Putting A Backdoor In Computer Chips During Manufacturing

Researchers have provided the world with some very worrying finding, as it is possible to build a backdoor in computer chips. To make matters even worse, it would be nearly impossible to detect such a backdoor. Albeit this is only a proof-of-concept for the time being, it goes to show the technology we use can be tampered with in many different ways.

Computer Chips Can Contain A Backdoor

It has to be said, however, this proof-of-concept is the first fabrication-time processor attack of its kind. This also goes to show how analog attacks against technology may be even more disconcerting than their digital counterparts will ever be. Plus, executing an attack at the manufacturing stage could compromise the way we use technology in the future.

The study – presented in the form of a technical paper – mentions how a single logic gate needs to be added to a chip ready for fabrication. Additionally, there is a stealthy process involved to trigger changes in the gate’s functionality before it will act in a malicious manner. While this sounds a lot of trouble for potentially little reward, this method is all but impossible to detect.

Rather than changing the chip’s design or circuitry, targeting the logic gate

opens up a lot of opportunities. Keeping in mind how the logic gate controls the chip’s behavior, and how there are hundreds of millions of these gates per microprocessor, there is a significant risk.

Related Post

That being said, the logic gate would need to accumulate enough charge in the capacitor. Researchers showed a method to continually siphon charges from nearby wires when issuing specific commands. Given enough time, it is theoretically possible to turn a logic gate into a malicious piece of hardware.

One of the big questions becomes whether or not it is feasible to pursue an analog attack at the chip fabrication stage. The attacks apparently work, and they manage to evade known defenses. Companies relying on third-party suppliers for manufacturing designs could find themselves facing a real-time version of this threat in the future. Not to mention how law enforcement agencies might try their hand at executing such an attack.

Source: Dark Reading

Images credit 1,2

If you liked this article follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin and altcoin price analysis and the latest cryptocurrency news.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

Ethereum Down While Bitcoin, Solana, and JetBolt Skyrocket In End November 2024

Ethereum stumbles as Bitcoin surges past $97K, Solana eyes new highs, and JetBolt’s presale shakes…

54 seconds ago

Top 5 Best Crypto Presales to Grab Now: Don’t Miss These December Week 1 Gems

The crypto market is a buzz with promising presales as 2024 draws the curtains. With…

20 mins ago

Cheems Surge On BSC Network: A Rising Star With Growing Market Value

The Cheems token on the Binance Smart Chain (BSC) is gaining significant momentum, surging by…

9 hours ago

Lester Token Crashes 40% Following Official Announcement

The value of $LESTER plummeted by 40% in the past 24 hours, leaving its market…

9 hours ago

From $30K To Millions: The Wild Journey Of $Quant And Xiaohaige’s Memecoin Stunts

In a bizarre turn of events, a young live-streamer known as Xiaohaige created the memecoin…

9 hours ago

Whale “convexcuck.eth” Makes Bold $CVX Move, Nets Significant Profit Amid Price Surge

The crypto whale known as "convexcuck.eth" has made waves in the DeFi world, spending $2…

9 hours ago