Putting A Backdoor In Computer Chips During Manufacturing

Researchers have provided the world with some very worrying finding, as it is possible to build a backdoor in computer chips. To make matters even worse, it would be nearly impossible to detect such a backdoor. Albeit this is only a proof-of-concept for the time being, it goes to show the technology we use can be tampered with in many different ways.

Computer Chips Can Contain A Backdoor

It has to be said, however, this proof-of-concept is the first fabrication-time processor attack of its kind. This also goes to show how analog attacks against technology may be even more disconcerting than their digital counterparts will ever be. Plus, executing an attack at the manufacturing stage could compromise the way we use technology in the future.

The study – presented in the form of a technical paper – mentions how a single logic gate needs to be added to a chip ready for fabrication. Additionally, there is a stealthy process involved to trigger changes in the gate’s functionality before it will act in a malicious manner. While this sounds a lot of trouble for potentially little reward, this method is all but impossible to detect.

Rather than changing the chip’s design or circuitry, targeting the logic gate

opens up a lot of opportunities. Keeping in mind how the logic gate controls the chip’s behavior, and how there are hundreds of millions of these gates per microprocessor, there is a significant risk.

Related Post

That being said, the logic gate would need to accumulate enough charge in the capacitor. Researchers showed a method to continually siphon charges from nearby wires when issuing specific commands. Given enough time, it is theoretically possible to turn a logic gate into a malicious piece of hardware.

One of the big questions becomes whether or not it is feasible to pursue an analog attack at the chip fabrication stage. The attacks apparently work, and they manage to evade known defenses. Companies relying on third-party suppliers for manufacturing designs could find themselves facing a real-time version of this threat in the future. Not to mention how law enforcement agencies might try their hand at executing such an attack.

Source: Dark Reading

Images credit 1,2

If you liked this article follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin and altcoin price analysis and the latest cryptocurrency news.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

Investor Frenzy: BEFE Coin Price Expected to Pump

The crypto market is finally back in full swing and is abuzz with rising price…

8 hours ago

Bitgert Coin: May 2024’s Top-Trending Cryptocurrency

Taking a look at the crypto market today, there's a lot of coin influx and…

8 hours ago

XERA, a Beacon of the Future For its Global Community

In the ever-evolving landscape of technology, some companies rise above the noise, not just for…

8 hours ago

Boost your crypto trading game and grow passive income with ValueZone

In the ever-evolving world of cryptocurrencies, the concept of cryptocurrency trading bots has attracted a…

12 hours ago

BlockDAG X1 App & Dogecoin20 Launch on CoinMarketCap

Dogecoin20 Launches on CoinMarketCap: Investors Flock to BlockDAG Following X1 Mobile Mining App Announcement in…

17 hours ago

BEFE Coin: The MEME Coin Revolutionizing Wealth Creation

Do you know about BEFE? This relatively nascent coin is now the talk of the…

23 hours ago