This paper outlines simple changes that can be made to insert
vulnerabilities into silicon that are invisible to current
reverse-engineering techniques:

 http://people.umass.edu/gbecker/BeckerChes13.pdf

It uses Intel's random number generator as an example, detailing
precisely how it can be weakened such that it has predictable output yet
still appear perfectly random. This hack can be done by unobtrusive
changes to the production masks in the chip fabs.

One interesting note in the paper is that Intel has intentionally not
included the normal JTAG-style debugging interfaces on the RNG that
would allow you to spot this sort of tricker, ostensibly for security.
The trade-off here is "attackers can't discreetly snoop on your RNG
internals by physically connecting to pins on your CPU (though they can
still snoop on everything else on your system including the RNG
_output_)" vs "no one can validate the RNG behavior". This choice seems
a little suspect.


Secondly, the company Syphermedia does this sort of silicon-level
trickery as a business:

 www.smi.tv/SMI_SypherMedia_Library_Intro.pdf‎

Their primary customers appear to be companies making set-top boxes, but
it would be interesting to investigate if they have any links to the
NSA.

-- 
Mathematics is the supreme nostalgia of our time.


-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Reply via email to