Authors :
Johnbasco Vijay Anand. J
Volume/Issue :
Volume 9 - 2024, Issue 9 - September
Google Scholar :
https://tinyurl.com/mrjb3mfk
Scribd :
https://tinyurl.com/mwcwfbks
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24SEP1231
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
Side Channel Attacks (SCAs) and Fault
Injection Attacks have emerged as significant threats to
the security of electronic devices. This paper explores these
hardware attack vectors in the context of recent incidents
[11] involving pagers and walkie-talkies. We shall deep
dive into the possible mechanisms of these attacks, how
they can be combined for increased efficacy, and their
implications for device security. This paper discusses only
the possible ways [1] the adversaries could have exploited
and may include other attack vectors such as supply chain
attack and few others. The aim of this paper as we discuss
the potential attack mechanisms is only to focus on
mitigations and awareness of the reader to perform
advanced security testing.
References :
- The Hardware Security Threat Landscape and Possible Countermeasures: A Survey. ACM Computing Surveys (CSUR), vol. 53, no. 6, 2020.
- M. Tehranipoor and F. Koushanfar, "Trustworthy Hardware: Trojan Detection and Prevention Methods in Supply Chain," IEEE Design & Test of Computers, vol. 27, no. 1, pp. 10-25, 2010.
- J. Rajendran, et al., "Hardware Trojans: Threats and Emerging Solutions," Proc. IEEE, vol. 102, no. 8, pp. 1229-1247, 2014.
- G. T. Becker, F. Regazzoni, C. Paar, and W. Burleson, "Stealthy Dopant-Level Hardware Trojans: Extended Version," IEEE Trans. on CAD of Integrated Circuits and Systems, vol. 33, no. 12, pp. 1778-1791, Dec. 2014.
- P. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," in Proc. Advances in Cryptology (CRYPTO), pp. 388-397, 1999.
- Y. Jin and D. Sullivan, "Hardware Security: Threat Models and Security Requirements," in IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2016.
- M. Potkonjak et al., "Hardware Trojan Design and Implementation Challenges," in IEEE Int. Conf. on Computer Design (ICCD), 2011.
- D. Mukhopadhyay, R. S. Chakraborty, and C. Paar, "Hardware Security: Design, Threats, and Safeguards," IEEE Computer Society, 2013.
- T. Xu, W. Burleson, and D. Holcomb, "Using Environmental Noise as a Source of Entropy for Purely Digital True Random Number Generators," IEEE Trans. on Computers, vol. 62, no. 8, pp. 1524-1537, 2013.
- M. T. Rahman and M. Tehranipoor, "A Comprehensive Survey of Defense Mechanisms against Hardware Trojan Attacks," IEEE Trans. on Design and Test, vol. 30, no. 1, pp. 26-45, Jan. 2013.
- https://en.wikipedia.org/wiki/2024_Lebanon_pager_explosions
- https://www.hextree.io/
Side Channel Attacks (SCAs) and Fault
Injection Attacks have emerged as significant threats to
the security of electronic devices. This paper explores these
hardware attack vectors in the context of recent incidents
[11] involving pagers and walkie-talkies. We shall deep
dive into the possible mechanisms of these attacks, how
they can be combined for increased efficacy, and their
implications for device security. This paper discusses only
the possible ways [1] the adversaries could have exploited
and may include other attack vectors such as supply chain
attack and few others. The aim of this paper as we discuss
the potential attack mechanisms is only to focus on
mitigations and awareness of the reader to perform
advanced security testing.