Putting A Backdoor In Computer Chips During Manufacturing

Researchers have provided the world with some very worrying finding, as it is possible to build a backdoor in computer chips. To make matters even worse, it would be nearly impossible to detect such a backdoor. Albeit this is only a proof-of-concept for the time being, it goes to show the technology we use can be tampered with in many different ways.

Computer Chips Can Contain A Backdoor

It has to be said, however, this proof-of-concept is the first fabrication-time processor attack of its kind. This also goes to show how analog attacks against technology may be even more disconcerting than their digital counterparts will ever be. Plus, executing an attack at the manufacturing stage could compromise the way we use technology in the future.

The study – presented in the form of a technical paper – mentions how a single logic gate needs to be added to a chip ready for fabrication. Additionally, there is a stealthy process involved to trigger changes in the gate’s functionality before it will act in a malicious manner. While this sounds a lot of trouble for potentially little reward, this method is all but impossible to detect.

Rather than changing the chip’s design or circuitry, targeting the logic gate opens up a lot of opportunities. Keeping in mind how the logic gate controls the chip’s behavior, and how there are hundreds of millions of these gates per microprocessor, there is a significant risk.

Related Post

That being said, the logic gate would need to accumulate enough charge in the capacitor. Researchers showed a method to continually siphon charges from nearby wires when issuing specific commands. Given enough time, it is theoretically possible to turn a logic gate into a malicious piece of hardware.

One of the big questions becomes whether or not it is feasible to pursue an analog attack at the chip fabrication stage. The attacks apparently work, and they manage to evade known defenses. Companies relying on third-party suppliers for manufacturing designs could find themselves facing a real-time version of this threat in the future. Not to mention how law enforcement agencies might try their hand at executing such an attack.

Source: Dark Reading

Images credit 1,2

If you liked this article follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin and altcoin price analysis and the latest cryptocurrency news.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

The Calculated Collapse of $TG: How a “Utility” Token Was Engineered for a Rug Pull

In the unpredictable world of cryptocurrency, new tokens launch daily, each one a shining beacon…

1 day ago

Staked Ethereum Hits Record High as Whale Accumulation Signals Bullish Long-Term Sentiment

Once more, Ethereum is commanding the spotlight as fresh figures indicate that the amount of…

1 day ago

Arbitrum Sees Surge in Protocol Revenue and EIP-7702 Adoption Following ArbOS 40 Upgrade

The ecosystem on Arbitrum keeps flaunting its robust foundations, with a steady incline in the…

1 day ago

Ethereum Whale Accumulation Surges as Long-Term Confidence Outweighs Short-Term Volatility

Once again, major market players are focusing on Ethereum. The whale activity surrounding the second-largest…

4 days ago

Week in AI: Fartcoin Steals the Spotlight Amid Market Turmoil

It has been a tumultuous week for the artificial intelligence sector in crypto. Sharp valuation…

5 days ago

BSC Foundation Resumes Strategic Accumulation: VIXBT, CAKE, LISTA, and MOOLAH Under Spotlight

Following a brief stint of dormancy, the BSC Foundation is back in action, reestablishing its strategic…

7 days ago