Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Stealthy Dopant-Level Hardware Trojans
#1
Quote:In this paper we propose an extremely stealthy approach  for  implementing hardware Trojans below the gate level, and we evaluate their impact on the security of the target  device. Instead of adding additional circuitry to the target design, we insert our hardware Trojans by changing the dopant polarity of existing transistors.

https://www.emsec.rub.de/media/crypto/ve...tended.pdf

“If you think you are too small to make a difference, try sleeping with a mosquito.” - Dalai Lama XIV
Reply
#2
Jel ti poznat Mika? : )
Ljudi rade profi decenijama, bas skoro nesto sa kolegom pricao, kao kako mogu, pa pitaj SVE te proizvodjace sto NE ZASTITE? : )

http://www.break-ic.com

BTW: Sto stalno spominjem FRAM, to je jedna od retkih tehnologija koja nece moci vise da se iscitava na fizickom nivou pomocu mikroskopa jer ne mogu da vide naelektrisanje !!!
Kod svih ostalih vrsta memorija se vidi fizicki promena izmedju 0 i 1, moze da se bukvalno "vidi" svaki bit, to se posle verovatno njima sad vec nekim automatizovanim metodama rekonstruise u HEX dump programa pa ga posle muče sa disasemblerima : ) ... ko zna sta rade, provalilu su im svima cake, retko koji MCU nije tu na spisku, ima i malo ozbiljnijih kontrolera koje nisu hakovali ...

BTW2: Mozda su im svima provalili "trojance" koji inace cuce u tim mikrokontrolerima negde nekako!!?? Nista nije iskljuceno ... Hajde uzmi malo provrti OP-CODE set i postavi svoje neke "nepostojece" instrukcije da vidis da li bas "nista" nece da se desi? : )
Pa znas koliko ima nedokumentovanih funkcija .... ihhh ....
Tek sada kada su poceli fizicki da gledaju u IC pod mikroskopom pocinju da nalaze neke funkcije koje stoje decenijama u mikrokontrolerima i nisu bile poznate.
Reply
#3
Mislim da smo tokom jedne diskusiju dosli i do Mika Smile

Btw evo malo detalja o FRAM bezbednosti:

- FRAM MCU Key Strengths and Applications: https://www.fujitsu.com/us/Images/FRAM_AppNote.pdf

- Closing the security gap with TI’s MSP430™ FRAM-based microcontrollers: http://www.ti.com/lit/wp/slay035/slay035.pdf

- Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs: https://eprint.iacr.org/2015/199.pdf
“If you think you are too small to make a difference, try sleeping with a mosquito.” - Dalai Lama XIV
Reply
#4
Vidi ovo, sta je to neki fuzzer za trazenje skrivenih instrukcija u x86:
https://hackaday.com/2017/07/30/find-ins...-your-cpu/

Ili ovo za 8085, "odavno" poznato da je nedokumentovano : )
https://www.ee.iitb.ac.in/~sumantra/cour...c_8085.pdf

U Si5351 sam licno nasao par registra koji nisu dokumentovani a koji nesto rade i vidi se rezultat tamo na izlazu generatora ali nisam ustanovio logicku zavistnost ...
Reply
#5
^ zanimljivo Smile Mogli bi da se igramo sa time kad se vidimo!
“If you think you are too small to make a difference, try sleeping with a mosquito.” - Dalai Lama XIV
Reply
#6
rekao bih da postoji backdoor na svakom nivou apstrakcije
ovo je bas interesantno
Reply
#7
(Apr 03, 2018) Unsafe Opcodes exposed in Intel SPI based products: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087&languageid=en-fr
“If you think you are too small to make a difference, try sleeping with a mosquito.” - Dalai Lama XIV
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)