Obfuscation-Based Protection Framework against Printed Circuit Boards Unauthorized Operation and Reverse Engineering

2017 ◽  
Vol 22 (3) ◽  
pp. 1-31 ◽  
Author(s):  
Zimu Guo ◽  
Jia Di ◽  
Mark M. Tehranipoor ◽  
Domenic Forte
Author(s):  
Navid Asadizanjani ◽  
Sina Shahbazmohamadi ◽  
Mark Tehranipoor ◽  
Domenic Forte

Abstract Reverse engineering of electronics systems is performed for various reasons ranging from honest ones such as failure analysis, fault isolation, trustworthiness verification, obsolescence management, etc. to dishonest ones such as cloning, counterfeiting, identification of vulnerabilities, development of attacks, etc. Regardless of the goal, it is imperative that the research community understands the requirements, complexities, and limitations of reverse engineering. Until recently, the reverse engineering was considered as destructive, time consuming, and prohibitively expensive, thereby restricting its application to a few remote cases. However, the advents of advanced characterization and imaging tools and software have counteracted this point of view. In this paper, we show how X-ray micro-tomography imaging can be combined with advanced 3D image processing and analysis to facilitate the automation of reverse engineering, and thereby lowering the associated time and cost. In this paper, we demonstrate our proposed process on two different printed circuit boards (PCBs). The first PCB is a four-layer custom designed board while the latter is a more complex commercial system. Lessons learned from this effort can be used to both develop advanced countermeasures and establish a more efficient workflow for instances where reverse engineering is deemed necessary. Keywords: Printed circuit boards, non-destructive imaging, X-ray tomography, reverse engineering.


2021 ◽  
Vol 17 (4) ◽  
pp. 1-53
Author(s):  
Ulbert J. Botero ◽  
Ronald Wilson ◽  
Hangwei Lu ◽  
Mir Tanjidur Rahman ◽  
Mukhil A. Mallaiyan ◽  
...  

In the context of hardware trust and assurance, reverse engineering has been often considered as an illegal action. Generally speaking, reverse engineering aims to retrieve information from a product, i.e., integrated circuits (ICs) and printed circuit boards (PCBs) in hardware security-related scenarios, in the hope of understanding the functionality of the device and determining its constituent components. Hence, it can raise serious issues concerning Intellectual Property (IP) infringement, the (in)effectiveness of security-related measures, and even new opportunities for injecting hardware Trojans. Ironically, reverse engineering can enable IP owners to verify and validate the design. Nevertheless, this cannot be achieved without overcoming numerous obstacles that limit successful outcomes of the reverse engineering process. This article surveys these challenges from two complementary perspectives: image processing and machine learning. These two fields of study form a firm basis for the enhancement of efficiency and accuracy of reverse engineering processes for both PCBs and ICs. In summary, therefore, this article presents a roadmap indicating clearly the actions to be taken to fulfill hardware trust and assurance objectives.


2008 ◽  
Vol 128 (11) ◽  
pp. 657-662 ◽  
Author(s):  
Tsuyoshi Maeno ◽  
Yukihiko Sakurai ◽  
Takanori Unou ◽  
Kouji Ichikawa ◽  
Osamu Fujiwara

Sign in / Sign up

Export Citation Format

Share Document