Researchers have shown that it is possible to compromise the functioning of a cryptographic chip without changing its physical layout.
Based on altering the distribution of dopants in a few components on the chip during fabrication, this method represents a big challenge for cyber-security as it is nearly impossible to detect with any currently practical detection scheme.
Progress in the design and fabrication of processor chips is mainly aimed at making them faster and smaller. There is another important requirement, however – ensuring that they function as intended. In particular, the cryptographic functions of new chips must provide the level of security with which they were designed. If they fail in this task, even use of sophisticated security software, physical isolation, and well vetted operators cannot ensure the security of a system.
Such structural attacks on the functions of a chip are called hardware Trojans, and are capable of rendering ineffective the security protecting our most critical computer systems and data. Both industry and governments have put a great deal of not very public effort into the problem of hardware Trojans. The most reliable tests to find hardware Trojans will be applied to the finished product. So how are they tested and what are the implications of the new research?
Functional Testing
Functional testing is the sort of testing with which most people are familiar. The function of a chip is tested by applying patterns of test inputs to the input pins of the chip. The outputs are monitored, and compared with the outputs expected from the original specifications and definition of the chip.
Extremely sophisticated devices for functional testing abound in the world of IC design and fabrication. Unfortunately, such testing is usually not very effective for finding hardware Trojans. It is impossible in any practical sense to test all patterns of activation of all components in the chip, so the test patterns are usually designed to test all the known gates on the chip. While such patterns catch most accidental design flaws and fabrication defects, they are likely to fail to activate malicious logic elements added to the original design.
Optical Reverse-Engineering
The most direct approach to find hardware Trojans is to disassemble the chip layer by layer, and compare it with the correct structural design. If there is a visible difference (possibly detected with scanning electron microscopy rather than a camera) between the layers of the chip as designed and the layers of the actual chip, there is a problem that needs to be diagnosed. This is essentially the procedure that would be undertaken to reverse-engineer a chip.
While reverse-engineering a chip sounds like a good way to detect hardware alterations, the problem is considerably more slippery when the goal is to find hardware Trojans. When reverse-engineering is the goal, you start with your competitor’s chip, and try to decipher and duplicate the chip. While various techniques can be applied to the chip to complicate this process, you are never in any doubt that the original chip works properly.
If a production chip is suspected of harboring hardware Trojans, however, the structure revealed in the disassembly process must be compared with some reference design. The ideal reference is a “golden chip”, meaning a chip known to accurately reflect the goals of the desired chip functionality with no additions, subtractions, or alterations. We’ll talk about where such a chip might come from later.
The Latest Bing News on:
Hardware Trojans
- Kendrick baseball team claims district championship over two-time defending state champion Troyon May 12, 2024 at 12:00 am
The Kendrick, Potlatch, Clearwater Valley and Troy baseball teams on Saturday were playing for pride — and for hardware.
- Here are the top boys finishers from the 2024 Mid-Penn track and field championshipson May 11, 2024 at 3:57 pm
CHAMBERSBURG – The first leg of the high school track and field postseason is in the books with the conclusion of the 2024 Mid-Penn Conference championships.
- Corona del Mar boys’ tennis blows past Harvard-Westlake to reach third straight CIF finalon May 9, 2024 at 1:19 pm
Corona del Mar won eight singles sets and seven doubles sets to get past the Wolverines in an emotional match. The Sea Kings clinched it with their 10th set win in the second round, when senior ...
- 11 Essential Features Every Endpoint Protection Solution Should Haveon May 9, 2024 at 1:38 am
Not all endpoints can be found on a desk, or mounted on a wall. Some of them are hugely important, such as storage devices. Storage control tools are a vital component of endpoint protection suites, ...
- USC Football News: Trojans Are Favorites To Make the Final Fouron May 6, 2024 at 3:05 pm
Looking ahead, the Trojans are not just aiming to replicate their recent achievements but to exceed them, with sights firmly set on the Final Four next season. USC's roster for the upcoming season ...
- Malware explained: How to prevent, detect and recover from iton May 2, 2024 at 5:00 pm
You’ve probably heard the words virus, trojan, and worm used interchangeably ... keeping an inventory of hardware so you know what you need to protect, and performing continuous vulnerability ...
- USC Football: Trojans Earn Commit From New Kickeron April 29, 2024 at 5:00 pm
Walk-on kicker Denis Lynch manned the spot for the Trojans. While he was decent (10-of-14 on FG attempts), his lack of respective range led to USC either punting or being forced to go for it on ...
- Android device hijacking facilitated by new Brokewell banking trojanon April 26, 2024 at 6:34 am
BleepingComputer reports that Android devices could have their data compromised and be eventually hijacked in attacks with the novel Brokewell banking trojan.
- Column: Reggie Bush’s deserved Heisman Trophy shouldn’t overshadow his troubled Trojans legacyon April 24, 2024 at 4:12 pm
The fact that he has regained a piece of hardware produced by his amazing ... investigation essentially burned down Heritage Hall, the Trojans have never regained national prominence.
- USC Football: Trojans In Running For Top-Ranked CB In Transfer Portalon April 16, 2024 at 5:01 pm
The USC Trojans are apparently among the top landing spots for the top quarterback in the transfer portal, Cormani McClain, according to Tom Loy of 247Sports. Loy reports that the Trojans are 'all ...
The Latest Google Headlines on:
Hardware Trojans
[google_news title=”” keyword=”Hardware Trojans” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]
The Latest Bing News on:
Cryptographic chip
- SRAM Security Concerns Growon May 9, 2024 at 10:04 am
Volatile memory threat increases as chips are disaggregated into chiplets, making it easier to isolate memory and slow data degradation.
- Niobium Secures $5.5M in Venture Financing to Commercialize FHE Accelerator Chipon May 7, 2024 at 8:43 am
Niobium today announced the completion of a $5.5 million seed fundraising round, marking a substantial step towards its ...
- Keysight introduces new testing capabilities to strengthen post-quantum cryptographyon May 6, 2024 at 5:36 am
Keysight Technologies, Inc. has announced industry-first testing capabilities designed to test the robustness of post-quantum cryptography (PQC). This latest addition to Keysight Inspector is a ...
- Keysight hones post-quantum algorithm testingon May 2, 2024 at 3:49 pm
Keysight announced additional testing capabilities for its Inspector security platform to assess the robustness of post-quantum cryptography.
- Keysight Introduces New Testing Capabilities to Strengthen Post-Quantum Cryptographyon April 30, 2024 at 8:00 am
Industry-first testing capabilities addresses the demand for improved security in the post-quantum era Enables device and chip vendors ... the latest post-quantum cryptography algorithms as ...
- Fortanix launches Key Insight to help enterprises manage cryptographic security riskson April 28, 2024 at 11:00 pm
The launch comes as enterprises increasingly struggle to maintain a consistent cryptographic security posture amid the rapid adoption of cloud services and the looming threat of quantum computing.
- IOActive finds hackers have compromised some game controllerson April 16, 2024 at 11:30 pm
That was paired with a secure element that had the actual cryptographic authentication keys on it. But then something happened. In one generational change in the hardware, the controller chips ...
- PuTTY SSH client flaw allows recovery of cryptographic private keyson April 16, 2024 at 4:01 am
A vulnerability tracked as CVE-2024-31497 in PuTTY 0.68 through 0.80 could potentially allow attackers with access to 60 cryptographic signatures to recover the private key used for their generation.
- There’s a vulnerability in Apple’s Mac chips–and the fix might be as bad as the flawon March 22, 2024 at 3:01 pm
A group of university researchers has revealed a vulnerability in Apple’s M-series chips that can be exploited to gain access to cryptographic keys. Dubbed “GoFetch,” the vulnerability can ...
- How to Install Windows 11 on unsupported PC without TPMon May 22, 2023 at 5:18 am
TPM, which is an abbreviation of Trusted Platform Module is a dedicated chip that’s used to keep cryptographic keys. It is there to secure your computer and is nothing but hardware-layer encryption.
The Latest Google Headlines on:
Cryptographic chip
[google_news title=”” keyword=”cryptographic chip” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]