Work-in-progress: Remote detection of unauthorized activity via spectral analysis

Fatih Karabacak, Umit Ogras, Sule Ozev

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

Unauthorized hardware or firmware modifications, known as Trojans, can steal information, drain the battery, or damage IoT devices. This paper presents a stand-off self-referencing technique for detecting unauthorized activity. The proposed technique processes involuntary electromagnetic emissions on a separate hardware, which is physically decoupled from the device under test. When the device enter the test mode, it runs a predefined application repetitively with a fixed period. The periodicity ensures that the spectral electromagnetic power of the test application concentrates at known frequencies, leaving the remaining frequencies within the operation bandwidth at the noise level. Any deviations from the noise level for these unoccupied frequency locations indicates the presence of unknown (unauthorized) activity. Experiments based on hardware measurements show that the proposed technique achieves close to 100% detection accuracy at up to 120 cm distance.

Original languageEnglish (US)
Title of host publication2017 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781450351850
DOIs
StatePublished - Nov 7 2017
Event2017 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2017 - Seoul, Korea, Republic of
Duration: Oct 15 2017Oct 20 2017

Other

Other2017 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2017
CountryKorea, Republic of
CitySeoul
Period10/15/1710/20/17

Keywords

  • EM Emission
  • Hardware/Firmware Trojan Detection
  • IoT Security

ASJC Scopus subject areas

  • Hardware and Architecture
  • Information Systems
  • Software

Fingerprint Dive into the research topics of 'Work-in-progress: Remote detection of unauthorized activity via spectral analysis'. Together they form a unique fingerprint.

Cite this