@inproceedings{4b6eb25fc4d5446f9dd0868f8c42ef64,
title = "Covert Communication Channel Detection in Low-Power Battery Operated IoT Devices: Leveraging Power Profiles",
abstract = "A hardware trojan (HT) is a malicious addition or modification of the circuitry of an integrated circuit. A hardware Trojan is characterized by its physical representation and its behavior. The payload part of an HT is the entire activity that the Trojan executes when it is triggered. Malicious Trojans try to bypass or disable the security barrier of a system. It can leak confidential information by radio emission. HTs also can disable, derange or destroy the entire chip. Low-power battery operated IoT devices have limited security features of encryption or decryption, hence it is even more difficult to detect such anomalies. In this paper, we leveraged the low and power frugal feature of IoT device to our benefit and show that the hardware Trojan can be detected by judiciously observing the power profile of the IoT device. We propose that any covert channel activity in such low-power device can distinctly alter the power profile of such devices. Hence, it can lead to the detection of the covert channel in low-power IoT devices. This research looks at these different profiles devices on a test-bed which simulates IoT devices, with the end goal of detecting unwanted and/or malicious hardware Trojan running in the background.",
author = "James Shelley and Hawzhin Mohammed and Lizzy Zink and Hasan, {Syed Rafay} and Omar Elkeelany",
note = "Publisher Copyright: {\textcopyright} 2018 IEEE.; 2018 IEEE Southeastcon, Southeastcon 2018 ; Conference date: 19-04-2018 Through 22-04-2018",
year = "2018",
month = oct,
day = "1",
doi = "10.1109/SECON.2018.8479097",
language = "English (US)",
series = "Conference Proceedings - IEEE SOUTHEASTCON",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
booktitle = "Southeastcon 2018",
address = "United States",
}