Virginia Tech® home

RF emanations analysis for supply chain microelectronics risk evaluation

Microelectronics embedded in computing platforms can emit electromagnetic emanations that can be exploited during manufacturing and spread through the supply chain. Researchers will explore the use of radio frequencies (RF) to develop safeguards for these components.

Funded by the CCI Hub


Project Investigators
Rationale and Background

Major supply chain systems rely heavily on microelectronics, which are extensively used in embedded computing platforms.

These components are often manufactured and programmed in environments lacking adequate security measures. This creates vulnerabilities that adversaries can exploit throughout the supply chain. 

Manipulation can occur through the injection of software Trojan programs or malicious modifications to integrated circuitry (hardware Trojans).

Methodology

Researchers will develop deep-learning-based frameworks to:

  • Detect Trojans running on electronic devices based on their unique emanations. 
  • Analyze RF emanations from microcontrollers, aiming to detect Trojan communications within the spectrum and potentially decode messages solely from the microcontroller’s RF emanations. 
  • Delve into training a deep neural network (DNN) to detect RF emanations from electronic devices such as microcontrollers. 
  • Develop novel means for communications with emanations and their detection.
Projected Outcomes

Researchers will:

  • Create simulations and conduct measurements to assess device radiation efficiency. 
  • Generate emanations at select frequencies.
  • Establish an RF emanation collection pipeline.
  • Develop RF emanation detection algorithms. 
  • Evaluate the performance of RF emanation detection across distances.
  • Design coding/decoding methods for RF emanation-based communications. 
  • Develop an integrated communication solution and evaluate its performance metrics, including reliability, throughput, and runtime efficiency. 
  • Develop and assess techniques to detect covert communications based on emanations.