Hardware Security Breaches: Alarming Exploits Beyond Tampering


Authors : Johnbasco Vijay Anand. J

Volume/Issue : Volume 9 - 2024, Issue 9 - September


Google Scholar : https://tinyurl.com/mrjb3mfk

Scribd : https://tinyurl.com/mwcwfbks

DOI : https://doi.org/10.38124/ijisrt/IJISRT24SEP1231

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : Side Channel Attacks (SCAs) and Fault Injection Attacks have emerged as significant threats to the security of electronic devices. This paper explores these hardware attack vectors in the context of recent incidents [11] involving pagers and walkie-talkies. We shall deep dive into the possible mechanisms of these attacks, how they can be combined for increased efficacy, and their implications for device security. This paper discusses only the possible ways [1] the adversaries could have exploited and may include other attack vectors such as supply chain attack and few others. The aim of this paper as we discuss the potential attack mechanisms is only to focus on mitigations and awareness of the reader to perform advanced security testing.

References :

  1. The Hardware Security Threat Landscape and Possible Countermeasures: A Survey. ACM Computing Surveys (CSUR), vol. 53, no. 6, 2020.
  2. M. Tehranipoor and F. Koushanfar, "Trustworthy Hardware: Trojan Detection and Prevention Methods in Supply Chain," IEEE Design & Test of Computers, vol. 27, no. 1, pp. 10-25, 2010.
  3. J. Rajendran, et al., "Hardware Trojans: Threats and Emerging Solutions," Proc. IEEE, vol. 102, no. 8, pp. 1229-1247, 2014.
  4. G. T. Becker, F. Regazzoni, C. Paar, and W. Burleson, "Stealthy Dopant-Level Hardware Trojans: Extended Version," IEEE Trans. on CAD of Integrated Circuits and Systems, vol. 33, no. 12, pp. 1778-1791, Dec. 2014.
  5. P. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," in Proc. Advances in Cryptology (CRYPTO), pp. 388-397, 1999.
  6. Y. Jin and D. Sullivan, "Hardware Security: Threat Models and Security Requirements," in IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2016.
  7. M. Potkonjak et al., "Hardware Trojan Design and Implementation Challenges," in IEEE Int. Conf. on Computer Design (ICCD), 2011.
  8. D. Mukhopadhyay, R. S. Chakraborty, and C. Paar, "Hardware Security: Design, Threats, and Safeguards," IEEE Computer Society, 2013.
  9. T. Xu, W. Burleson, and D. Holcomb, "Using Environmental Noise as a Source of Entropy for Purely Digital True Random Number Generators," IEEE Trans. on Computers, vol. 62, no. 8, pp. 1524-1537, 2013.
  10. M. T. Rahman and M. Tehranipoor, "A Comprehensive Survey of Defense Mechanisms against Hardware Trojan Attacks," IEEE Trans. on Design and Test, vol. 30, no. 1, pp. 26-45, Jan. 2013.
  11. https://en.wikipedia.org/wiki/2024_Lebanon_pager_explosions
  12. https://www.hextree.io/

Side Channel Attacks (SCAs) and Fault Injection Attacks have emerged as significant threats to the security of electronic devices. This paper explores these hardware attack vectors in the context of recent incidents [11] involving pagers and walkie-talkies. We shall deep dive into the possible mechanisms of these attacks, how they can be combined for increased efficacy, and their implications for device security. This paper discusses only the possible ways [1] the adversaries could have exploited and may include other attack vectors such as supply chain attack and few others. The aim of this paper as we discuss the potential attack mechanisms is only to focus on mitigations and awareness of the reader to perform advanced security testing.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe