Capacitance Measurement of Running Hardware Devices and its Application to Malicious Modification Detection

Makoto Nishizawa, Kento Hasegawa, Nozomu Togawa

    研究成果: Conference contribution

    抄録

    In IoT (Internet-of-Things) era, the number and variety of hardware devices become continuously increasing. At that time, if an attacker can directly modify a hardware device and insert a malicious circuit into it, we may face severe security risk. The malicious device normally sleeps and is separated from the original hardware device. It can be rarely activated and works as a malicious function. Capacitance measurement is one of the very powerful ways to detect a malicious device. Particularly, measuring capacitance while the hardware device is running is a major challenge but there exists no such researches proposed so far. This paper proposes a capacitance measuring device which measures device capacitance in operation. We firstly combine the AC (alternating current) voltage signal with the DC (direct current) supply voltage signal and generates the offset signal. We supply the offset signal to the target device instead of supplying the DC supply voltage. Then it is theoretically shown that, by effectively filtering the observed current in the target device, the filtered current can be proportional to the capacitance value and thus we can measure the target device capacitance even when it is running. We have implemented the proposed capacitance measuring device on the printed wiring board with the size of 100mm × 81.3mm and applied to the hardware device with a small malicious device. The experiments demonstrate that the proposed capacitance measuring device successfully detects the malicious hardware installed on the original hardware device.

    元の言語English
    ホスト出版物のタイトル2018 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2018
    出版者Institute of Electrical and Electronics Engineers Inc.
    ページ362-365
    ページ数4
    ISBN(電子版)9781538682401
    DOI
    出版物ステータスPublished - 2019 1 8
    イベント14th IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2018 - Chengdu, China
    継続期間: 2018 10 262018 10 30

    出版物シリーズ

    名前2018 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2018

    Conference

    Conference14th IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2018
    China
    Chengdu
    期間18/10/2618/10/30

    Fingerprint

    Capacitance measurement
    hardware
    Capacitance
    capacitance
    Hardware
    Electric potential
    Printed circuit boards
    electric potential
    direct current
    Networks (circuits)
    sleep
    wiring
    supplying
    inserts

    ASJC Scopus subject areas

    • Biomedical Engineering
    • Electrical and Electronic Engineering
    • Instrumentation

    これを引用

    Nishizawa, M., Hasegawa, K., & Togawa, N. (2019). Capacitance Measurement of Running Hardware Devices and its Application to Malicious Modification Detection. : 2018 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2018 (pp. 362-365). [8605668] (2018 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2018). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/APCCAS.2018.8605668

    Capacitance Measurement of Running Hardware Devices and its Application to Malicious Modification Detection. / Nishizawa, Makoto; Hasegawa, Kento; Togawa, Nozomu.

    2018 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2018. Institute of Electrical and Electronics Engineers Inc., 2019. p. 362-365 8605668 (2018 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2018).

    研究成果: Conference contribution

    Nishizawa, M, Hasegawa, K & Togawa, N 2019, Capacitance Measurement of Running Hardware Devices and its Application to Malicious Modification Detection. : 2018 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2018., 8605668, 2018 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2018, Institute of Electrical and Electronics Engineers Inc., pp. 362-365, 14th IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2018, Chengdu, China, 18/10/26. https://doi.org/10.1109/APCCAS.2018.8605668
    Nishizawa M, Hasegawa K, Togawa N. Capacitance Measurement of Running Hardware Devices and its Application to Malicious Modification Detection. : 2018 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2018. Institute of Electrical and Electronics Engineers Inc. 2019. p. 362-365. 8605668. (2018 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2018). https://doi.org/10.1109/APCCAS.2018.8605668
    Nishizawa, Makoto ; Hasegawa, Kento ; Togawa, Nozomu. / Capacitance Measurement of Running Hardware Devices and its Application to Malicious Modification Detection. 2018 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2018. Institute of Electrical and Electronics Engineers Inc., 2019. pp. 362-365 (2018 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2018).
    @inproceedings{a5395439b9a843b1ad566da5159932ac,
    title = "Capacitance Measurement of Running Hardware Devices and its Application to Malicious Modification Detection",
    abstract = "In IoT (Internet-of-Things) era, the number and variety of hardware devices become continuously increasing. At that time, if an attacker can directly modify a hardware device and insert a malicious circuit into it, we may face severe security risk. The malicious device normally sleeps and is separated from the original hardware device. It can be rarely activated and works as a malicious function. Capacitance measurement is one of the very powerful ways to detect a malicious device. Particularly, measuring capacitance while the hardware device is running is a major challenge but there exists no such researches proposed so far. This paper proposes a capacitance measuring device which measures device capacitance in operation. We firstly combine the AC (alternating current) voltage signal with the DC (direct current) supply voltage signal and generates the offset signal. We supply the offset signal to the target device instead of supplying the DC supply voltage. Then it is theoretically shown that, by effectively filtering the observed current in the target device, the filtered current can be proportional to the capacitance value and thus we can measure the target device capacitance even when it is running. We have implemented the proposed capacitance measuring device on the printed wiring board with the size of 100mm × 81.3mm and applied to the hardware device with a small malicious device. The experiments demonstrate that the proposed capacitance measuring device successfully detects the malicious hardware installed on the original hardware device.",
    keywords = "capacitance measurement, hardware security, malicious function detection",
    author = "Makoto Nishizawa and Kento Hasegawa and Nozomu Togawa",
    year = "2019",
    month = "1",
    day = "8",
    doi = "10.1109/APCCAS.2018.8605668",
    language = "English",
    series = "2018 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2018",
    publisher = "Institute of Electrical and Electronics Engineers Inc.",
    pages = "362--365",
    booktitle = "2018 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2018",

    }

    TY - GEN

    T1 - Capacitance Measurement of Running Hardware Devices and its Application to Malicious Modification Detection

    AU - Nishizawa, Makoto

    AU - Hasegawa, Kento

    AU - Togawa, Nozomu

    PY - 2019/1/8

    Y1 - 2019/1/8

    N2 - In IoT (Internet-of-Things) era, the number and variety of hardware devices become continuously increasing. At that time, if an attacker can directly modify a hardware device and insert a malicious circuit into it, we may face severe security risk. The malicious device normally sleeps and is separated from the original hardware device. It can be rarely activated and works as a malicious function. Capacitance measurement is one of the very powerful ways to detect a malicious device. Particularly, measuring capacitance while the hardware device is running is a major challenge but there exists no such researches proposed so far. This paper proposes a capacitance measuring device which measures device capacitance in operation. We firstly combine the AC (alternating current) voltage signal with the DC (direct current) supply voltage signal and generates the offset signal. We supply the offset signal to the target device instead of supplying the DC supply voltage. Then it is theoretically shown that, by effectively filtering the observed current in the target device, the filtered current can be proportional to the capacitance value and thus we can measure the target device capacitance even when it is running. We have implemented the proposed capacitance measuring device on the printed wiring board with the size of 100mm × 81.3mm and applied to the hardware device with a small malicious device. The experiments demonstrate that the proposed capacitance measuring device successfully detects the malicious hardware installed on the original hardware device.

    AB - In IoT (Internet-of-Things) era, the number and variety of hardware devices become continuously increasing. At that time, if an attacker can directly modify a hardware device and insert a malicious circuit into it, we may face severe security risk. The malicious device normally sleeps and is separated from the original hardware device. It can be rarely activated and works as a malicious function. Capacitance measurement is one of the very powerful ways to detect a malicious device. Particularly, measuring capacitance while the hardware device is running is a major challenge but there exists no such researches proposed so far. This paper proposes a capacitance measuring device which measures device capacitance in operation. We firstly combine the AC (alternating current) voltage signal with the DC (direct current) supply voltage signal and generates the offset signal. We supply the offset signal to the target device instead of supplying the DC supply voltage. Then it is theoretically shown that, by effectively filtering the observed current in the target device, the filtered current can be proportional to the capacitance value and thus we can measure the target device capacitance even when it is running. We have implemented the proposed capacitance measuring device on the printed wiring board with the size of 100mm × 81.3mm and applied to the hardware device with a small malicious device. The experiments demonstrate that the proposed capacitance measuring device successfully detects the malicious hardware installed on the original hardware device.

    KW - capacitance measurement

    KW - hardware security

    KW - malicious function detection

    UR - http://www.scopus.com/inward/record.url?scp=85062222572&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=85062222572&partnerID=8YFLogxK

    U2 - 10.1109/APCCAS.2018.8605668

    DO - 10.1109/APCCAS.2018.8605668

    M3 - Conference contribution

    T3 - 2018 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2018

    SP - 362

    EP - 365

    BT - 2018 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2018

    PB - Institute of Electrical and Electronics Engineers Inc.

    ER -