Hardware Security Breaches: Alarming Exploits Beyond Tampering

Johnbasco Vijay Anand. J1

1

Publication Date: 2024/10/07

Abstract: Side Channel Attacks (SCAs) and Fault Injection Attacks have emerged as significant threats to the security of electronic devices. This paper explores these hardware attack vectors in the context of recent incidents [11] involving pagers and walkie-talkies. We shall deep dive into the possible mechanisms of these attacks, how they can be combined for increased efficacy, and their implications for device security. This paper discusses only the possible ways [1] the adversaries could have exploited and may include other attack vectors such as supply chain attack and few others. The aim of this paper as we discuss the potential attack mechanisms is only to focus on mitigations and awareness of the reader to perform advanced security testing.

Keywords: No Keywords Available

DOI: https://doi.org/10.38124/ijisrt/IJISRT24SEP1231

PDF: https://ijirst.demo4.arinfotech.co/assets/upload/files/IJISRT24SEP1231.pdf

REFERENCES

  1. The Hardware Security Threat Landscape and Possible Countermeasures: A Survey. ACM Computing Surveys (CSUR), vol. 53, no. 6, 2020.
  2. M. Tehranipoor and F. Koushanfar, "Trustworthy Hardware: Trojan Detection and Prevention Methods in Supply Chain," IEEE Design & Test of Computers, vol. 27, no. 1, pp. 10-25, 2010.
  3. J. Rajendran, et al., "Hardware Trojans: Threats and Emerging Solutions," Proc. IEEE, vol. 102, no. 8, pp. 1229-1247, 2014.
  4. G. T. Becker, F. Regazzoni, C. Paar, and W. Burleson, "Stealthy Dopant-Level Hardware Trojans: Extended Version," IEEE Trans. on CAD of Integrated Circuits and Systems, vol. 33, no. 12, pp. 1778-1791, Dec. 2014.
  5. P. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," in Proc. Advances in Cryptology (CRYPTO), pp. 388-397, 1999.
  6. Y. Jin and D. Sullivan, "Hardware Security: Threat Models and Security Requirements," in IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2016.
  7. M. Potkonjak et al., "Hardware Trojan Design and Implementation Challenges," in IEEE Int. Conf. on Computer Design (ICCD), 2011.
  8. D. Mukhopadhyay, R. S. Chakraborty, and C. Paar, "Hardware Security: Design, Threats, and Safeguards," IEEE Computer Society, 2013.
  9. T. Xu, W. Burleson, and D. Holcomb, "Using Environmental Noise as a Source of Entropy for Purely Digital True Random Number Generators," IEEE Trans. on Computers, vol. 62, no. 8, pp. 1524-1537, 2013.
  10. M. T. Rahman and M. Tehranipoor, "A Comprehensive Survey of Defense Mechanisms against Hardware Trojan Attacks," IEEE Trans. on Design and Test, vol. 30, no. 1, pp. 26-45, Jan. 2013.
  11. https://en.wikipedia.org/wiki/2024_Lebanon_pager_explosions
  12. https://www.hextree.io/