https://lwn.net/Articles/688751/
"Worth a read: this paper [PDF][1][2] From Kaiyuan Yang et al. on how an analog back door can be placed into a hardware platform like a CPU. "In this paper, we show how a fabrication-time attacker can leverage analog circuits to create a hardware attack that is small (i.e., requires as little as one gate) and stealthy (i.e., requires an unlikely trigger sequence before effecting [sic] a chip's functionality). In the open spaces of an already placed and routed design, we construct a circuit that uses capacitors to siphon charge from nearby wires as they transition between digital values. When the capacitors fully charge, they deploy an attack that forces a victim flip-flop to a desired value. We weaponize this attack into a remotely-controllable privilege escalation by attaching the capacitor to a wire controllable and by selecting a victim flip-flop that holds the privilege bit for our processor.""
[1] Link to PDF in article: http://static1.1.sqspcdn.com/static/f/543048/26931843/1464016046717/A2_SP_2016.pdf
[2] Read PDF online as images: (Large print) https://archive.is/n43DY
[3] Read PDF online as images: (Small print) https://archive.is/7vbNp
(Score: 0) by Anonymous Coward on Sunday May 29 2016, @06:31AM
Hard but not impossible. That's what matters and makes all the difference in the world.
ps. LibreOffice is where all the action is these days.
(Score: 2) by RamiK on Sunday May 29 2016, @10:31AM
I tend to agree with Crawford on this one. Some code can't be audited in practice due to sheer size and complexity. We saw this with OpenSSH were the first thing done when the issues surfaces was to dump huge chunks of ancient code away and do away with much of the optimizations.
compiling...