Evaluation of EM information leakage caused by IEMI with hardware Trojan

Masahiro Kinugawa, Yu Ichi Hayashi, Tatsuya Mori

    Research output: Contribution to journalArticle

    Abstract

    Hardware Trojans (HT) that are implemented at the time of manufacturing ICs are being reported as a new threat that could destroy the IC or degrade its security under specific circumstances, and is becoming a key security challenge that must be addressed. On the other hand, since it is also common to use components manufactured or bought via third parties in portions outside of the substrate on which the IC is mounted or communication lines connecting the IC and the substrate, there is a possibility that HTs may also be set in the peripheral circuits of the IC in the same manner as in the IC. In this paper, we developed an HT that could be implemented in the peripheral circuits and wiring of an IC, investigated the possibility of being able to acquire information processed inside a device by measuring the electromagnetic waves generated and leaked by Intentional Electromagnetic Interference (IEMI) with HT outside the device, and investigated detection methods for cases where such HTs are implemented.

    Original languageEnglish
    Pages (from-to)153-157
    Number of pages5
    JournalIEEJ Transactions on Fundamentals and Materials
    Volume137
    Issue number3
    DOIs
    Publication statusPublished - 2017

    Fingerprint

    Signal interference
    Hardware
    Networks (circuits)
    Electric wiring
    Substrates
    Electromagnetic waves
    Communication
    Hardware security

    Keywords

    • Electromagnetic information leakage
    • Hardware Trojans
    • Intentional electromagnetic interference

    ASJC Scopus subject areas

    • Electrical and Electronic Engineering

    Cite this

    Evaluation of EM information leakage caused by IEMI with hardware Trojan. / Kinugawa, Masahiro; Hayashi, Yu Ichi; Mori, Tatsuya.

    In: IEEJ Transactions on Fundamentals and Materials, Vol. 137, No. 3, 2017, p. 153-157.

    Research output: Contribution to journalArticle

    @article{47d493184cca46d49ead00b6daf08785,
    title = "Evaluation of EM information leakage caused by IEMI with hardware Trojan",
    abstract = "Hardware Trojans (HT) that are implemented at the time of manufacturing ICs are being reported as a new threat that could destroy the IC or degrade its security under specific circumstances, and is becoming a key security challenge that must be addressed. On the other hand, since it is also common to use components manufactured or bought via third parties in portions outside of the substrate on which the IC is mounted or communication lines connecting the IC and the substrate, there is a possibility that HTs may also be set in the peripheral circuits of the IC in the same manner as in the IC. In this paper, we developed an HT that could be implemented in the peripheral circuits and wiring of an IC, investigated the possibility of being able to acquire information processed inside a device by measuring the electromagnetic waves generated and leaked by Intentional Electromagnetic Interference (IEMI) with HT outside the device, and investigated detection methods for cases where such HTs are implemented.",
    keywords = "Electromagnetic information leakage, Hardware Trojans, Intentional electromagnetic interference",
    author = "Masahiro Kinugawa and Hayashi, {Yu Ichi} and Tatsuya Mori",
    year = "2017",
    doi = "10.1541/ieejfms.137.153",
    language = "English",
    volume = "137",
    pages = "153--157",
    journal = "IEEJ Transactions on Fundamentals and Materials",
    issn = "0385-4205",
    publisher = "The Institute of Electrical Engineers of Japan",
    number = "3",

    }

    TY - JOUR

    T1 - Evaluation of EM information leakage caused by IEMI with hardware Trojan

    AU - Kinugawa, Masahiro

    AU - Hayashi, Yu Ichi

    AU - Mori, Tatsuya

    PY - 2017

    Y1 - 2017

    N2 - Hardware Trojans (HT) that are implemented at the time of manufacturing ICs are being reported as a new threat that could destroy the IC or degrade its security under specific circumstances, and is becoming a key security challenge that must be addressed. On the other hand, since it is also common to use components manufactured or bought via third parties in portions outside of the substrate on which the IC is mounted or communication lines connecting the IC and the substrate, there is a possibility that HTs may also be set in the peripheral circuits of the IC in the same manner as in the IC. In this paper, we developed an HT that could be implemented in the peripheral circuits and wiring of an IC, investigated the possibility of being able to acquire information processed inside a device by measuring the electromagnetic waves generated and leaked by Intentional Electromagnetic Interference (IEMI) with HT outside the device, and investigated detection methods for cases where such HTs are implemented.

    AB - Hardware Trojans (HT) that are implemented at the time of manufacturing ICs are being reported as a new threat that could destroy the IC or degrade its security under specific circumstances, and is becoming a key security challenge that must be addressed. On the other hand, since it is also common to use components manufactured or bought via third parties in portions outside of the substrate on which the IC is mounted or communication lines connecting the IC and the substrate, there is a possibility that HTs may also be set in the peripheral circuits of the IC in the same manner as in the IC. In this paper, we developed an HT that could be implemented in the peripheral circuits and wiring of an IC, investigated the possibility of being able to acquire information processed inside a device by measuring the electromagnetic waves generated and leaked by Intentional Electromagnetic Interference (IEMI) with HT outside the device, and investigated detection methods for cases where such HTs are implemented.

    KW - Electromagnetic information leakage

    KW - Hardware Trojans

    KW - Intentional electromagnetic interference

    UR - http://www.scopus.com/inward/record.url?scp=85015719986&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=85015719986&partnerID=8YFLogxK

    U2 - 10.1541/ieejfms.137.153

    DO - 10.1541/ieejfms.137.153

    M3 - Article

    AN - SCOPUS:85015719986

    VL - 137

    SP - 153

    EP - 157

    JO - IEEJ Transactions on Fundamentals and Materials

    JF - IEEJ Transactions on Fundamentals and Materials

    SN - 0385-4205

    IS - 3

    ER -