2019
DOI: 10.1109/temc.2018.2849105
|View full text |Cite
|
Sign up to set email alerts
|

Data Injection Attack Against Electronic Devices With Locally Weakened Immunity Using a Hardware Trojan

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…Specific IEMI attacks against UAS include high-altitude electromagnetic pulses (i.e., high-altitude nuclear detonation that produce intense radiated peak field strengths that can damage avionics) [51] [53], jamming (i.e., high-powered electromagnetic signals targeted at avionics) [54] [55] [56], and data/signal injection attacks even at low power levels [57] [58] [49]. Additionally, malicious hardware modifications [59] can amplify avionics' susceptibility to create localized zones of weakened immunity to external RF exploitation; this leads to arbitrary data injection, reading sensor measurements/processor memories, and denial-of-service crashes. A detailed discussion on such attacks and their respective attack vectors are beyond the scope of our study as our focus will be on system-and environmental-related sources of interference.…”
Section: Cyber Securitymentioning
confidence: 99%
“…Specific IEMI attacks against UAS include high-altitude electromagnetic pulses (i.e., high-altitude nuclear detonation that produce intense radiated peak field strengths that can damage avionics) [51] [53], jamming (i.e., high-powered electromagnetic signals targeted at avionics) [54] [55] [56], and data/signal injection attacks even at low power levels [57] [58] [49]. Additionally, malicious hardware modifications [59] can amplify avionics' susceptibility to create localized zones of weakened immunity to external RF exploitation; this leads to arbitrary data injection, reading sensor measurements/processor memories, and denial-of-service crashes. A detailed discussion on such attacks and their respective attack vectors are beyond the scope of our study as our focus will be on system-and environmental-related sources of interference.…”
Section: Cyber Securitymentioning
confidence: 99%
“…Subramani et al [19] demonstrated an HT in a wireless network by exploiting the forward error correction block to create a covert channel. Similarly, Kaji et al [36] proposed a data injection attack by exploiting HT to create specific electromagnetic waves as a covert channel. (iv) Remote activation . Since an attacker may have limited physical access to deployed devices, triggering HTs remotely is an ideal choice.…”
Section: In‐house Design Team Attacksmentioning
confidence: 99%
“…As the hardware-level attack, a malicious logic (well-known as hardware Trojan) hidden in internal logic might be premeditatedly designed to cause the program execution failures at key points or could create the backdoors for both confidential information leakages and subsequent system hijacking to attackers [ 5 ]. On the other hand, the external physical attacks can exploit the three invasive methods of bus monitoring, offline analysis, and data tampering to steal the sensitive information and/or activate the built-in hardware Trojan to disorganize the program execution through external access interfaces [ 6 , 7 ]. System-level attacks mainly exploit the security vulnerabilities or bugs in software applications to disturb the instruction executions or cause buffer overflows by injecting malicious codes for subverting the system trustworthiness and obtaining the unauthorized control of system.…”
Section: Introductionmentioning
confidence: 99%