DocumentCode :
3391297
Title :
Supply chain risk mitigation for IT electronics
Author :
McFadden, Frank E. ; Arnold, Richard D.
Author_Institution :
CVI Analytics, Inc., Annandale, VA, USA
fYear :
2010
fDate :
8-10 Nov. 2010
Firstpage :
49
Lastpage :
55
Abstract :
Supply Chain Risk Management (SCRM) is one of the 12 Comprehensive National Cybersecurity Inititiatives (CNCI), but the range of supply chain problems has not been defined rigorously, and effective defenses have not yet been developed. Risks range from the increased unreliability of counterfeits to data exfiltration and adversary control enabled by hardware Trojan horses embedded in chips. Risks are different for military vs. non-military Government vs. civilian organizations. We cite cases that underscore the reality of supply chain risk, and analyze the structure of supply chains that affect different part of the market for IT electronics, in order to provide a better understanding of attack methods. We discuss techniques for defending against the range of threats, and propose a practical solution based on a suite of simple, inexpensive test procedures that could be used to build an "80% solution" for detection of counterfeits and embedded malicious implants before they are deployed. Tests we have prototyped include power signatures and of IR thermographic signatures of boot events. Deployment of such a test suite would change the SCRM game by making it significantly more difficult for supply chain exploits to succeed.
Keywords :
electronics industry; infrared imaging; risk management; security of data; supply chain management; IR thermographic signatures; IT electronics; adversary control; comprehensive national cybersecurity inititiatives; data exfiltration; hardware Trojan horses; power signatures; supply chain risk mitigation; Hardware; Implants; Microprogramming; Random access memory; Supply chains; Trojan horses; US Department of Defense; CNCI; Cyber security; counterfeit; supply chain;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Technologies for Homeland Security (HST), 2010 IEEE International Conference on
Conference_Location :
Waltham, MA
Print_ISBN :
978-1-4244-6047-2
Type :
conf
DOI :
10.1109/THS.2010.5655094
Filename :
5655094
Link To Document :
بازگشت