Abstract
A closed-loop system is a primary technology used to automate our critical infrastructure and major industries to improve their efficiency. Their dependability is challenged by probable vulnerabilities in the core computing system. These vulnerabilities can appear on both front (software) and back (hardware) ends of the computing system. While the software vulnerabilities are well researched and documented, the hardware ones are normally overlooked. However, with hardware-inclusive technological evolutions like Cyber-Physical Systems and Internet-of-Things, hardware vulnerabilities should be addressed appropriately. In this work, we present a study of one such vulnerability, called Hardware Trojan (HT), on a closed-loop control system. Since a typical hardware Trojan is a small and stealthy digital circuit, we present a test platform built using FPGA-in-the-loop, where the computing system is represented as a digital hardware. Through this platform, a comprehensive runtime analysis of hardware Trojan is accomplished and we developed four threat models that can lead to destabilization of the closed-loop system causing hazardous conditions. Since the primary objective is to study the effects of hardware Trojans, they are designed in such a way that they can be accessible and controllable.
Similar content being viewed by others
References
Aboelaze, M., Shehata, M.G.: Implementation of multiple PID controllers on FPGA. In: 2015 IEEE International Conference on Electronics, Circuits, and Systems (ICECS), Cairo, pp. 446–449 (2015). doi: https://doi.org/10.1109/ICECS.2015.7440344
Shila, D.M., Venugopal, V.: Design, implementation and security analysis of hardware trojan threats in FPGA. In: Communication and Information Systems Security Symposium, IEEE ICC (2014)
Lv, Y.Q., Zhou, Q., Cai, Y.C.: Trusted integrated circuits: the problem and challenges. J. Comput. Sci. Technol. 29(5), 918–928 (2014). https://doi.org/10.1007/s11390-014-1479-9
Karri, R., Rajendran, J., Rosenfeld, K., Tehranipoor, M.: Trustworthy hardware: identifying and classifying hardware trojans. Computer. 43(10), 39–46 (2010)
Adee, S.: the hunt for the kill switch. Spectrum IEEE. 45(5), 34–39 (2008)
Jin, Y., Kupp, N., Makris, Y.: Experiences in hardware trojan design and implementation. In: 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, Francisco, CA pp. 50–57
Wang, X., Tehranipoor, M., Plusquellic, J.: Detecting malicious inclusions in secure hardware: challenges and solutions. In: Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, HST’08, IEEE Computer Society, Washington, DC, USA, pp. 15–19 (2008)
Soden, J., Anderson, R., Henderson, C.: IC failure analysis tools and techniques – magic, mystery, and science. In: International Test Conference, Lecture Series II “Practical Aspects of IC Diagnosis and Failure Analysis: A Walk through the Process”, pp. 1–11. (1996)
Nise Norman, S.: Control system engineering, 3rd edn. John Wiley & Sons, Inc, New York, NY (2000)
MathWorks, HDL Coder: https://www.mathworks.com/products/hdl-coder.html
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Kumar, R., Lingasubramanian, K. (2017). Study of Hardware Trojans in a Closed Loop Control System for an Internet-of-Things Application. In: Suh, S., Anthony, T. (eds) Big Data and Visual Analytics. Springer, Cham. https://doi.org/10.1007/978-3-319-63917-8_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-63917-8_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-63915-4
Online ISBN: 978-3-319-63917-8
eBook Packages: Computer ScienceComputer Science (R0)