Parasitic Circus:On the Feasibility of Golden Free PCB Verification (2403.12252v1)
Abstract: Printed circuit boards (PCBs) are an integral part of electronic systems. Hence, verifying their physical integrity in the presence of supply chain attacks (e.g., tampering and counterfeiting) is of utmost importance. Recently, tamper detection techniques grounded in impedance characterization of PCB's Power Delivery Network (PDN) have gained prominence due to their global detection coverage, non-invasive, and low-cost nature. Similar to other physical verification methods, these techniques rely on the existence of a physical golden sample for signature comparisons. However, having access to a physical golden sample for golden signature extraction is not feasible in many real-world scenarios. In this work, we assess the feasibility of eliminating a physical golden sample and replacing it with a simulated golden signature obtained by the PCB design files. By performing extensive simulation and measurements on an in-house designed PCB, we demonstrate how the parasitic impedance of the PCB components plays a major role in reaching a successful verification. Based on the obtained results and using statistical metrics, we show that we can mitigate the discrepancy between collected signatures from simulation and measurements.
- J. Robertson and M. Riley, “The Big Hack: How China used a Tiny Chip to Infiltrate US Companies,” Bloomberg Businessweek, vol. 4, 2018.
- D. Janushkevich, “The Fake Cisco: Hunting for Backdoors in Counterfeit Cisco Devices,” F-Secure Consulting, Hardware Security Team, 2020.
- U. J. Botero, R. Wilson, H. Lu, M. T. Rahman, M. A. Mallaiyan, F. Ganji, N. Asadizanjani, M. M. Tehranipoor, D. L. Woodard, and D. Forte, “Hardware trust and assurance through reverse engineering: A tutorial and outlook from image analysis and machine learning perspectives,” ACM Journal on Emerging Technologies in Computing Systems (JETC), vol. 17, no. 4, pp. 1–53, 2021.
- V. Chaudhary, I. R. Dave, and K. P. Upla, “Automatic visual inspection of printed circuit board for defect detection and classification,” in 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 732–737, IEEE, 2017.
- G. Piliposyan and S. Khursheed, “PCB hardware Trojan run-time detection through machine learning,” IEEE Transactions on Computers, 2022.
- T. Mosavirik, F. Ganji, P. Schaumont, and S. Tajik, “Scatterverif: Verification of electronic boards using reflection response of power distribution network,” ACM Journal on Emerging Technologies in Computing Systems (JETC), vol. 18, no. 4, pp. 1–24, 2022.
- F. T. Werner, M. Prvulovic, and A. Zajić, “Detection of recycled ICs using backscattering side-channel analysis,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 30, no. 9, pp. 1244–1255, 2022.
- H. Zhu, H. Shan, D. Sullivan, X. Guo, Y. Jin, and X. Zhang, “PDNPulse: sensing PCB anomaly with the intrinsic power delivery network,” IEEE Transactions on Information Forensics and Security, 2023.
- M. S. Safa, T. Mosavirik, and S. Tajik, “Counterfeit chip detection using scattering parameter analysis,” in 2023 26th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), IEEE, 2023.
- T. Mosavirik, P. Schaumont, and S. Tajik, “Impedanceverif: On-chip impedance sensing for system-level tampering detection,” IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 301–325, 2023.
- A. Bhattacharyay, P. Chakraborty, J. Cruz, and S. Bhunia, “VIPR-PCB: a machine learning based golden-free PCB assurance framework,” in Proceedings of the 59th ACM/IEEE Design Automation Conference, pp. 793–798, 2022.
- A. B. Chowdhury, A. Mahapatra, Y. Liu, P. Krishnamurthy, F. Khorrami, and R. Karri, “A golden-free approach to detect Trojans in COTS multi-PCB systems,” IEEE Micro, 2023.
- P. Krishnamurthy, V. R. Surabhi, H. Pearce, R. Karri, and F. Khorrami, “Multi-modal side channel data driven golden-free detection of software and firmware Trojans,” IEEE Transactions on Dependable and Secure Computing, 2022.
- T. K. Vintsyuk, “Speech discrimination by dynamic programming,” Cybernetics, vol. 4, no. 1, pp. 52–57, 1968.
- H. Sakoe and S. Chiba, “Dynamic programming algorithm optimization for spoken word recognition,” IEEE transactions on acoustics, speech, and signal processing, vol. 26, no. 1, pp. 43–49, 1978.
- ANSYS, Inc., “ANSYS SIwave 2023 R2.” http://www.ansys.com, 2023.
- B. Wei and S. G. P. Jr, “New integrated workflow for EMI simulation,” APEMC 2015.
- Akhoundov, Damir, “2019 ERAI Reported Parts Statistics,” ERAI Blog, 2020.
- T. Mosavirik, S. K. Monfared, M. S. Safa, and S. Tajik, “Silicon echoes: Non-invasive Trojan and tamper detection using frequency-selective impedance analysis,” IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 238–261, 2023.