Abstract
Malicious modification of a design in a foundry or design house (via hardware Trojan attacks) and counterfeiting attacks are intended to modify/disrupt and syphon information and profits from the host manufacturer. While these attacks have emerged as major security concerns for integrated circuits (ICs), a similar vulnerability, at a higher level, i.e., printed circuit board (PCB), can be more easily realized due to the highly distributed supply chain. Furthermore, the increasing complexity of modern PCBs and growing reliance on third-party entities make Trojan and counterfeiting attacks in PCBs highly feasible. In this chapter, we first describe the possible attack models and demonstrate instances of hardware Trojan insertion in fabricated PCBs that can either cause malfunction or leak secret information. We review the effectiveness of traditional PCB test methodologies in detecting these Trojans. We also present possible protection approaches against such attacks including a reverse engineering-based detection approach and a low-overhead preventive design solution. We then describe how extending integrated circuits (ICs) authentication techniques such as physically unclonable function (PUF) to isolate cloned PCBs can be realized. Additionally, analysis of various sources of variations in PCB and qualitatively studying the quality metrics to evaluate the PCB PUFs are also performed. Lastly, we describe few flavors of PCB PUFs by exploiting the manufacture-induced process variations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
R.S. Chakraborty, S. Narasimhan, S. Bhunia, Hardware Trojan: Threats and Emerging Solutions. in Proceedings of the IEEE International HLDVT Workshop, pp. 166–171, 2009
PCB manufacturers look forward to Ultrabook and Wintel, http://www.chinapcbs.com/
Y. Alkabani, F. Koushanfar, Consistency-based characterization for IC Trojan detection, International Conference on Computer-Aided Design, 2009
H. Salmani, M. Tehranipoor, J. Plusquellic, A layout-aware approach for improving localized switching to detect hardware Trojans in Integrated Circuits, IEEE International Workshop on Information Forensics and Security (WIFS), 2010
F. Domke, Blackbox JTAG Reverse Engineering, http://events.ccc.de/congress/2009/Fahrplan/events/3670.en.html, 2009
K. Rosenfeld, R. Karri, Attacks and defenses for JTAG. IEEE Des Test Comput 27(1), 36–47 (2010)
A. Hennessy, Y. Zheng, S. Bhunia, JTAG-based robust PCB authentication for protection against counterfeiting attacks. In Design Automation Conference (ASP-DAC), 2016 21st Asia and South Pacific (pp. 56–61). IEEE, January 2016
K. Rosenfeld, R. Karri, Security and Testing, Introduction to Hardware Security and Trust (Springer, 2012)
N. Asadizanjani, A new methodology to protect PCBs from non-destructive reverse engineering, in 42nd International Symposium for Testing and Failure Analysis (6–10 November 2016). Asm
S. Ghosh, A. Basak, S. Bhunia, How secure are printed circuit boards against trojan attacks? IEEE Des Test 32(2), 7–16 (2015)
S. Paley, T. Hoque, S. Bhunia, Active protection against PCB physical tampering, in Quality Electronic Design (ISQED), 2016 17th International Symposium on, pp. 356–361. IEEE, March 2016
Modchips: Wikipedia. [Online]. Available: https://en.wikipedia.org/wiki/Modchips
Printed Circuit Board Test Methodologies, http://download.intel.com/design/chipsets/applnots/29817901.pdf
J. Carlsson, Crosstalk on Printed Circuit Boards, 2nd edn., 1994
B. Sood, M. Pecht, Controlling Moisture in Printed Circuit Boards, IPC Apex EXPO Proceedings, 2010
G.E. Suh, S. Devadas, Physical unclonable functions for device authentication and secret key generation, in Proceedings of the 44th annual Design Automation Conference (ACM, 2007) pp. 9–14
L. Wei, C. Song, Y. Liu, J. Zhang, F. Yuan, X. Qiang, BoardPUF: Physical Unclonable Functions for printed circuit board authentication, in Computer-Aided Design (ICCAD), 2015 IEEE/ACM International Conference on, pp. 152–158. IEEE, 2015
F. Zhang, A. Hennessy, S. Bhunia, Robust counterfeit PCB detection exploiting intrinsic trace impedance variations, in 2015 IEEE 33rd VLSI Test Symposium (VTS), pp. 1–6. IEEE, 2015
A.S. Iyengar, Authentication of Printed Circuit Boards. In 42nd International Symposium for Testing and Failure Analysis (November 6–10, 2016). Asm
H. Rau, C.-H. Wu, Automatic optical inspection for detecting defects on printed circuit board inner layers. Int. J. Adv. Manuf. Technol. 25(9–10), 940–946 (2005)
https://www.cadence.com/content/cadence-www/global/en_US/home/tools/allegro-downloads-start.html
Acknowledgments
This work supported by Semiconductor Research Corporation (#2727.001), National Science Foundation (CNS-1441757), and Defense Advanced Research Projects Agency under award #D15AP00089.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
Iyengar, A., Ghosh, S. (2018). Hardware Trojans and Piracy of PCBs. In: Bhunia, S., Tehranipoor, M. (eds) The Hardware Trojan War. Springer, Cham. https://doi.org/10.1007/978-3-319-68511-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-68511-3_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68510-6
Online ISBN: 978-3-319-68511-3
eBook Packages: EngineeringEngineering (R0)