skip to main content
research-article

Obfuscation-Based Protection Framework against Printed Circuit Boards Unauthorized Operation and Reverse Engineering

Published: 27 April 2017 Publication History

Abstract

Printed circuit boards (PCBs) are a basic necessity for all modern electronic systems but are becoming increasingly vulnerable to cloning, overproduction, tampering, and unauthorized operation. Most efforts to prevent such attacks have only focused on the chip level, leaving a void for PCBs and higher levels of abstraction. In this article, we propose the first ever obfuscation-based framework for the protection of PCBs. Central to our approach is a permutation block that hides the inter-chip connections between chips on the PCB and is controlled by a key. If the correct key is applied, then the correct connections between chips are made. Otherwise, the connections are incorrectly permuted, and the PCB/system fails to operate. We propose a permutation network added to the PCB based on a Benes network that can easily be implemented in a complex programmable logic device or field-programmable gate arrays. Based on this implementation, we analyze the security of our approach with respect to (i) brute-force attempts to reverse engineer the PCB, (ii) brute-force attempts at guessing the correct key, and (iii) physical and logistic attacks by a range of adversaries. Performance evaluation results on 12 reference designs show that brute force generally requires prohibitive time to break the obfuscation. We also provide detailed requirements for countermeasures that prevent reverse engineering, unauthorized operation, and so on, for different classes of attackers.

References

[1]
Dennis G. Abraham, George M. Dolan, Glen P. Double, and James V. Stevens. 1991. Transaction security system. IBM Systems Journal 30, 2 (1991), 206--229.
[2]
Kiarash Ahi, Navid Asadizanjani, Sina Shahbazmohamadi, Mark Tehranipoor, and Mehdi Anwar. 2015. Terahertz characterization of electronic components and comparison of terahertz imaging with x-ray imaging techniques. In SPIE sensing technology+ applications. International Society for Optics and Photonics, 94830K--94830K.
[3]
Ross Anderson and Markus Kuhn. 1997. Low cost attacks on tamper resistant devices. In International Workshop on Security Protocols. Springer, 125--136.
[4]
Navid Asadizanjani, Sina Shahbazmohamadi, Mark Tehranipoor, and Domenic Forte. 2015. Non-destructive pcb reverse engineering using x-ray micro computed tomography. In 41st International symposium for testing and failure analysis, ASM. 1--5.
[5]
Andrew Beng, Jin Teoh, and Kar-Ann Toh. 2008. Secure biometric-key generation with biometric helper. In 3rd IEEE Conference on Industrial Electronics and Applications, 2008. ICIEA 2008. IEEE, 2145--2150.
[6]
Vijay G. Brijbasi. 2003. Game Console Modification Chips: The Effect of Fair Use and the Digital Millennium Copyright Act on the Circumvention of Game Console Security Measures. Nova L. Rev. 28 (2003), 411.
[7]
Rajat Subhra Chakraborty and Swarup Bhunia. 2009. HARPOON: An obfuscation-based SoC design methodology for hardware protection. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 28, 10 (2009), 1493--1502.
[8]
Chihming Chang and Rami Melhem. 1997. Arbitrary size Benes networks. Parallel Processing Letters 7, 3 (1997), 279--284.
[9]
Avinash R. Desai, Michael S. Hsiao, Chao Wang, Leyla Nazhandali, and Simin Hall. 2013. Interlocking obfuscation for anti-tamper hardware. In Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop. ACM, 8.
[10]
Saar Drimer. 2009. Security for volatile FPGAs. (2009).
[11]
Paul Feldman, Joel Friedman, and Nicholas Pippenger. 1988. Wide-sense nonblocking networks. SIAM Journal on Discrete Mathematics 1, 2 (1988), 158--173.
[12]
Brian F. Fitzgerald. 2005. The Playstation mod chip: A technological guarantee of the digital consumer’s liberty or copyright menace/circumvention device? Media And Arts Law Review 10, 1 (2005), 85--98.
[13]
S. Ghosh, A. Basak, and S. Bhunia. 2014. How Secure Are Printed Circuit Boards Against Trojan Attacks? IEEE Des. Test (2014).
[14]
Joe Grand. 2014. Printed circuit board deconstruction techniques. In 8th USENIX Workshop on Offensive Technologies (WOOT’14).
[15]
Ujjwal Guin, Daniel DiMase, and Mohammad Tehranipoor. 2014. A comprehensive framework for counterfeit defect coverage analysis and detection assessment. Journal of Electronic Testing 30, 1 (2014), 25--40.
[16]
Kim Hartmann and Christoph Steup. 2013. The vulnerability of UAVs to cyber attacks-An approach to the risk assessment. In 2013 5th International Conference on Cyber Conflict (CyCon). IEEE, 1--23.
[17]
James A. Hayward and Janice Meraglia. 2011. DNA Marking and Authentication: A unique, secure anti-counterfeiting program for the electronics industry. In International Symposium on Microelectronics, Vol. 2011. International Microelectronics Assembly and Packaging Society, 000107--000112.
[18]
Texas Instruments. 2016. TI Designs Reference Design Library, http://www.ti.com/general/docs/refdesignsearchresults.tsp. (2016).
[19]
Ironwood. 2016. High Performance IC Sockets and Adapters, http://www.ironwoodelectronics.com/. (2016).
[20]
Debasis Mitra and Randall A. Cieslak. 1987a. Randomized parallel communications on an extension of the omega network. JACM (1987).
[21]
Debasis Mitra and Randall A. Cieslak. 1987b. Randomized parallel communications on an extension of the omega network. Journal of the ACM (JACM) 34, 4 (1987), 802--824.
[22]
David Nassimi and Sartaj Sahni. 1982. Parallel algorithms to set up the Benes permutation network. IEEE Trans. Comput. 31, 2 (1982), 148--154.
[23]
NXP. 2016. CodeWarrior Software Development Tools---NXP, http://www.nxp.com/products/software-and-tools/software-development-tools/codewarrior-development-tools. (2016).
[24]
Casey ODonnell. 2013. Mixed messages: The ambiguity of the MOD chip and pirate cultural production for the Nintendo DS. New Media 8 Society (2013), 1461444813489509.
[25]
BBC Monitoring Asia Pacific. 2011. Police in Chinese city clamp down on counterfeit Apple iPhones. 30. (2011).
[26]
Nicholas Pippenger. 1978. On rearrangeable and non-blocking switching networks. J. Comput. System Sci. 17, 2 (1978), 145--162.
[27]
Jeyavijayan Rajendran, Huan Zhang, Chi Zhang, Garrett S Rose, Youngok Pino, Ozgur Sinanoglu, and Ramesh Karri. 2015. Fault analysis-based logic encryption. IEEE Transactions on Computers 64, 2 (2015), 410--424.
[28]
Srivaths Ravi, Anand Raghunathan, and Srimat Chakradhar. 2004. Tamper resistance mechanisms for secure embedded systems. In 17th International Conference on VLSI Design, 2004. Proceedings. IEEE, 605--611.
[29]
Jarrod A. Roy, Farinaz Koushanfar, and Igor L. Markov. 2010. Ending piracy of integrated circuits. Computer 43, 10 (2010), 30--38.
[30]
Freescale Semiconductor. 2014. Freescale Semiconductor Embedded Processing Solutions, http://www.freescale.com/. (2014).
[31]
Eric Simpson and Patrick Schaumont. 2006. Offline hardware/software authentication for reconfigurable platforms. In International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 311--323.
[32]
Sergei Skorobogatov. 2006. Tamper resistance and physical attacks. at Summer School on Cryptographic Hardware, Side-Channel and Fault Attacks (2006).
[33]
Mark Mohammad Tehranipoor, Ujjwal Guin, and Domenic Forte. 2015. Counterfeit integrated circuits. Springer. 15--36 pages.
[34]
Ajithkumar Thamarakuzhi and John A. Chandy. 2010. 2-dilated flattened butterfly: A nonblocking switching network. In 2010 International Conference on High Performance Switching and Routing (HPSR). IEEE, 153--158.
[35]
Abraham Waksman. 1968. A permutation network. Journal of the ACM (JACM) 15, 1 (1968), 159--163.
[36]
James Wayman, Anil Jain, Davide Maltoni, and Dario Maio. 2005. An introduction to biometric authentication systems. Springer.
[37]
Lingxiao Wei, Chaosheng Song, Yannan Liu, Jie Zhang, Feng Yuan, and Qiang Xu. 2015. BoardPUF: Physical Unclonable Functions for printed circuit board authentication. In 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). IEEE, 152--158.
[38]
Steve H. Weingart. 2000. Physical security devices for computer subsystems: A survey of attacks and defenses. In International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 302--317.
[39]
Kyle Wilkinson. 2015. Using Encryption to Secure a 7 Series FPGA Bitstream. (2015).
[40]
Kun Yang, Domenic Forte, and Mark Tehranipoor. 2015. An RFID-based technology for electronic component and system Counterfeit detection and Traceability. In 2015 IEEE International Symposium on Technologies for Homeland Security (HST). IEEE, 1--6.
[41]
Sharareh Zamanzadeh and Ali Jahanian. 2013. Automatic netlist scrambling methodology in asic design flow to hinder the reverse engineering. In 2013 IFIP/IEEE 21st International Conference on Very Large Scale Integration (VLSI-SoC). IEEE, 52--53.
[42]
Fengchao Zhang, Andrew Hennessy, and Swarup Bhunia. 2015a. Robust counterfeit PCB detection exploiting intrinsic trace impedance variations. (2015), 1--6.
[43]
Fengchao Zhang, Andrew Hennessy, and Swarup Bhunia. 2015b. Robust counterfeit PCB detection exploiting intrinsic trace impedance variations. In VTS.

Cited By

View all
  • (2024)An Overview of Cyber-Resilient Smart Inverters Based on Practical Attack ModelsIEEE Transactions on Power Electronics10.1109/TPEL.2023.334284239:4(4657-4673)Online publication date: Apr-2024
  • (2024)A Chip-PCB Hybrid SC PUF Used for Anti-Desoldering and Depackaging-Attack ProtectionIEEE Journal of Solid-State Circuits10.1109/JSSC.2024.335204859:7(2330-2344)Online publication date: Jul-2024
  • (2021)On malicious implants in PCBs throughout the supply chainIntegration10.1016/j.vlsi.2021.03.00279(12-22)Online publication date: Jul-2021
  • Show More Cited By

Index Terms

  1. Obfuscation-Based Protection Framework against Printed Circuit Boards Unauthorized Operation and Reverse Engineering

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Design Automation of Electronic Systems
    ACM Transactions on Design Automation of Electronic Systems  Volume 22, Issue 3
    July 2017
    440 pages
    ISSN:1084-4309
    EISSN:1557-7309
    DOI:10.1145/3062395
    • Editor:
    • Naehyuck Chang
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Journal Family

    Publication History

    Published: 27 April 2017
    Accepted: 01 December 2016
    Revised: 01 November 2016
    Received: 01 April 2016
    Published in TODAES Volume 22, Issue 3

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Benes network
    2. Board-level obfuscation
    3. IP protection
    4. unauthorized operation prevention

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)16
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)An Overview of Cyber-Resilient Smart Inverters Based on Practical Attack ModelsIEEE Transactions on Power Electronics10.1109/TPEL.2023.334284239:4(4657-4673)Online publication date: Apr-2024
    • (2024)A Chip-PCB Hybrid SC PUF Used for Anti-Desoldering and Depackaging-Attack ProtectionIEEE Journal of Solid-State Circuits10.1109/JSSC.2024.335204859:7(2330-2344)Online publication date: Jul-2024
    • (2021)On malicious implants in PCBs throughout the supply chainIntegration10.1016/j.vlsi.2021.03.00279(12-22)Online publication date: Jul-2021
    • (2020)NotchPUF: Printed Circuit Board PUF Based on Microstrip Notch FilterCryptography10.3390/cryptography40200114:2(11)Online publication date: 4-Apr-2020
    • (2020)Security of Microfluidic BiochipACM Transactions on Design Automation of Electronic Systems10.1145/338212725:3(1-29)Online publication date: 21-Apr-2020
    • (2020)Exploiting Data Resilience in Wireless Network-on-chip ArchitecturesACM Journal on Emerging Technologies in Computing Systems10.1145/337944816:2(1-27)Online publication date: 4-Apr-2020
    • (2020)Crossover-aware Placement and Routing for Inkjet Printed CircuitsACM Journal on Emerging Technologies in Computing Systems10.1145/337546116:2(1-22)Online publication date: 30-Jan-2020
    • (2020)Permutation Network De-obfuscationACM Journal on Emerging Technologies in Computing Systems10.1145/337140716:2(1-25)Online publication date: 28-Jan-2020
    • (2020)CSMO-DSEACM Journal on Emerging Technologies in Computing Systems10.1145/337140616:2(1-22)Online publication date: 30-Jan-2020
    • (2020)Sparse BD-NetACM Journal on Emerging Technologies in Computing Systems10.1145/336939116:2(1-24)Online publication date: 30-Jan-2020
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media