Study of hardware trojans based security vulnerabilities in cyber physical systems
Title | Study of hardware trojans based security vulnerabilities in cyber physical systems |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Lingasubramanian, Karthikeyan, Kumar, Ranveer, Gunti, Nagendra Babu, Morris, Thomas |
Conference Name | 2018 IEEE International Conference on Consumer Electronics (ICCE) |
Date Published | Jan. 2018 |
Publisher | IEEE |
ISBN Number | 978-1-5386-3025-9 |
Keywords | closed loop systems, closed-loop systems, completely virtual simulation platform, complex computing environment, composability, Computational modeling, computing chip, computing hardware design, computing platform, CPS modeling, critical CPS application, cyber physical systems, Cyber-physical systems, gas pipeline based SCADA system, Hardware, hardware internals, Hardware Trojans, hardware-in-the loop simulation, hardware-in-the-loop based simulation platform, IC industry, integrated circuits, invasive software, malicious modifications, Metrics, pubcrawl, reliable functionality, resilience, Resiliency, SCADA systems, secure functionality, security, security awareness, security vulnerabilities, simulations, software peripherals, threat models, Trojan horses |
Abstract | The dependability of Cyber Physical Systems (CPS) solely lies in the secure and reliable functionality of their backbone, the computing platform. Security of this platform is not only threatened by the vulnerabilities in the software peripherals, but also by the vulnerabilities in the hardware internals. Such threats can arise from malicious modifications to the integrated circuits (IC) based computing hardware, which can disable the system, leak information or produce malfunctions. Such modifications to computing hardware are made possible by the globalization of the IC industry, where a computing chip can be manufactured anywhere in the world. In the complex computing environment of CPS such modifications can be stealthier and undetectable. Under such circumstances, design of these malicious modifications, and eventually their detection, will be tied to the functionality and operation of the CPS. So it is imperative to address such threats by incorporating security awareness in the computing hardware design in a comprehensive manner taking the entire system into consideration. In this paper, we present a study in the influence of hardware Trojans on closed-loop systems, which form the basis of CPS, and establish threat models. Using these models, we perform a case study on a critical CPS application, gas pipeline based SCADA system. Through this process, we establish a completely virtual simulation platform along with a hardware-in-the-loop based simulation platform for implementation and testing. |
URL | https://ieeexplore.ieee.org/document/8326180 |
DOI | 10.1109/ICCE.2018.8326180 |
Citation Key | lingasubramanian_study_2018 |
- SCADA systems
- IC industry
- integrated circuits
- invasive software
- malicious modifications
- Metrics
- pubcrawl
- reliable functionality
- resilience
- Resiliency
- hardware-in-the-loop based simulation platform
- secure functionality
- security
- Security Awareness
- security vulnerabilities
- simulations
- software peripherals
- threat models
- Trojan horses
- CPS modeling
- closed-loop systems
- completely virtual simulation platform
- complex computing environment
- composability
- Computational modeling
- computing chip
- computing hardware design
- computing platform
- closed loop systems
- critical CPS application
- cyber physical systems
- cyber-physical systems
- gas pipeline based SCADA system
- Hardware
- hardware internals
- Hardware Trojans
- hardware-in-the loop simulation