Detecting Covert Data Confidentiality Attacks in Chip-Scale Optical Interconnects

Binary code behind a padlock
Opportunity

Available for Licensing
TRL: 2

IP Status

US Provisional Patent

Inventors
Reference No: 2022-053
Licensing Manager

Jessy McGowan

Jessy.McGowan@colostate.edu
970-491-7100

At a Glance

The proposed method detects data confidentiality attacks in optical interconnects. By reducing the amount of laser power used to send a signal to a detector, a malicious detector is no longer able to covertly monitor or snoop data. In this manner, the invention provides a novel technique that, when combined with conventional capabilities such as traditional CRC or Hamming codes in network packet headers- provides quick and effective detection of data corruption and data confidentiality attacks having occurred in the optical interconnect part of a transport network.

Background

The ongoing trend of using optical fiber to greater extents in computing and communications technologies has been ongoing, increasing the traffic and types of data that are transmitted over optical networks. An assumption that fiber optical data transmission is inherently safe(r) from cyber threats is proving to be false. The danger to data and confidentiality has migrated from when the data is at rest in hard drives and other storage mechanisms within premises of enterprises and data centers, to when the data is transmitted from a storage location to another point such as a user’s computer.

Overview

The proposed methodology utilizes the architecture of the existing network to detect losses by the (data) packets moving from the transmitting point, such as a data center, to the receiving point, such as an enterprise user’s computer.  It checks the amount of laser power required to send the data from the source node to be validated (i.e. correctly detected) at the destination node. If there is a significant variation in this measure, it detects that data confidentiality may have been breached during the transmission.


By integrating this measure into the overall data transmission methodology and incorporating elements such as estimating and accounting for the changes (i.e., losses, gains) due to the distance traveled, amplification of the data, and others; the destination node can decipher if the integrity of the data has been compromised along the way and decide if it should be disregarded as not being authentic.

Benefits
  •  Improves the ability to securely send data on optical networks
  •  Allows for quick detection of data confidentiality attacks in optical network
  • Simple and effective design can be implemented in photonic integrated circuits without
    any changes to fabrication technique
  •  Could be used in combination with encryption methods to secure data
  • A wide variety of cyber threats, such as hardware Trojans, can be detected and addressed using the proposed method
Applications
  • Data security over optical networks
  • Data security in optically-connected processors and chiplet platforms 

Last updated: October 2022