Putting A Backdoor In Computer Chips During Manufacturing

Researchers have provided the world with some very worrying finding, as it is possible to build a backdoor in computer chips. To make matters even worse, it would be nearly impossible to detect such a backdoor. Albeit this is only a proof-of-concept for the time being, it goes to show the technology we use can be tampered with in many different ways.

Computer Chips Can Contain A Backdoor

It has to be said, however, this proof-of-concept is the first fabrication-time processor attack of its kind. This also goes to show how analog attacks against technology may be even more disconcerting than their digital counterparts will ever be. Plus, executing an attack at the manufacturing stage could compromise the way we use technology in the future.

The study – presented in the form of a technical paper – mentions how a single logic gate needs to be added to a chip ready for fabrication. Additionally, there is a stealthy process involved to trigger changes in the gate’s functionality before it will act in a malicious manner. While this sounds a lot of trouble for potentially little reward, this method is all but impossible to detect.

Rather than changing the chip’s design or circuitry, targeting the logic gate opens up a lot of opportunities. Keeping in mind how the logic gate controls the chip’s behavior, and how there are hundreds of millions of these gates per microprocessor, there is a significant risk.

Related Post

That being said, the logic gate would need to accumulate enough charge in the capacitor. Researchers showed a method to continually siphon charges from nearby wires when issuing specific commands. Given enough time, it is theoretically possible to turn a logic gate into a malicious piece of hardware.

One of the big questions becomes whether or not it is feasible to pursue an analog attack at the chip fabrication stage. The attacks apparently work, and they manage to evade known defenses. Companies relying on third-party suppliers for manufacturing designs could find themselves facing a real-time version of this threat in the future. Not to mention how law enforcement agencies might try their hand at executing such an attack.

Source: Dark Reading

Images credit 1,2

If you liked this article follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin and altcoin price analysis and the latest cryptocurrency news.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

Supreme Court Strikes Down Trump Emergency Tariffs In Landmark Ruling Limiting Executive Trade Powers

In a landmark decision that reshapes U.S. trade policy, the Supreme Court of the United…

18 hours ago

USDT Supply Decline Marks Biggest Contraction Since FTX Era

The global stablecoin market is entering a new phase of recalibration as the circulating supply…

18 hours ago

xStocks Surpasses $25 Billion Volume As Tokenized Equities Enter New Market Phase

The tokenized equities sector is accelerating rapidly, and xStocks has now crossed a defining milestone:…

2 days ago

Base Begins Transition To Native Tech Stack In Major Layer 2 Shift

Coinbase-incubated Layer 2 network Base is entering a new phase of its development, moving toward…

2 days ago

Zora Officially Launches Its Revolutionary “Attention Market” On Solana In A Bold Multichain Expansion

Zora has officially launched its new “attention market” on the Solana blockchain, marking a bold…

3 days ago

XRP Ledger Activates Permissioned DEX With XLS-81 As Institutional Trading Model Emerges

The XRP Ledger has introduced a new on-chain trading framework that signals a notable shift…

3 days ago