Abstract
We show that a broad range of motherboard components can be classified based on their electromagnetic (EM) emanations using a lightweight convolutional neural network (CNN) architecture. Our random bootstrap sampling approach to cross-validation allows us to select robust models that achieve strong accuracy when classifying processor, memory, power, and ethernet integrated circuits (ICs) on internet of things (IoT) devices in two different excitation states. Our method also performs equal to or better than a k-Nearest Neighbors (k-NN) classifier baseline in all tested cases. We develop an anomaly detection procedure to flag the types of IC models not seen by the CNN in training. An analysis of signals passing through our end-to-end trained model allows us to generate insights about the discriminative features in the emanations of different components. We analyze how the convolution layers’ outputs pass through linear transformation layers to understand which of the input features are most important. Our results demonstrate that a CNN architecture can be used to classify ICs accurately using a diverse set of EM emanations while providing insights about the relevant discriminative features between components.
Similar content being viewed by others
References
Kae-Nune N, Pesseguier S (2013) Qualification and testing process to implement anti-counterfeiting technologies into IC packages. In 2013 Design, Automation Test in Europe Conference Exhibition (DATE), pp 1131–1136
Pecht M, Tiku S (2006) Bogus: electronic manufacturing and consumers confront a rising tide of counterfeit electronics. IEEE Spectr 43(5):37–46
Dogan H, Forte D, Tehranipoor MM (2014) Aging analysis for recycled fpga detection. In 2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), pp 171–176
Guin U, Huang K, DiMase D, Carulli JM, Tehranipoor M, Makris Y (2014) Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain. Proc IEEE 102(8):1207–1228
Backes M, Dürmuth M, Gerling S, Pinkal M, Sporleder C (2010) Acoustic side-channel attacks on printers. In Proceedings of the 19th USENIX Conference on Security USA, USENIX Security 10, USENIX Association, p 20
Hutter M, Schmidt JM (2013) The temperature side-channel and heating fault attacks. In: Smart Card Research and Advanced Applications: 12th International Conference (CARDIS), vol. 8419. https://doi.org/10.1007/978-3-319-08302-5_15
Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In Advances in Cryptology (CRYPTO), vol. 1666
van Eck W (1985) Electromagnetic radiation from video display units: An eavesdropping risk? Comput Secur 4(4):269–286
Callan R, Zajić A, Prvulovic M (2013) A practical methodology for measure the side-channel signal available to the attacker for instruction level events. IEEE Micro 14:1–12
Agrawal D, Archambeult B (2002) The em side-channel(s). Proc. Crypto. HW and Emb. Sys. (CHES), pp 29–45
Yilmaz BB, Zajić A, Prvulovic M (2019) Capacity of em side channel created by instruction executions in a processor. Processings of IEEE IEMCON, pp 1–5
Alam M, Khan HA, Dey M, Sinha N, Callan R, Zajić A, Prvulovic M (2018) One&done: A single-decryption em-based attack on openssl’s constant-time blinded rsa. In Proceedings of the 27th USENIX Security Symposium
Kuhn M (2004) Compromising emanations: Eavesdropping risks of computer displays. Tech Rep, Computer Laboratory, University of Cambridge
Dong X, Weng H, Beetner DG, Hubing TH, Wunsch DC, Noll M, Gksu H, Moss B (2006) Detection and identification of vehicles based on their unintended electromagnetic emissions. IEEE Trans Electromagn Compat 48(4):752–759
Göksu H, Wunsch D, Dong X, Kökce A, Beetner D (2018) Detection and identification of vehicles based on their spark-free unintended electromagnetic emissions. IEEE Trans Electromagn Compat 60:1594–1597. https://doi.org/10.1109/TEMC.2017.2773706
Vann JM, Karnowski TP, Kerekes R, Cooke CD, Anderson AL (2018) A dimensionally aligned signal projection for classification of unintended radiated emissions. IEEE Trans Electromagn Compat 60(1):122–131
Yang C, Sample AP (2016) Em-id: Tag-less identification of electrical devices via electromagnetic emissions. In 2016 IEEE International Conference on RFID (RFID), pp 1–8
Laput G, Yang C, Xiao R, Sample A, Harrison C (2015) Em-sense: Touch recognition of uninstrumented, electrical and electromechanical objects. In Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology (New York, NY, USA), UIST 15, Association for Computing Machinery, pp 157-166. https://doi.org/10.1145/2807442.2807481
Ahmed MM, Hely D, Perret E, Barbot N, Siragusa R, Bernier M, Garet F (2018) Authentication of microcontroller board using non-invasive em emission technique. In 2018 IEEE 3rd International Verification and Security Workshop (IVSW), pp 25–30
Yilmaz BB, Mert Ugurlu E, Zajic A, Prvulovic M (2020) Cell-phone classification: A convolutional neural network approach exploiting electromagnetic emanations. In ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp 2862–2866
Cobb WE (2017) Exploitation of Unintentional Information Leakage from Integrated Circuits. PhD thesis, Air Force Institute of Technology
Werner FT, Yilmaz BB, Prvulovic M, Zajić A (2020) Leveraging em side-channels for recognizing components on a motherboard. IEEE Trans Electromagn Compat 1–14
www.ice.gov (2011) Visiontech administrator sentenced to prison for role in sales of counterfeit circuits destined to us military. https://www.ice.gov/news/releases/visiontechadministrator-sentenced-prison-role-sales-counterfeitcircuits-destined-us. [Online; posted 25-October-2011]
venturebeat.com (2011) Feds close huge chip counterfeiting case. https://venturebeat.com/2011/09/25/fedsclose-the-books-on-a-huge-chip-counterfeiting-scheme/. [Online; posted 25-September-2011]
Werner F, Chu DA, Djordjevic AR, Olcan DI, Prvulovic M, Zajić A (2018) A method for efficient localization of magnetic field sources excited by execution of instructions in a processor. IEEE Trans Electromagn Compat 60(3):613–622
Rubino R (2010) Wireless device identification from a phase noise prospective. Master’s thesis, University of Padova, Italy
Glorot X, Bordes A, Bengio Y (2011) Deep sparse rectifier neural networks. In: Gordon G, Dunson D, Dudk M (Eds.) Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics, Proceedings of Machine Learning Research 15:315–323. PMLR, Fort Lauderdale, FL, USA
Srivastava N, Hinton G, Krizhevsky A, Sutskever I, Salakhutdinov R (2014) Dropout: A simple way to prevent neural networks from overfitting. J Mach Learn Res 15(56):1929–1958
Olimex. A10-olinuxino-lime. Available at https://www.olimex.com/Products/OLinuXino/A10/A10-OLinuXino-LIME-n4GB/open-source-hardware (2020/05/08)
Olimex. A13-olinuxino. Available at https://www.olimex.com/Products/OLinuXino/A13/A13-OLinuXino/open-source-hardware (2020/05/08)
Olimex. A13-olinuxino-micro. Available at https://www.olimex.com/Products/OLinuXino/A13/A13-OLinuXino-MICRO/open-source-hardware (2020/05/08)
Olimex. A20-olinuxino-lime. Available at https://www.olimex.com/Products/OLinuXino/A20/A20-OLinuXino-LIME/open-source-hardware (2020/05/08)
Olimex. A20-olinuxino-lime2. Available at https://www.olimex.com/Products/OLinuXino/A20/A20-OLinuXino-LIME2/open-source-hardware (2020/05/08)
Olimex. A20-olinuxino-micro. Available at https://www.olimex.com/Products/OLinuXino/A20/A20-OLinuXino-MICRO/open-source-hardware (2020/05/08)
Olimex. A20-olinuxino. Available at https://www.olimex.com/Products/OLinuXino/A33/A33-OLinuXino/open-source-hardware (2020/05/08)
Adibelli S, Juyal P, Nguyen LN, Prvulovic M, Zajic A (2020) Near-Field Backscattering-Based Sensing for Hardware Trojan Detection. IEEE Transactions on Antennas and Propagation 68(12):8082–8090. https://doi.org/10.1109/TAP.2020.3000562
Riscure. Em probe station. Available at https://getquote.riscure.com/en/quote/2101064/em-probe-station.htm (2020/05/08)
Technologies, K. M9391a pxie vector signal analyzer: 6 ghz. Available at https://www.keysight.com/en/pd-2317933-pn-M9391A/pxie-vector-signal-analyzer-1-mhz-to-3-ghz-or-6-ghz?&cc=US&lc=eng (2020/05/08)
Prvulovic M, Zajić A, Callan RL, Wang CJ (2017) A method for finding frequency-modulated and amplitude-modulated electromagnetic emanations in computer systems. IEEE Trans Electromagn Compat 59(1):34–42
Lee K, Lee K, Lee H, Shin J (2018) A simple unified framework for detecting out-of-distribution samples and adversarial attacks. In Adv Neural Inf Proces Syst 31:7167–7177. Curran Associates, Inc
Khan HA, Sehatbakhsh N, Nguyen LN, Prvulovic M, Zajić A (2019) Malware detection in embedded systems using neural network model for electromagnetic side-channel signals. Journal of Hardware and Systems Security 3(4):305–318. https://doi.org/10.1007/s41635-01900074-w
Paszke A, Gross S, Massa F, Lerer A, Bradbury J, Chanan G, Killeen T, Lin Z, Gimelshein N, Antiga L, Desmaison A, Kopf A, Yang E, DeVito Z, Raison M, Tejani A, Chilamkurthy S, SteinerB, Fang L, Bai J, Chintala S (2019) Pytorch: An imperative style, high-performance deep learning library. In Adv Neural Inf Proces Syst 32:8024–8035. Curran Associates, Inc
Loshchilov I, Hutter F (2019) Decoupled weight decay regularization. In ICLR
Cui Y, Jia M, Lin TY, Song Y, Belongie S (2019) Class-balanced loss based on effective number of samples
Acknowledgements
This work has been supported, in part, by DARPA LADS contract FA8650-16-C-7620 and ONR grant N00014-19-1-2287. The views and finding in this paper are those of the authors and do not reflect the views of DARPA or ONR.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jorgensen, E.J., Werner, F.T., Prvulovic, M. et al. Deep Learning Classification of Motherboard Components by Leveraging EM Side-Channel Signals. J Hardw Syst Secur 5, 114–126 (2021). https://doi.org/10.1007/s41635-021-00116-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41635-021-00116-2