[Anonymous].
2021.
White House Executive Order on Improving the Nation's Cybersecurity. The President’s Executive Order (EO) on “Improving the Nation’s Cybersecurity (14028)” issued on May 12, 2021, charges multiple agencies with enhancing cybersecurity through a variety of initiatives related to the security and integrity of the software supply chain.
Mengistu, Zelalem, Nuangpookka, Pipop, Nguyen, Phuong, Liu, Gregory.
2019.
Hardware-Tampering Security Risks in the Supply Chain. J. Comput. Sci. Coll.. 35:221–222.
The topic of security risk on the global supply chain is a vast one, as it incorporates various sub topics which are hived under the bigger picture of supply chain. For this study, we focused on hardware-based security risks which are caused by implanting a tiny chip on the original motherboard architecture, during manufacturing or while in transit. This paper examined the various hardware attack detection methods- mainly on destructive and non-destructive methods of hardware-based error detection. The destructive detection methods is extremely difficult to implement as it often requires a physical presence to inspect the device during the manufacturing and/or transition process. Despite this fact, we tried to detect abnormal activities of hardware components through non-destructive method by building a custom code using JSensor - a high performance sensor network simulator developed with a Java programming language. To monitor the hardware, we set a scheduler to gather the required information (example: every one or two hours during off-peak hours) so as to identify similarities and differences of the resources used in the computer systems. Besides CPU loads, CPU speed/clock rate has also been retrieved by using JSensors and Oracle Java Standard. By default, the size of configuration file does not automatically change. We deliberately altered the size and run the JSensors code which was scheduled to run for every three seconds and we were able to detect it as JSensor flagged the alteration which we deliberately made. Therefore, we concluded that besides monitoring hardware sensors for suspicious activities, checking an important file whose size should remain unchanged is an effective method of monitoring critical systems within a given organization. The paper also identifies the major hardware-based attack vectors on the supply chain, targeting various organizations. We concluded by making suggestions on how hardware-based supply chain risks could be mitigated and/or eliminated through future efforts.
Amelkin, Victor, Vohra, Rakesh.
2020.
Strategic Formation and Reliability of Supply Chain Networks. Proceedings of the 21st ACM Conference on Economics and Computation. :77–78.
We study the incentives that independent self-interested agents have in forming a resilient supply chain network in the face of disruptions and competition. Competing suppliers are subject to yield uncertainty and congestion. Competing retailers make sourcing decisions based on price and reliability. Under yield uncertainty only, retailers–-benefiting from supply variance–-concentrate their links on a single supplier, counter to the idea that they should mitigate yield uncertainty by multi-sourcing. When congestion is added, the resulting networks resemble bipartite expanders known to be resilient, thus, providing the first example of endogenously formed resilient supply chains.
Sinclair, Dara, Shahriar, Hossain, Zhang, Chi.
2019.
Security Requirement Prototyping with Hyperledger Composer for Drug Supply Chain: A Blockchain Application. Proceedings of the 3rd International Conference on Cryptography, Security and Privacy. :158–163.
Blockchain may have a potential to prove its value for the new US FDA regulatory requirements defined in the Drug Supply Chain Security Act (DSCSA) as innovative solutions are needed to support the highly complex pharmaceutical industry supply chain as it seeks to comply. In this paper, we examine how blockchain can be applied to meet with the security compliance requirement for the pharmaceutical supply chain. We explore the online playground of Hyperledger Composer, a set of tools for building blockchain business networks, to model the data and access control rules for the drug supply chain. Our experiment shows that this solution can provide a prototyping opportunity for compliance checking with certain limitations.
Xu, Xiaolin, Rahman, Fahim, Shakya, Bicky, Vassilev, Apostol, Forte, Domenic, Tehranipoor, Mark.
2019.
Electronics Supply Chain Integrity Enabled by Blockchain. ACM Trans. Des. Autom. Electron. Syst.. 24
Electronic systems are ubiquitous today, playing an irreplaceable role in our personal lives, as well as in critical infrastructures such as power grids, satellite communications, and public transportation. In the past few decades, the security of software running on these systems has received significant attention. However, hardware has been assumed to be trustworthy and reliable “by default” without really analyzing the vulnerabilities in the electronics supply chain. With the rapid globalization of the semiconductor industry, it has become challenging to ensure the integrity and security of hardware. In this article, we discuss the integrity concerns associated with a globalized electronics supply chain. More specifically, we divide the supply chain into six distinct entities: IP owner/foundry (OCM), distributor, assembler, integrator, end user, and electronics recycler, and analyze the vulnerabilities and threats associated with each stage. To address the concerns of the supply chain integrity, we propose a blockchain-based certificate authority framework that can be used to manage critical chip information such as electronic chip identification, chip grade, and transaction time. The decentralized nature of the proposed framework can mitigate most threats of the electronics supply chain, such as recycling, remarking, cloning, and overproduction.
Ray, Sandip, Chen, Wen, Cammarota, Rosario.
2018.
Protecting the Supply Chain for Automotives and IoTs. Proceedings of the 55th Annual Design Automation Conference.
Modern automotive systems and IoT devices are designed through a highly complex, globalized, and potentially untrustworthy supply chain. Each player in this supply chain may (1) introduce sensitive information and data (collectively termed "assets") that must be protected from other players in the supply chain, and (2) have controlled access to assets introduced by other players. Furthermore, some players in the supply chain may be malicious. It is imperative to protect the device and any sensitive assets in it from being compromised or unknowingly disclosed by such entities. A key –- and sometimes overlooked –- component of security architecture of modern electronic systems entails managing security in the face of supply chain challenges. In this paper we discuss some security challenges in automotive and IoT systems arising from supply chain complexity, and the state of the practice in this area.
Hilt, Michael, Shao, Daniel, Yang, Baijian.
2018.
RFID Security, Verification, and Blockchain: Vulnerabilities within the Supply Chain for Food Security. Proceedings of the 19th Annual SIG Conference on Information Technology Education. :145.
Over the past few decades, radio frequency identification (RFID) technology has been an important factor in securing products along the agri-food supply chain. However, there still exist security vulnerabilities when registering products to a specific RFID tag, particularly regarding the ease at which tags can be cloned. In this paper, a potential attack, labeled the "Hilt Shao attack", is identified which could occur during the initial phases of product registration, and demonstrate the type of attack using UID and CUID tags. Furthermore, a system is proposed using blockchain technology in order for the attacker to hide the cloned tag information. Results show that this attack, if carried out, can negate the profits of distributors along the supply chain, and negatively affect the consumer.
Zhang, Hansen, Ghosh, Soumyadeep, Fix, Jordan, Apostolakis, Sotiris, Beard, Stephen R., Nagendra, Nayana P., Oh, Taewook, August, David I..
2019.
Architectural Support for Containment-Based Security. Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems. :361–377.
Software security techniques rely on correct execution by the hardware. Securing hardware components has been challenging due to their complexity and the proportionate attack surface they present during their design, manufacture, deployment, and operation. Recognizing that external communication represents one of the greatest threats to a system's security, this paper introduces the TrustGuard containment architecture. TrustGuard contains malicious and erroneous behavior using a relatively simple and pluggable gatekeeping hardware component called the Sentry. The Sentry bridges a physical gap between the untrusted system and its external interfaces. TrustGuard allows only communication that results from the correct execution of trusted software, thereby preventing the ill effects of actions by malicious hardware or software from leaving the system. The simplicity and pluggability of the Sentry, which is implemented in less than half the lines of code of a simple in-order processor, enables additional measures to secure this root of trust, including formal verification, supervised manufacture, and supply chain diversification with less than a 15% impact on performance.
Fernandes, Ronald, Benjamin, Perakath, Li, Biyan, Stephenson, Andrew, Patel, Mayank, Hwang, Jong.
2018.
Use of Topological Vulnerability Analysis for Cyberphysical Systems. NAECON 2018 - IEEE National Aerospace and Electronics Conference. :78-81.
This paper describes a method which combines Topological Vulnerability Analysis (TVA) with cyber, electromagnetic, and physical/kinetic attack types, attack sources, cross-domain effects, graph analytics, and Bayesian analysis in order to enable systems engineers and cyber defense experts to comprehensively perform vulnerability analysis of Cyber-Physical Systems (CPS) as well as information and communications technology (ICT) supply chains.
Mylrea, Michael, Gourisetti, Sri Nikhil Gupta.
2018.
Blockchain for Supply Chain Cybersecurity, Optimization and Compliance. 2018 Resilience Week (RWS). :70-76.
The U.S. power grid is a complex system of systems that requires a trustworthy, reliable, and secure global supply chain. A formidable challenge considering the increasing number of networked industrial control systems (ICS) and energy delivery systems (EDS) and growing number of intermediary distributors, vendors and integrators involved. Grid modernization has increased the use of “smart” energy devices that automate, digitize, network, and bring together the cyber-physical energy supply chain. In the current Energy Internet of Things (EIoT) environment, the growth of data speed and size requirements as well as the number of critical cyber assets has generated new North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) compliance requirements and cyber supply chain security challenges for vendors, regulators, and utilities. The issuance of Order No. 829 by the Federal Energy Regulatory Commission (FERC) instructed the North American Electric Reliability Corporation (NERC) to confront cybersecurity supply chain risk management for ICS software and hardware, as well as the networking and computing services associated with Bulk Electric System (BES) operations. To meet these goals, current technology and processes must be improved to better identify, monitor, and audit vulnerable EIoT environments. This paper examines how blockchain technology can enable NERC CIP compliance as well as aid in the security of the BES supply chain through an immutable cryptographically signed distributed ledger that allows for improved data security, provenance and auditability.
Kulkarni, Akshay, Hazari, Noor Ahmad, Niamat, Mohammed.
2019.
A Blockchain Technology Approach for the Security and Trust of the IC Supply Chain. 2019 IEEE National Aerospace and Electronics Conference (NAECON). :249-252.
In trying to lower the costs of integrated circuit (IC) fabrication, the IC supply chain is becoming global. However, if the foundry or the supply chain, to which the fabrication process is outsourced, is not reliable or trustworthy, it may result in the quality of ICs being compromised. There have been well documented instances of counterfeit chips, and chips secretly implanted with Trojans, creeping into the supply chain. With the above background in mind, we propose to strengthen the supply chain process by attempting to use a very secure technique which has been widely used in many other fields, namely, the blockchain technology. Blockchain, first introduced for the security and mining of bitcoins, is one of the most trusted security techniques in today's world. In this paper, we propose a blockchain technology enabled `smart contract' approach for ensuring the security and trust of these ICs by tracking down the stage of alteration at which the chip may have been compromised in the IC supply chain.
Chung, Wingyan, Liu, Jinwei, Tang, Xinlin, Lai, Vincent S. K..
2018.
Extracting Textual Features of Financial Social Media to Detect Cognitive Hacking. 2018 IEEE International Conference on Intelligence and Security Informatics (ISI). :244-246.
Social media are increasingly reflecting and influencing the behavior of human and financial market. Cognitive hacking leverages the influence of social media to spread deceptive information with an intent to gain abnormal profits illegally or to cause losses. Measuring the information content in financial social media can be useful for identifying these attacks. In this paper, we developed an approach to identifying social media features that correlate with abnormal returns of the stocks of companies vulnerable to be targets of cognitive hacking. To test the approach, we collected price data and 865,289 social media messages on four technology companies from July 2017 to June 2018, and extracted features that contributed to abnormal stock movements. Preliminary results show that terms that are simple, motivate actions, incite emotion, and uses exaggeration are ranked high in the features of messages associated with abnormal price movements. We also provide selected messages to illustrate the use of these features in potential cognitive hacking attacks.
Tan, Benjamin, Karri, Ramesh.
2020.
Challenges and New Directions for AI and Hardware Security. 2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS). :277-280.
Artificial Intelligence (AI) and Machine Learning (ML) techniques have found use in many fields, including hardware-based security defenses and novel threats to hardware security. In this paper, we briefly examine the growing overlap between AI/ML and hardware for security, where AI/ML techniques provide practitioners with new ways to monitor runtime behavior but also provide new tools for attackers to steal secret information. We also explore how AI/ML is reshaping concerns for improving the security of hardware, particularly as AI/ML appear throughout the design flow. While AI/ML techniques contribute towards better hardware Trojan detection, improved design turnaround time, and design space exploration, such techniques may also introduce new threat vectors into the supply chain. With these in mind, we present some potential challenges and new directions at these intersections, giving new insights into how hardware security, alongside AI/M,L advances.
Kieras, Timothy, Farooq, Muhammad Junaid, Zhu, Quanyan.
2020.
Modeling and Assessment of IoT Supply Chain Security Risks: The Role of Structural and Parametric Uncertainties. 2020 IEEE Security and Privacy Workshops (SPW). :163-170.
Supply chain security threats pose new challenges to security risk modeling techniques for complex ICT systems such as the IoT. With established techniques drawn from attack trees and reliability analysis providing needed points of reference, graph-based analysis can provide a framework for considering the role of suppliers in such systems. We present such a framework here while highlighting the need for a component-centered model. Given resource limitations when applying this model to existing systems, we study various classes of uncertainties in model development, including structural uncertainties and uncertainties in the magnitude of estimated event probabilities. Using case studies, we find that structural uncertainties constitute a greater challenge to model utility and as such should receive particular attention. Best practices in the face of these uncertainties are proposed.