Award Abstract # 1514050
TWC: Medium: Hardware Trojans in Wireless Networks - Risks and Remedies

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: UNIVERSITY OF TEXAS AT DALLAS
Initial Amendment Date: May 15, 2015
Latest Amendment Date: January 6, 2020
Award Number: 1514050
Award Instrument: Standard Grant
Program Manager: Nina Amla
namla@nsf.gov
 (703)292-7991
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: September 1, 2015
End Date: August 31, 2020 (Estimated)
Total Intended Award Amount: $1,129,437.00
Total Awarded Amount to Date: $1,137,437.00
Funds Obligated to Date: FY 2015 = $1,129,437.00
FY 2020 = $8,000.00
History of Investigator:
  • Yiorgos Makris (Principal Investigator)
    yiorgos.makris@utdallas.edu
  • Aria Nosratinia (Co-Principal Investigator)
Recipient Sponsored Research Office: University of Texas at Dallas
800 WEST CAMPBELL RD.
RICHARDSON
TX  US  75080-3021
(972)883-2313
Sponsor Congressional District: 24
Primary Place of Performance: University of Texas at Dallas
800 W. Campbell Rd
Richardson
TX  US  75080-3021
Primary Place of Performance
Congressional District:
24
Unique Entity Identifier (UEI): EJCVPNN1WFS5
Parent UEI:
NSF Program(s): Special Projects - CNS,
Secure &Trustworthy Cyberspace
Primary Program Source: 01001516DB NSF RESEARCH & RELATED ACTIVIT
01002021DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 025Z, 7434, 7924, 9178, 9251
Program Element Code(s): 171400, 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

This project investigates the risks instigated by malicious hardware modifications (hardware Trojans) in the nodes of a wireless network and aims to develop remedies, thereby enabling secure deployment and fostering technology trustworthiness. Due to the lack of assurance mechanisms in the globalized integrated circuit (IC) supply chain, hardware Trojans have recently become the topic of intensified concern. At the same time, wireless networks constitute an indispensable part of modern electronic systems and their ability to communicate data that is typically encrypted over public channels makes them a prime attack target. Accordingly, this project provides a synergistic approach that combines information theory with IC design and test practices.

This project focuses on (1) modeling the risk induced by hardware Trojans in wireless networks, (2) elucidating this risk by designing realistic hardware Trojan-based attacks on both the baseband processor and the RF front-end, (3) developing countermeasures for preventing insertion and facilitating detection of hardware Trojans in wireless networks, and (4) demonstrating attack feasibility and countermeasure effectiveness using popular experimentation platforms enhanced with custom-designed Trojan-free and Trojan-infested Radio Frequency ICs. The investigators participate in outreach activities organized by Cybersecurity Research and Education Institute at the University of Texas at Dallas.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Helal, Noha and Bloch, Matthieu and Nosratinia, Aria "Resolvability of the Multiple Access Channel with Two-Sided Cooperation" IEEE International Symposium on Information Theory (ISIT) , 2020 https://doi.org/10.1109/ISIT44484.2020.9174302 Citation Details
H. ZivariFard, M. Bloch, and A. Nosratinia "Keyless Covert Communication in the Presence of Channel State Information" IEEE International Symposium on Information Theory , 2020 10.1109/ISIT44484.2020.9174089
K. S. Subramani A. Antonopoulos A. Abotabl A. Nosratinia Y. Makris "Demonstrating and Mitigating the Risk of a FEC-based Hardware Trojan in Wireless Networks" IEEE Transactions on Information Forensics and Security , v.14 , 2019
K.S. Subramani, N. Helal, A. Antonopoulos, A. Nosratinia, Y. Makris. "Amplitude-Modulating Analog/RF Hardware Trojans in Wireless Networks: Risks and Remedies" IEEE Transactions on Information Forensics and Security , v.15 , 2020 , p.3497
N. Helal, M. Bloch, and A. Nosratinia ""Cooperative Resolvability and Secrecy in the Cribbing Multiple-Access Channel" IEEE Transactions on Information Theory , v.66 , 2020 , p.5429 10.1109/TIT.2020.2995565
N. Helal, M. Bloch, and A. Nosratinia "Resolvability of the Multiple Access Channel with Two-Sided Cooperation" IEEE International Symposium on Information Theory , 2020 10.1109/ISIT44484.2020.9174302
Zivari-Fard, H. and Bloch, M. and Nosratinia, A. "Keyless Covert Communication in the Presence of Non-causal Channel State Information" IEEE Information Theory Workshop , 2019 Citation Details

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

Maliciously intended hardware modifications in electronic circuits (a.k.a. hardware Trojans) have become the topic of intensified concern due to the lack of assurance mechanisms in the globalized integrated circuit supply chain. At the same time, wireless networks have become an indispensable part of modern electronic systems and their ability to communicate data (typically encrypted) over public channels makes them a prime candidate for such attacks. Motivated by the above observations, this project focused on investigating the risks posed by hardware Trojans to wireless networks, despite conventional security measures, as well as on developing remedies to improve the trustworthiness of the wide range of applications involving wireless communications, thereby fostering technology trustworthiness.

Specifically, during the five-year period of this project, we employed a synergistic approach that combines information theory with integrated circuit design and test practices, though which we sought to (i) model the risk induced by hardware Trojans in wireless networks, (ii) elucidate this risk by designing realistic hardware Trojan-based attacks on both the baseband processor and the radio-frequency front-end of such wireless networks, (iii) develop countermeasures for preventing insertion and facilitating detection of hardware Trojans in wireless networks, and (iv) demonstrate attack feasibility and countermeasure effectiveness using popular experimentation platforms enhanced with custom-designed Trojan-free and Trojan-infested Radio Frequency (RF) ICs.

Accordingly, along these four directions, the key research outcomes of this project are summarized as follows: (i) we identified various entry points in the design and implementation of the baseband and the radio-frequency front-end of protocol-compliant contemporary wireless networks, such as 802.11, which could be leveraged in order to stage hardware Trojan-based attacks capable of leaking secret information over the public wireless channel, (ii) we designed a number of hardware Trojans which we introduced in the implementation of the aforementioned wireless networks to implement attacks that leak the secret encryption key and, thereby, compromise the security of the wireless communication while remaining clandestine, (iii) we developed a number of solutions leveraging both machine learning and advanced statistical analysis and information theory principles in order to detect the presence of such attacks, and (iv) we built two experimentation platforms, around the popular USRP and WARP experimentation boards, including custom-designed chips and printed circuit boards, through which we demonstrated through extensive actual over-the-air measurements the feasibility of the proposed hardware Trojan attacks and the effectiveness of the developed countermeasures.

The above research outcomes were complemented by educational and outreach activities, which included development of a new educational module on wireless network security, training of two postdoctoral research associates, four Ph.D. students and one undergraduate student, as well as dissemination of the findings of this project to both the local academic community at UT Dallas and the general research community through numerous conference and journal publications, award-winning hardware demonstrations, presentations and tutorials.


Last Modified: 01/09/2021
Modified by: Yiorgos Makris

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page