Putting A Backdoor In Computer Chips During Manufacturing

Researchers have provided the world with some very worrying finding, as it is possible to build a backdoor in computer chips. To make matters even worse, it would be nearly impossible to detect such a backdoor. Albeit this is only a proof-of-concept for the time being, it goes to show the technology we use can be tampered with in many different ways.

Computer Chips Can Contain A Backdoor

It has to be said, however, this proof-of-concept is the first fabrication-time processor attack of its kind. This also goes to show how analog attacks against technology may be even more disconcerting than their digital counterparts will ever be. Plus, executing an attack at the manufacturing stage could compromise the way we use technology in the future.

The study – presented in the form of a technical paper – mentions how a single logic gate needs to be added to a chip ready for fabrication. Additionally, there is a stealthy process involved to trigger changes in the gate’s functionality before it will act in a malicious manner. While this sounds a lot of trouble for potentially little reward, this method is all but impossible to detect.

Rather than changing the chip’s design or circuitry, targeting the logic gate

opens up a lot of opportunities. Keeping in mind how the logic gate controls the chip’s behavior, and how there are hundreds of millions of these gates per microprocessor, there is a significant risk.

Related Post

That being said, the logic gate would need to accumulate enough charge in the capacitor. Researchers showed a method to continually siphon charges from nearby wires when issuing specific commands. Given enough time, it is theoretically possible to turn a logic gate into a malicious piece of hardware.

One of the big questions becomes whether or not it is feasible to pursue an analog attack at the chip fabrication stage. The attacks apparently work, and they manage to evade known defenses. Companies relying on third-party suppliers for manufacturing designs could find themselves facing a real-time version of this threat in the future. Not to mention how law enforcement agencies might try their hand at executing such an attack.

Source: Dark Reading

Images credit 1,2

If you liked this article follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin and altcoin price analysis and the latest cryptocurrency news.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

FOMO Selling Trigger $1 Billion Liquidations as LINK & SOL Bleed Heavily; What to Do Next?

In the past, Chainlink (LINK) and Solana (SOL) have been among the most discussed altcoins…

5 hours ago

Qubetics $7.4M Presale Revolutionises Blockchain as Bitcoin and Chainlink Drive Innovation: Best Cryptos to Buy for 2025

The crypto market is abuzz with excitement as 2025 approaches. While Bitcoin continues to dominate…

11 hours ago

Best Altcoins to Buy Today: Why Qubetics’ Presale Could Be the Best Investment Opportunity of 2024

The cryptocurrency market never sleeps, and every day feels like an adventure. From household names…

17 hours ago

Forget DOGE and SHIB: These 5 Memecoins Are 2025’s Millionaire Makers

The memecoin craze is evolving, and a new wave of contenders is rising. With fresh…

1 day ago

While Ethereum Approaches $6K, XYZVerse Prepares for a 16,900% Market Shakeup

As Ethereum's value inches toward unprecedented heights, another digital asset is set to make a…

1 day ago

Four Meme Coins That Might Disappoint and One That Could Deliver Big Gains

Meme coins are the wild cards of the crypto world—one day they're "to the moon,"…

1 day ago