity of supply chains from design to delivery, there is an increasing risk that unauthorized changes can be made within an IC. One of the motivations for this type of change is to learn important information (such as encryption keys, spreading codes) from the hardware, and transmit this information to a malicious party. To evade detection, such unauthorized communication can be hidden within legitimate bursts of transmit signal. In this article, we present several signal processing techniques to detect unauthorized transmissions which can be hidden within the legitimate signal. We employ a scheme where the legitimate transmission is configured to emit a single sinusoidal waveform. We use time and spectral domain analysis techniques to explore the transmit spectrum. Since every transmission, no matter how low the signal power is, must have a spectral signature, we identify unauthorized transmission by eliminating the desired signal from the spectrum after capture. Experiment results show that when spread spectrum techniques are used, the presence of an unauthorized signal can be determined without the need for decoding the malicious signal. The proposed detection techniques need to be used as enhancements to the regular testing and verification procedures if hardware security is a concern.</description><identifier>ISSN: 1084-4309</identifier><identifier>EISSN: 1557-7309</identifier><identifier>DOI: 10.1145/3241046</identifier><language>eng</language><publisher>New York, NY, USA: ACM</publisher><subject>Hardware attacks and countermeasures ; Security and privacy ; Security in hardware</subject><ispartof>ACM transactions on design automation of electronic systems, 2018-12, Vol.23 (6), p.1-21, Article 70</ispartof><rights>ACM</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-a244t-3d419bc4e7db2f937152480915b10fba25deee08963561d11a24ede4fcd8fa7b3</citedby><cites>FETCH-LOGICAL-a244t-3d419bc4e7db2f937152480915b10fba25deee08963561d11a24ede4fcd8fa7b3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://dl.acm.org/doi/pdf/10.1145/3241046$$EPDF$$P50$$Gacm$$H</linktopdf><link.rule.ids>314,776,780,2276,27901,27902,40172,75971</link.rule.ids></links><search><creatorcontrib>Chang, Doohwang</creatorcontrib><creatorcontrib>Bhat, Ganapati</creatorcontrib><creatorcontrib>Ogras, Umit</creatorcontrib><creatorcontrib>Bakkaloglu, Bertan</creatorcontrib><creatorcontrib>Ozev, Sule</creatorcontrib><title>Detection Mechanisms for Unauthorized Wireless Transmissions</title><title>ACM transactions on design automation of electronic systems</title><addtitle>ACM TODAES</addtitle><description>With increasing diversity of supply chains from design to delivery, there is an increasing risk that unauthorized changes can be made within an IC. One of the motivations for this type of change is to learn important information (such as encryption keys, spreading codes) from the hardware, and transmit this information to a malicious party. To evade detection, such unauthorized communication can be hidden within legitimate bursts of transmit signal. In this article, we present several signal processing techniques to detect unauthorized transmissions which can be hidden within the legitimate signal. We employ a scheme where the legitimate transmission is configured to emit a single sinusoidal waveform. We use time and spectral domain analysis techniques to explore the transmit spectrum. Since every transmission, no matter how low the signal power is, must have a spectral signature, we identify unauthorized transmission by eliminating the desired signal from the spectrum after capture. Experiment results show that when spread spectrum techniques are used, the presence of an unauthorized signal can be determined without the need for decoding the malicious signal. The proposed detection techniques need to be used as enhancements to the regular testing and verification procedures if hardware security is a concern.</description><subject>Hardware attacks and countermeasures</subject><subject>Security and privacy</subject><subject>Security in hardware</subject><issn>1084-4309</issn><issn>1557-7309</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><recordid>eNo9j81LxDAUxIMouK7i3VNvnqrvNUnTghdZP2HFyy4eS5q8sJFtK3n1oH-9lV09zcD8ZmCEOEe4QlT6WhYKQZUHYoZam9xIqA8nD5XK1eSPxQnzOwBoU-qZuLmjkdwYhz57IbexfeSOszCkbN3bz3EzpPhNPnuLibbEnK2S7bmLzFODT8VRsFums73OxfrhfrV4ypevj8-L22VuC6XGXHqFdesUGd8WoZYGdaEqqFG3CKG1hfZEBFVdSl2iR5xq5EkF56tgTSvn4nK369LAnCg0Hyl2Nn01CM3v6WZ_eiIvdqR13T_0F_4A-31R2A</recordid><startdate>20181201</startdate><enddate>20181201</enddate><creator>Chang, Doohwang</creator><creator>Bhat, Ganapati</creator><creator>Ogras, Umit</creator><creator>Bakkaloglu, Bertan</creator><creator>Ozev, Sule</creator><general>ACM</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20181201</creationdate><title>Detection Mechanisms for Unauthorized Wireless Transmissions</title><author>Chang, Doohwang ; Bhat, Ganapati ; Ogras, Umit ; Bakkaloglu, Bertan ; Ozev, Sule</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a244t-3d419bc4e7db2f937152480915b10fba25deee08963561d11a24ede4fcd8fa7b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Hardware attacks and countermeasures</topic><topic>Security and privacy</topic><topic>Security in hardware</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Chang, Doohwang</creatorcontrib><creatorcontrib>Bhat, Ganapati</creatorcontrib><creatorcontrib>Ogras, Umit</creatorcontrib><creatorcontrib>Bakkaloglu, Bertan</creatorcontrib><creatorcontrib>Ozev, Sule</creatorcontrib><collection>CrossRef</collection><jtitle>ACM transactions on design automation of electronic systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Chang, Doohwang</au><au>Bhat, Ganapati</au><au>Ogras, Umit</au><au>Bakkaloglu, Bertan</au><au>Ozev, Sule</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Detection Mechanisms for Unauthorized Wireless Transmissions</atitle><jtitle>ACM transactions on design automation of electronic systems</jtitle><stitle>ACM TODAES</stitle><date>2018-12-01</date><risdate>2018</risdate><volume>23</volume><issue>6</issue><spage>1</spage><epage>21</epage><pages>1-21</pages><artnum>70</artnum><issn>1084-4309</issn><eissn>1557-7309</eissn><abstract>With increasing diversity of supply chains from design to delivery, there is an increasing risk that unauthorized changes can be made within an IC. One of the motivations for this type of change is to learn important information (such as encryption keys, spreading codes) from the hardware, and transmit this information to a malicious party. To evade detection, such unauthorized communication can be hidden within legitimate bursts of transmit signal. In this article, we present several signal processing techniques to detect unauthorized transmissions which can be hidden within the legitimate signal. We employ a scheme where the legitimate transmission is configured to emit a single sinusoidal waveform. We use time and spectral domain analysis techniques to explore the transmit spectrum. Since every transmission, no matter how low the signal power is, must have a spectral signature, we identify unauthorized transmission by eliminating the desired signal from the spectrum after capture. Experiment results show that when spread spectrum techniques are used, the presence of an unauthorized signal can be determined without the need for decoding the malicious signal. The proposed detection techniques need to be used as enhancements to the regular testing and verification procedures if hardware security is a concern.</abstract><cop>New York, NY, USA</cop><pub>ACM</pub><doi>10.1145/3241046</doi><tpages>21</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1084-4309 |
ispartof | ACM transactions on design automation of electronic systems, 2018-12, Vol.23 (6), p.1-21, Article 70 |
issn | 1084-4309 1557-7309 |
language | eng |
recordid | cdi_crossref_primary_10_1145_3241046 |
source | ACM Digital Library Complete |
subjects | Hardware attacks and countermeasures Security and privacy Security in hardware |
title | Detection Mechanisms for Unauthorized Wireless Transmissions |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T23%3A18%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-acm_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Detection%20Mechanisms%20for%20Unauthorized%20Wireless%20Transmissions&rft.jtitle=ACM%20transactions%20on%20design%20automation%20of%20electronic%20systems&rft.au=Chang,%20Doohwang&rft.date=2018-12-01&rft.volume=23&rft.issue=6&rft.spage=1&rft.epage=21&rft.pages=1-21&rft.artnum=70&rft.issn=1084-4309&rft.eissn=1557-7309&rft_id=info:doi/10.1145/3241046&rft_dat=%3Cacm_cross%3E3241046%3C/acm_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |