Skip to main content

Hardware Trojans and Piracy of PCBs

  • Chapter
  • First Online:
The Hardware Trojan War

Abstract

Malicious modification of a design in a foundry or design house (via hardware Trojan attacks) and counterfeiting attacks are intended to modify/disrupt and syphon information and profits from the host manufacturer. While these attacks have emerged as major security concerns for integrated circuits (ICs), a similar vulnerability, at a higher level, i.e., printed circuit board (PCB), can be more easily realized due to the highly distributed supply chain. Furthermore, the increasing complexity of modern PCBs and growing reliance on third-party entities make Trojan and counterfeiting attacks in PCBs highly feasible. In this chapter, we first describe the possible attack models and demonstrate instances of hardware Trojan insertion in fabricated PCBs that can either cause malfunction or leak secret information. We review the effectiveness of traditional PCB test methodologies in detecting these Trojans. We also present possible protection approaches against such attacks including a reverse engineering-based detection approach and a low-overhead preventive design solution. We then describe how extending integrated circuits (ICs) authentication techniques such as physically unclonable function (PUF) to isolate cloned PCBs can be realized. Additionally, analysis of various sources of variations in PCB and qualitatively studying the quality metrics to evaluate the PCB PUFs are also performed. Lastly, we describe few flavors of PCB PUFs by exploiting the manufacture-induced process variations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. R.S. Chakraborty, S. Narasimhan, S. Bhunia, Hardware Trojan: Threats and Emerging Solutions. in Proceedings of the IEEE International HLDVT Workshop, pp. 166–171, 2009

    Google Scholar 

  2. PCB manufacturers look forward to Ultrabook and Wintel, http://www.chinapcbs.com/

  3. Y. Alkabani, F. Koushanfar, Consistency-based characterization for IC Trojan detection, International Conference on Computer-Aided Design, 2009

    Google Scholar 

  4. H. Salmani, M. Tehranipoor, J. Plusquellic, A layout-aware approach for improving localized switching to detect hardware Trojans in Integrated Circuits, IEEE International Workshop on Information Forensics and Security (WIFS), 2010

    Google Scholar 

  5. F. Domke, Blackbox JTAG Reverse Engineering, http://events.ccc.de/congress/2009/Fahrplan/events/3670.en.html, 2009

  6. K. Rosenfeld, R. Karri, Attacks and defenses for JTAG. IEEE Des Test Comput 27(1), 36–47 (2010)

    Article  Google Scholar 

  7. A. Hennessy, Y. Zheng, S. Bhunia, JTAG-based robust PCB authentication for protection against counterfeiting attacks. In Design Automation Conference (ASP-DAC), 2016 21st Asia and South Pacific (pp. 56–61). IEEE, January 2016

    Google Scholar 

  8. K. Rosenfeld, R. Karri, Security and Testing, Introduction to Hardware Security and Trust (Springer, 2012)

    Google Scholar 

  9. N. Asadizanjani, A new methodology to protect PCBs from non-destructive reverse engineering, in 42nd International Symposium for Testing and Failure Analysis (6–10 November 2016). Asm

    Google Scholar 

  10. S. Ghosh, A. Basak, S. Bhunia, How secure are printed circuit boards against trojan attacks? IEEE Des Test 32(2), 7–16 (2015)

    Article  Google Scholar 

  11. S. Paley, T. Hoque, S. Bhunia, Active protection against PCB physical tampering, in Quality Electronic Design (ISQED), 2016 17th International Symposium on, pp. 356–361. IEEE, March 2016

    Google Scholar 

  12. Modchips: Wikipedia. [Online]. Available: https://en.wikipedia.org/wiki/Modchips

  13. Printed Circuit Board Test Methodologies, http://download.intel.com/design/chipsets/applnots/29817901.pdf

  14. J. Carlsson, Crosstalk on Printed Circuit Boards, 2nd edn., 1994

    Google Scholar 

  15. B. Sood, M. Pecht, Controlling Moisture in Printed Circuit Boards, IPC Apex EXPO Proceedings, 2010

    Google Scholar 

  16. G.E. Suh, S. Devadas, Physical unclonable functions for device authentication and secret key generation, in Proceedings of the 44th annual Design Automation Conference (ACM, 2007) pp. 9–14

    Google Scholar 

  17. L. Wei, C. Song, Y. Liu, J. Zhang, F. Yuan, X. Qiang, BoardPUF: Physical Unclonable Functions for printed circuit board authentication, in Computer-Aided Design (ICCAD), 2015 IEEE/ACM International Conference on, pp. 152–158. IEEE, 2015

    Google Scholar 

  18. F. Zhang, A. Hennessy, S. Bhunia, Robust counterfeit PCB detection exploiting intrinsic trace impedance variations, in 2015 IEEE 33rd VLSI Test Symposium (VTS), pp. 1–6. IEEE, 2015

    Google Scholar 

  19. A.S. Iyengar, Authentication of Printed Circuit Boards. In 42nd International Symposium for Testing and Failure Analysis (November 6–10, 2016). Asm

    Google Scholar 

  20. H. Rau, C.-H. Wu, Automatic optical inspection for detecting defects on printed circuit board inner layers. Int. J. Adv. Manuf. Technol. 25(9–10), 940–946 (2005)

    Article  Google Scholar 

  21. https://www.cadence.com/content/cadence-www/global/en_US/home/tools/allegro-downloads-start.html

Download references

Acknowledgments

This work supported by Semiconductor Research Corporation (#2727.001), National Science Foundation (CNS-1441757), and Defense Advanced Research Projects Agency under award #D15AP00089.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anirudh Iyengar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Iyengar, A., Ghosh, S. (2018). Hardware Trojans and Piracy of PCBs. In: Bhunia, S., Tehranipoor, M. (eds) The Hardware Trojan War. Springer, Cham. https://doi.org/10.1007/978-3-319-68511-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68511-3_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68510-6

  • Online ISBN: 978-3-319-68511-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics