Silicon Dating

09/08/2020
by   Harrison Williams, et al.
0

In order to service an ever-growing base of legacy electronics, both government and industry customers must turn to third-party brokers for components in short supply or discontinued by the original manufacturer. Sourcing equipment from a third party creates an opportunity for unscrupulous gray market suppliers to insert counterfeit devices: failed, knock-off, or otherwise inferior to the original product. This increases the supplier's profits at the expense of reduced performance/reliability of the customer's system. The most challenging class of counterfeit devices to detect is recycled counterfeits: recovered genuine devices which are re-sold as new. Such devices are difficult to detect because they typically pass performance and parametric tests but fail prematurely due to age-related wear. To address the challenge of detecting recycled devices pre-deployment, we develop Silicon Dating: a low-overhead classifier for detecting recycled integrated circuits using Static Random-Access Memory (SRAM) power-on states. Silicon Dating targets devices with no known-new record or purpose-built anti-recycling hardware. We observe that over time, software running on a device imprints its unique data patterns into SRAM through analog-domain changes; we measure the level and direction of this change through SRAM power-on state statistics. In contrast to highly symmetric power-on states produced by variation during SRAM fabrication, we show that embedded software data is generally highly asymmetric and that the degree of power-on state asymmetry imprinted by software reveals device use. Using empirical results from embedded benchmarks running on several microcontrollers, we show that Silicon Dating identifies recycled devices with 84.1 software-specific knowledge and with 92.0 knowledge—without prior device enrollment or modification.

READ FULL TEXT

page 1

page 2

page 5

page 6

page 7

research
03/11/2021

On Medical Device Software CE Compliance and Conformity Assessment

Manufacturing of medical devices is strictly controlled by authorities, ...
research
09/29/2021

NetSD: Remote Access to Integrated SD Cards of Embedded Devices

Digitalization continuously pervades all areas and the Internet of Thing...
research
08/14/2019

Side-Channel Aware Fuzzing

Software testing is becoming a critical part of the development cycle of...
research
07/21/2021

Firmware Re-hosting Through Static Binary-level Porting

The rapid growth of the Industrial Internet of Things (IIoT) has brought...
research
03/30/2021

BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection

Bluetooth Low Energy (BLE) has become one of the most popular wireless c...
research
05/05/2022

Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA

There are many well-known techniques to secure sensed data in IoT/CPS sy...
research
08/21/2019

There is no Reliable Way to Detect Hacked Ballot-Marking Devices

Election system vendors are marketing ballot-marking devices (BMDs) as a...

Please sign up or login with your details

Forgot password? Click here to reset