Hardware intrusion detection for supply-chain threats to critical infrastructure embedded systems
Edwards, Nathan
Loading…
Permalink
https://hdl.handle.net/2142/35322
Description
Title
Hardware intrusion detection for supply-chain threats to critical infrastructure embedded systems
Author(s)
Edwards, Nathan
Issue Date
2013-01-09T15:40:59Z
Director of Research (if dissertation) or Advisor (if thesis)
Nicol, David M.
Department of Study
Electrical & Computer Eng
Discipline
Electrical & Computer Engr
Degree Granting Institution
University of Illinois at Urbana-Champaign
Degree Name
M.S.
Degree Level
Thesis
Keyword(s)
Hardware intrusion detection
Embedded systems Trojan detection
Multinomial logistic regression
Two-stage resistor-capacitor filter
Supply chain risk
Smart grid
Smart meter
Advanced Metering Infrastructure (AMI)
Abstract
Along with an increase in cyber security concerns for critical infrastructure applications, there is a growing concern and lack of solutions for cyber-based supply chain and device life-cycle threats. The challenge for this application space is that cost-driven engineering and market viability requires the use of commercially available off-the-shelf (COTS) components or just-in-time (JIT) manufacturing processes for sub-assemblies most of which originate from unsecured foreign facilities. In addition, many of the deployed embedded system devices are easily accessible (i.e. poor physical security) and can easily be tampered with or altered during their life-cycle such that the authentication or integrity of the devices cannot be assured. In this research I propose the foundations of a new technology that helps address these growing issues with a hardware-based intrusion detection system. This technology combines the use of an analog signal response from a resistor-capacitor circuit and machine learning techniques to not only identify the presence of a hardware Trojan on an inter-chip communication bus at 100% accuracy for the dataset of over 2000 measurements, but which also correctly distinguishes between several types of implanted Trojans at 89% accuracy. And while this research has focused on the security of inter-chip communication, it demonstrates the possibility of using low-power analog signals for device-level information assurance.
Use this login method if you
don't
have an
@illinois.edu
email address.
(Oops, I do have one)
IDEALS migrated to a new platform on June 23, 2022. If you created
your account prior to this date, you will have to reset your password
using the forgot-password link below.