How secure are printed circuit boards Trojan attacks?

Swaroop Ghosh, Abhishek Basak, Swarup Bhunia

Research output: Contribution to journalArticlepeer-review

65 Scopus citations

Abstract

Hardware Trojan attacks at the integrated circuit (IC) level have been studied extensively in recent times. Researchers have analyzed the impact of these attacks and explored possible countermeasures for ICs. However, vulnerability with respect to hardware Trojan attacks at higher levels of system abstraction, e.g., at printed circuit board (PCB) level, have not been reported earlier. Previous studies have covered security of PCBs against piracy and various post-fabrication tampering attacks. JTAG (Joint Test Access Group) and other field programmability features, e.g., probe pins, unused sockets and USB have been extensively exploited by hackers to gain access to internal features of the designs as well as snooping of secret key, collection of test responses, and manipulating JTAG test pins. One instance demonstrated that Xbox can be hacked by disabling the Digital Rights Management (DRM) policy using JTAG. The emerging business model of PCB design and fabrication that favors extensive outsourcing and integration of untrusted components/entities in the PCB life-cycle to lower manufacturing cost, makes hardware Trojan attacks in PCBs highly feasible.

Original languageEnglish (US)
Article number6878437
Pages (from-to)7-16
Number of pages10
JournalIEEE Design and Test
Volume32
Issue number2
DOIs
StatePublished - Apr 1 2015

All Science Journal Classification (ASJC) codes

  • Software
  • Hardware and Architecture
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'How secure are printed circuit boards Trojan attacks?'. Together they form a unique fingerprint.

Cite this