Saturday, July 20, 2024

Hardware Trojans Within IoT Systems Intensify Side-Channel Attacks

- Advertisement -

Trojans in a software sense instantly connects with engineers across the world. This is because these actors are considered as dangerous threats to digital networks. Now, a new threat in the form of hardware trojans is also looming imminent as per experts.

Therefore, in a bid to understand hardware trojans in detail, and to bring to light the level of security threat these pose to systems, Rahul R of Electronics For You spoke to Sudeendra Kumar K who is a seasoned engineer and a researcher at the National Institute of Technology, Rourkela.

Q. Speaking about hardware trojans, the first thing that naturally comes to mind is the level of threat; hence, have you come across instances wherein there has been monetary loss due to hardware trojans?

A. Incidents of financial misappropriation due to hardware trojans is still yet to take place; however, the department of defense has identified malicious happenings and has come out with a list of components that are classified as the ones designed with the intention of spreading malicious hardware. 

Sudeendra Kumar K - Hardware Trojans
Sudeendra Kumar K – Researcher at National Institute of Technology Rourkela

Side channel attacks (SCA) on Cryptographic implementations is well known and most of the microcontrollers targeted for security applications also have countermeasures against side channel attacks. Due to SCA, people have lost money during credit card related transactions.

Successful SCA needs expertise and sophisticated power and timing measurement equipments.  And also, it depends on amount of samples which are significant to find out the secret key or data.  

- Advertisement -

Hardware Trojans (HT) are basically malicious inclusions by an adversary, who is a part of design team in chip design house or in a semiconductor IP company.The intentions of an adversary may be leaking secret data or an attack similar to denial of service. Adversary’s intention may vary from design to design depending on application in which IC is used.  

Most of the HT found today is either denial of service type or SCA promoting attack. HT makes SCA easy.

Q. From your statement above, the damaging potential of hardware trojans can be identified; now, how has been the awareness levels in India with respect to hardware trojans?

A. All the System-On-Chip (SoC) makers are incorporating countermeasures against side-channel attacks in their products used in security applications. Since, hardware trojans are extensions of side-channels (HT make SCA easy), research is yet to take place intensively in India and abroad.  

Some amount of serious work on HT can be found in academics (including few Indian universities) and we can see good amount of research papers getting published on HT in high quality conferences (IEEE, ACM etc). Still, awareness on HT in industry and corporate sector is not very high. There may be few multi-national corporations (MNCs) that have started working  on HT.

Q. How should you think that our industries should gear up to combat hardware trojans?

A. Detection of the source of hardware trojans is paramount. HT detection is a multi-dimensional problem. SoC makers normally source IP cores (Intellectual Property) from third-party vendors. This predicament opens up gateway for hardware trojans. Even in the case of internal development of chip components, there could be blacksheeps (adversary) within design engineering teams who could introduce hardware trojans at any level (RTL, Gate level netlist, layout and also during fabrication in foundry).

An important aspect to note is that hardware trojans can trigger (based on a timer) after lying dormant for months together. Now, imagine such a chip being incorporated in entities such as aircrafts and defence, the loss would be almost irreplaceable in these circumstances.

All the chip makers should have trusted security team in place to check the malicious inclusions in the design. Just like tool flows are standardized for test, verification etc, there is a need to build EDA tools and standardize the tool flow for Design for Security (DfS) or Design for Trust (DfTr).   A trusted fabrication and production labs are also the need of the hour.  

Q. Now with Industry 4.0 making rapid strides, would the risk of hardware trojans increase, if yes, and how should these be mitigated?

A. In Industry 4.0, there is a need for four-layered security design (hardware, firmware network and application). HT belongs to first two layers: – hardware and firmware level.  Mitigation of issues should start from the level of choosing the right micro-controllers/devices. Identification and authentication should be critically adhered to in the case of IoT-specific devices.  

Understanding a supply chain is very important. It is required for system developer to know where devices are designed, manufactured and tested. And also, chip makers should demonstrate to their customers, what are all security measures against HT or IoT security measures they have taken, so that they can market their products better.

Now, as far as the exact threats in Industry 4.0 are concerned, it is undoubtedly the denial of service (DoS) is a major threat. A solid defense mechanism should be put in place to take damage control when HT becomes active.

For example: DoS HT can change the value of program counter in microcontroller suddenly which may lead to system crash.  Detection of HT discussed above is important and at the same time, HT defence is very important. Even with very good security verification mechanisms during design phase, few malicious inclusions may escape security verification procedures and sneak into chips.

As a last rescue, HT defence mechanism will save the end user from catastrophes.  So system developers in IoT space, should choose right microcontroller not only fits their targeted application but also support their security requirements.

chip makers or System on Chip makers should incorporate dedicated security IP or block to support the security requirements of IoT systems (addressing the security at hardware level). It is always better to have root of trust from hardware.

IoT engineers and solution providers should properly analyse the existing defence mechanism with respect to microcontrollers. Also, potential side-channel attacks should be predicted and appropriate security software should be put in place.

Q. Finally, your advice to industries to combat hardware trojans.

A. I would like to advice industries to follow the components procurement mechanism that is currently adapted by the military and defence establishments. This requires time and effort to adapt into commercial practice, but when done, the security gains are long term.

Even governments can take cue from Defence  with respect to components procurement and create separate policies for IoT-specific procurement to ensure maximum security at both hardware as well as firmware levels.  All the issues discussed with respect to chips (microcontrollers and System on chips) is equally applicable to FPGA’s also.

Industry (Chip makers, Semiconductor IP vendors, Service providers from IC design to post silicon test, system developers) should come together to create a security certification agency or a consortium to ensure security through establishing security standards for chip makers, IP vendors and service providers.

Success of Industry 4.0 depends upon how holistically security is addressed from hardware layer to application layer.  


Unique DIY Projects

Electronics News

Truly Innovative Tech

MOst Popular Videos

Electronics Components