Skip to main content

Study of Hardware Trojans in a Closed Loop Control System for an Internet-of-Things Application

  • Conference paper
  • First Online:
Big Data and Visual Analytics

Abstract

A closed-loop system is a primary technology used to automate our critical infrastructure and major industries to improve their efficiency. Their dependability is challenged by probable vulnerabilities in the core computing system. These vulnerabilities can appear on both front (software) and back (hardware) ends of the computing system. While the software vulnerabilities are well researched and documented, the hardware ones are normally overlooked. However, with hardware-inclusive technological evolutions like Cyber-Physical Systems and Internet-of-Things, hardware vulnerabilities should be addressed appropriately. In this work, we present a study of one such vulnerability, called Hardware Trojan (HT), on a closed-loop control system. Since a typical hardware Trojan is a small and stealthy digital circuit, we present a test platform built using FPGA-in-the-loop, where the computing system is represented as a digital hardware. Through this platform, a comprehensive runtime analysis of hardware Trojan is accomplished and we developed four threat models that can lead to destabilization of the closed-loop system causing hazardous conditions. Since the primary objective is to study the effects of hardware Trojans, they are designed in such a way that they can be accessible and controllable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  1. Aboelaze, M., Shehata, M.G.: Implementation of multiple PID controllers on FPGA. In: 2015 IEEE International Conference on Electronics, Circuits, and Systems (ICECS), Cairo, pp. 446–449 (2015). doi: https://doi.org/10.1109/ICECS.2015.7440344

  2. Shila, D.M., Venugopal, V.: Design, implementation and security analysis of hardware trojan threats in FPGA. In: Communication and Information Systems Security Symposium, IEEE ICC (2014)

    Google Scholar 

  3. Lv, Y.Q., Zhou, Q., Cai, Y.C.: Trusted integrated circuits: the problem and challenges. J. Comput. Sci. Technol. 29(5), 918–928 (2014). https://doi.org/10.1007/s11390-014-1479-9

    Article  Google Scholar 

  4. Karri, R., Rajendran, J., Rosenfeld, K., Tehranipoor, M.: Trustworthy hardware: identifying and classifying hardware trojans. Computer. 43(10), 39–46 (2010)

    Article  Google Scholar 

  5. Adee, S.: the hunt for the kill switch. Spectrum IEEE. 45(5), 34–39 (2008)

    Article  Google Scholar 

  6. Jin, Y., Kupp, N., Makris, Y.: Experiences in hardware trojan design and implementation. In: 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, Francisco, CA pp. 50–57

    Google Scholar 

  7. Wang, X., Tehranipoor, M., Plusquellic, J.: Detecting malicious inclusions in secure hardware: challenges and solutions. In: Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, HST’08, IEEE Computer Society, Washington, DC, USA, pp. 15–19 (2008)

    Google Scholar 

  8. Soden, J., Anderson, R., Henderson, C.: IC failure analysis tools and techniques – magic, mystery, and science. In: International Test Conference, Lecture Series II “Practical Aspects of IC Diagnosis and Failure Analysis: A Walk through the Process”, pp. 1–11. (1996)

    Google Scholar 

  9. Online, http://www.idsc.ethz.ch/content/dam/ethz/special-interest/mavt/dynamic-systems-n-control/idsc-dam/Lectures/Control-Systems-2/RT2_skript_digitale_regelung_FS2015.pdf

  10. Nise Norman, S.: Control system engineering, 3rd edn. John Wiley & Sons, Inc, New York, NY (2000)

    MATH  Google Scholar 

  11. MathWorks, https://www.mathworks.com/help/control/ug/discrete-time-proportional-integral-derivative-pid-controller.html

  12. MathWorks, HDL Coder: https://www.mathworks.com/products/hdl-coder.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ranveer Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, R., Lingasubramanian, K. (2017). Study of Hardware Trojans in a Closed Loop Control System for an Internet-of-Things Application. In: Suh, S., Anthony, T. (eds) Big Data and Visual Analytics. Springer, Cham. https://doi.org/10.1007/978-3-319-63917-8_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-63917-8_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-63915-4

  • Online ISBN: 978-3-319-63917-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics