首页> 外文期刊>Design & Test of Computers, IEEE >How Secure Are Printed Circuit Boards Against Trojan Attacks?
【24h】

How Secure Are Printed Circuit Boards Against Trojan Attacks?

机译:印刷电路板对木马攻击的安全性如何?

获取原文
获取原文并翻译 | 示例

摘要

Hardware Trojan attacks at the integrated circuit (IC) level have been studied extensively in recent times. Researchers have analyzed the impact of these attacks and explored possible countermeasures for ICs. However, vulnerability with respect to hardware Trojan attacks at higher levels of system abstraction, e.g., at printed circuit board (PCB) level, have not been reported earlier. Previous studies have covered security of PCBs against piracy and various post-fabrication tampering attacks. JTAG (Joint Test Access Group) and other field programmability features, e.g., probe pins, unused sockets and USB have been extensively exploited by hackers to gain access to internal features of the designs as well as snooping of secret key, collection of test responses, and manipulating JTAG test pins. One instance demonstrated that Xbox can be hacked by disabling the Digital Rights Management (DRM) policy using JTAG. The emerging business model of PCB design and fabrication that favors extensive outsourcing and integration of untrusted components/entities in the PCB life-cycle to lower manufacturing cost, makes hardware Trojan attacks in PCBs highly feasible.
机译:近年来,对集成电路(IC)级别的硬件Trojan攻击进行了广泛的研究。研究人员分析了这些攻击的影响,并探索了针对IC的可能对策。但是,尚未在较早的级别上报告过在较高系统抽象级别(例如在印刷电路板(PCB)级别)上与硬件Trojan攻击有关的漏洞。先前的研究涵盖了PCB防止盗版和各种制造后篡改攻击的安全性。黑客已广泛利用JTAG(联合测试访问组)和其他现场可编程功能,例如探针,未使用的插座和USB,以访问设计的内部功能以及窥探秘密密钥,收集测试响应,和操纵JTAG测试引脚。一个实例表明,可以通过使用JTAG禁用数字版权管理(DRM)策略来对Xbox进行黑客攻击。 PCB设计和制造的新兴业务模型支持在PCB生命周期中广泛外包和集成不受信任的组件/实体以降低制造成本,这使得PCB中的硬件Trojan攻击非常可行。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号