2020 IEEE Security and Privacy Workshops (SPW) 2020
DOI: 10.1109/spw50608.2020.00040
|View full text |Cite
|
Sign up to set email alerts
|

EM Fingerprints: Towards Identifying Unauthorized Hardware Substitutions in the Supply Chain Jungle

Abstract: This paper proposes a system capable of branding digital device components based on the EM signals typically emitted during their normal operational cycles. Such signals contain digital artifacts that are unique, which may act as an identifier of a particular device component e.g., its CPU, or the entire device if one chooses to take into account a combination of multiple such components. In real-life scenarios, this "biometrical" fingerprinting of hardware has to be conducted only once, possibly as part of an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 35 publications
(27 reference statements)
0
2
0
Order By: Relevance
“…Moreover, depending on the type of antenna, the approach can be less invasive as the monitoring can be performed from a distance in real time. In fact, EM-based anomaly detection tools have proven to be successful for the detection of extensive [7], [8], or even minimal modifications, say, down to the injection of a few instructions (at the assembly level) [9], [10].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, depending on the type of antenna, the approach can be less invasive as the monitoring can be performed from a distance in real time. In fact, EM-based anomaly detection tools have proven to be successful for the detection of extensive [7], [8], or even minimal modifications, say, down to the injection of a few instructions (at the assembly level) [9], [10].…”
Section: Introductionmentioning
confidence: 99%
“…In the past, alternative sidechannels have been considered, including the power consumption patterns [3], [4], [5], the thermal footprint [6] or the acoustic signals [7] of devices during their operation. Nevertheless, EM-based approaches [8], [9], [10], [11], [12] offer a comparative advantage since the signals themselves can be captured and analyzed in a completely non-intrusive fashion, i.e., no installation of software in the monitored device is assumed. Moreover, unlike analog signals describing the analysis of power consumption, the EM spectrum offers high bandwidth.…”
Section: Introductionmentioning
confidence: 99%