Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

PRISTINE: An Emulation Platform for PCB-Level Hardware Trojans

Journal Article · · IEEE Access
Printed circuit Boards (PCBs) are becoming increasingly vulnerable to malicious design alteration, also known as Trojan attacks, due to a distributed business model that often involves various untrusted parties. Such attacks can be mounted at various stages in the PCB life cycle. The relative ease of alteration of PCB hardware even after fabrication (due to physical access to surface-mounted critical components and traces) makes them attractive for an adversary to manipulate their functional/physical behavior for malicious intent. There is a growing need to explore viable Trojan attacks in a PCB, analyze their functional and physical characteristics (e.g., impact on power or delay), and study the effectiveness of countermeasures against these attacks. While simulation-based approaches for PCB Trojan insertion are effective at creating a large population of possible Trojans, they fail to provide functional feasibility analysis with a realistic workload for a trigger circuit. Also, they cannot estimate a Trojan’s side-channel footprint due to the unavailability of physical models of diverse PCB components. To address these deficiencies, in this paper, we present PRISTINE, a PCB-level emulation system for any integrity or physical tampering issues, specifically, hardware Trojan insertion. The need for building such an emulation platform to resolve PCB trust issues in the supply chain is also surveyed and discussed. Both custom Hardware Hacking (HaHa) boards and multiple commercial PCBs are then used to test the ability of the proposed system to emulate various hardware Trojans specially designed to exploit board-specific hardware characteristics. Experimental results on emulated board-level Trojans show that a wide range of Trojans can be successfully activated, thus enabling the expected payload effects on both types of boards to be studied and quantified. The resulting data are further analyzed to create PCB-level Trojan benchmarks. In particular, a comparative evaluation of the experimental results is used to propose a risk level metric that quantifies the probability of detection and degree of payload impact of each Trojan on a given commercial PCB.
Research Organization:
Brookhaven National Laboratory (BNL), Upton, NY (United States)
Sponsoring Organization:
USDOE Office of Science (SC), High Energy Physics (HEP)
Grant/Contract Number:
SC0012704
OSTI ID:
2340739
Report Number(s):
BNL--225548-2024-JAAM
Journal Information:
IEEE Access, Journal Name: IEEE Access Vol. 12; ISSN 2169-3536
Publisher:
IEEECopyright Statement
Country of Publication:
United States
Language:
English

References (17)

The Hardware Trojan War book January 2018
Benchmarking of Hardware Trojans and Maliciously Affected Circuits journal March 2017
Xbox security issues and forensic recovery methodology (utilising Linux) journal September 2004
Runtime hardware Trojan monitors through modeling burst mode communication using formal verification journal March 2018
On malicious implants in PCBs throughout the supply chain journal July 2021
HATE: a HArdware Trojan Emulation Environment for Microprocessor-based Systems conference July 2019
Active protection against PCB physical tampering conference March 2016
How Secure Are Printed Circuit Boards Against Trojan Attacks? journal April 2015
Attacks and Defenses for JTAG journal January 2010
Ways to hack a printed circuit board: PCB production is an underappreciated vulnerability in the global supply chain journal September 2020
Tenacious hardware trojans due to high temperature in middle tiers of 3-D ICs conference August 2015
TPAD: Hardware Trojan Prevention and Detection for Trusted Integrated Circuits journal April 2016
Hardware Trojan Detection on a PCB Through Differential Power Monitoring journal January 2020
Detecting Hardware Trojans in PCBs Using Side Channel Loopbacks journal July 2022
PCB Hardware Trojans: Attack Modes and Detection Strategies conference April 2019
The Big Hack Explained: Detection and Prevention of PCB Supply Chain Implants
  • Mehta, Dhwani; Lu, Hangwei; Paradis, Olivia P.
  • ACM Journal on Emerging Technologies in Computing Systems, Vol. 16, Issue 4 https://doi.org/10.1145/3401980
journal October 2020
An automated configurable Trojan insertion framework for dynamic trust benchmarks conference March 2018

Similar Records

Targeted modification of hardware trojans
Journal Article · Sun Mar 17 20:00:00 EDT 2019 · Journal of Hardware and Systems Security (Online) · OSTI ID:1502452

Detecting Hardware Trojans in PCBs Using Side Channel Loopbacks
Journal Article · Thu Jun 30 20:00:00 EDT 2022 · IEEE Transactions on Very Large Scale Integration (VLSI) Systems · OSTI ID:1877019