🤖 AI Summary
Conventional hardware trojans rely on static thresholds or digital triggers, rendering them vulnerable to standard testing and defenses such as redundancy or sensor fusion. Method: This work introduces Environment Rate Manipulation (ERM), a novel trigger mechanism that activates the trojan based on the *rate of change*—rather than absolute values—of environmental parameters, enabling stealthy operation under steady-state conditions. A compact 14 μm² circuit monitors the charging rate of a front-end sensor capacitor in real time and maliciously alters inverter PWM signals. Contribution/Results: Experimental validation on a commercial solar inverter demonstrates successful induction of permanent driver IC failure. ETAP-based power grid simulations reveal that compromising a single 100 kW inverter suffices to trigger cascading instability across a regional grid. This work establishes a new paradigm for hardware attacks exploiting dynamic physical characteristics in power electronic systems, exposing critical vulnerabilities in infrastructure-level hardware security.
📝 Abstract
The growing complexity of global supply chains has made hardware Trojans a significant threat in sensor-based power electronics. Traditional Trojan designs depend on digital triggers or fixed threshold conditions that can be detected during standard testing. In contrast, we introduce Environmental Rate Manipulation (ERM), a novel Trojan triggering mechanism that activates by monitoring the rate of change in environmental parameters rather than their absolute values. This approach allows the Trojan to remain inactive under normal conditions and evade redundancy and sensor-fusion defenses. We implement a compact 14~$μ$m$^2$ circuit that measures capacitor charging rates in standard sensor front-ends and disrupts inverter pulse-width modulation PWM signals when a rapid change is induced. Experiments on a commercial Texas Instruments solar inverter demonstrate that ERM can trigger catastrophic driver chip failure. Furthermore, ETAP simulations indicate that a single compromised 100~kW inverter may initiate cascading grid instabilities. The attack's significance extends beyond individual sensors to entire classes of environmental sensing systems common in power electronics, demonstrating fundamental challenges for hardware security.