Environmental Rate Manipulation Attacks on Power Grid Security

📅 2025-09-29
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Conventional hardware trojans rely on static thresholds or digital triggers, rendering them vulnerable to standard testing and defenses such as redundancy or sensor fusion. Method: This work introduces Environment Rate Manipulation (ERM), a novel trigger mechanism that activates the trojan based on the *rate of change*—rather than absolute values—of environmental parameters, enabling stealthy operation under steady-state conditions. A compact 14 μm² circuit monitors the charging rate of a front-end sensor capacitor in real time and maliciously alters inverter PWM signals. Contribution/Results: Experimental validation on a commercial solar inverter demonstrates successful induction of permanent driver IC failure. ETAP-based power grid simulations reveal that compromising a single 100 kW inverter suffices to trigger cascading instability across a regional grid. This work establishes a new paradigm for hardware attacks exploiting dynamic physical characteristics in power electronic systems, exposing critical vulnerabilities in infrastructure-level hardware security.

Technology Category

Application Category

📝 Abstract
The growing complexity of global supply chains has made hardware Trojans a significant threat in sensor-based power electronics. Traditional Trojan designs depend on digital triggers or fixed threshold conditions that can be detected during standard testing. In contrast, we introduce Environmental Rate Manipulation (ERM), a novel Trojan triggering mechanism that activates by monitoring the rate of change in environmental parameters rather than their absolute values. This approach allows the Trojan to remain inactive under normal conditions and evade redundancy and sensor-fusion defenses. We implement a compact 14~$μ$m$^2$ circuit that measures capacitor charging rates in standard sensor front-ends and disrupts inverter pulse-width modulation PWM signals when a rapid change is induced. Experiments on a commercial Texas Instruments solar inverter demonstrate that ERM can trigger catastrophic driver chip failure. Furthermore, ETAP simulations indicate that a single compromised 100~kW inverter may initiate cascading grid instabilities. The attack's significance extends beyond individual sensors to entire classes of environmental sensing systems common in power electronics, demonstrating fundamental challenges for hardware security.
Problem

Research questions and friction points this paper is trying to address.

Detecting novel environmental rate manipulation attacks on power grid hardware
Preventing Trojan activation through environmental parameter change monitoring
Mitigating cascading grid instabilities from compromised power electronics systems
Innovation

Methods, ideas, or system contributions that make the work stand out.

Environmental Rate Manipulation triggers Trojan via parameter change rates
Compact circuit measures capacitor charging rates in sensor front-ends
Attack disrupts inverter PWM signals to cause cascading grid failures
🔎 Similar Papers
No similar papers found.
Y
Yonatan Gizachew Achamyeleh
University of California, Irvine, CA, USA
Y
Yang Xiang
University of California, Irvine, CA, USA
Y
Yun-Ping Hsiao
University of California, Irvine, CA, USA
Yasamin Moghaddas
Yasamin Moghaddas
University of California Irvine
Mohammad Abdullah Al Faruque
Mohammad Abdullah Al Faruque
Conexant-Broadcom Endowed Chair Professor of the University of California Irvine
Embedded SystemsCyber-Physical SystemsAutonomous SystemsDesign AutomationCPS Security