
NSF Org: |
CNS Division Of Computer and Network Systems |
Recipient: |
|
Initial Amendment Date: | May 15, 2015 |
Latest Amendment Date: | January 6, 2020 |
Award Number: | 1514050 |
Award Instrument: | Standard Grant |
Program Manager: |
Nina Amla
namla@nsf.gov (703)292-7991 CNS Division Of Computer and Network Systems CSE Directorate for Computer and Information Science and Engineering |
Start Date: | September 1, 2015 |
End Date: | August 31, 2020 (Estimated) |
Total Intended Award Amount: | $1,129,437.00 |
Total Awarded Amount to Date: | $1,137,437.00 |
Funds Obligated to Date: |
FY 2020 = $8,000.00 |
History of Investigator: |
|
Recipient Sponsored Research Office: |
800 WEST CAMPBELL RD. RICHARDSON TX US 75080-3021 (972)883-2313 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
800 W. Campbell Rd Richardson TX US 75080-3021 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): |
Special Projects - CNS, Secure &Trustworthy Cyberspace |
Primary Program Source: |
01002021DB NSF RESEARCH & RELATED ACTIVIT |
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.070 |
ABSTRACT
This project investigates the risks instigated by malicious hardware modifications (hardware Trojans) in the nodes of a wireless network and aims to develop remedies, thereby enabling secure deployment and fostering technology trustworthiness. Due to the lack of assurance mechanisms in the globalized integrated circuit (IC) supply chain, hardware Trojans have recently become the topic of intensified concern. At the same time, wireless networks constitute an indispensable part of modern electronic systems and their ability to communicate data that is typically encrypted over public channels makes them a prime attack target. Accordingly, this project provides a synergistic approach that combines information theory with IC design and test practices.
This project focuses on (1) modeling the risk induced by hardware Trojans in wireless networks, (2) elucidating this risk by designing realistic hardware Trojan-based attacks on both the baseband processor and the RF front-end, (3) developing countermeasures for preventing insertion and facilitating detection of hardware Trojans in wireless networks, and (4) demonstrating attack feasibility and countermeasure effectiveness using popular experimentation platforms enhanced with custom-designed Trojan-free and Trojan-infested Radio Frequency ICs. The investigators participate in outreach activities organized by Cybersecurity Research and Education Institute at the University of Texas at Dallas.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
PROJECT OUTCOMES REPORT
Disclaimer
This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.
Maliciously intended hardware modifications in electronic circuits (a.k.a. hardware Trojans) have become the topic of intensified concern due to the lack of assurance mechanisms in the globalized integrated circuit supply chain. At the same time, wireless networks have become an indispensable part of modern electronic systems and their ability to communicate data (typically encrypted) over public channels makes them a prime candidate for such attacks. Motivated by the above observations, this project focused on investigating the risks posed by hardware Trojans to wireless networks, despite conventional security measures, as well as on developing remedies to improve the trustworthiness of the wide range of applications involving wireless communications, thereby fostering technology trustworthiness.
Specifically, during the five-year period of this project, we employed a synergistic approach that combines information theory with integrated circuit design and test practices, though which we sought to (i) model the risk induced by hardware Trojans in wireless networks, (ii) elucidate this risk by designing realistic hardware Trojan-based attacks on both the baseband processor and the radio-frequency front-end of such wireless networks, (iii) develop countermeasures for preventing insertion and facilitating detection of hardware Trojans in wireless networks, and (iv) demonstrate attack feasibility and countermeasure effectiveness using popular experimentation platforms enhanced with custom-designed Trojan-free and Trojan-infested Radio Frequency (RF) ICs.
Accordingly, along these four directions, the key research outcomes of this project are summarized as follows: (i) we identified various entry points in the design and implementation of the baseband and the radio-frequency front-end of protocol-compliant contemporary wireless networks, such as 802.11, which could be leveraged in order to stage hardware Trojan-based attacks capable of leaking secret information over the public wireless channel, (ii) we designed a number of hardware Trojans which we introduced in the implementation of the aforementioned wireless networks to implement attacks that leak the secret encryption key and, thereby, compromise the security of the wireless communication while remaining clandestine, (iii) we developed a number of solutions leveraging both machine learning and advanced statistical analysis and information theory principles in order to detect the presence of such attacks, and (iv) we built two experimentation platforms, around the popular USRP and WARP experimentation boards, including custom-designed chips and printed circuit boards, through which we demonstrated through extensive actual over-the-air measurements the feasibility of the proposed hardware Trojan attacks and the effectiveness of the developed countermeasures.
The above research outcomes were complemented by educational and outreach activities, which included development of a new educational module on wireless network security, training of two postdoctoral research associates, four Ph.D. students and one undergraduate student, as well as dissemination of the findings of this project to both the local academic community at UT Dallas and the general research community through numerous conference and journal publications, award-winning hardware demonstrations, presentations and tutorials.
Last Modified: 01/09/2021
Modified by: Yiorgos Makris
Please report errors in award information by writing to: awardsearch@nsf.gov.