Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 12 submissions in the queue.
posted by martyb on Saturday May 28 2016, @08:47PM   Printer-friendly
from the chipping-away-at-security dept.

https://lwn.net/Articles/688751/

"Worth a read: this paper [PDF][1][2] From Kaiyuan Yang et al. on how an analog back door can be placed into a hardware platform like a CPU. "In this paper, we show how a fabrication-time attacker can leverage analog circuits to create a hardware attack that is small (i.e., requires as little as one gate) and stealthy (i.e., requires an unlikely trigger sequence before effecting [sic] a chip's functionality). In the open spaces of an already placed and routed design, we construct a circuit that uses capacitors to siphon charge from nearby wires as they transition between digital values. When the capacitors fully charge, they deploy an attack that forces a victim flip-flop to a desired value. We weaponize this attack into a remotely-controllable privilege escalation by attaching the capacitor to a wire controllable and by selecting a victim flip-flop that holds the privilege bit for our processor.""

[1] Link to PDF in article: http://static1.1.sqspcdn.com/static/f/543048/26931843/1464016046717/A2_SP_2016.pdf
[2] Read PDF online as images: (Large print) https://archive.is/n43DY
[3] Read PDF online as images: (Small print) https://archive.is/7vbNp


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Sunday May 29 2016, @06:31AM

    by Anonymous Coward on Sunday May 29 2016, @06:31AM (#352170)

    Hard but not impossible. That's what matters and makes all the difference in the world.

    ps. LibreOffice is where all the action is these days.

  • (Score: 2) by RamiK on Sunday May 29 2016, @10:31AM

    by RamiK (1813) on Sunday May 29 2016, @10:31AM (#352214)

    I tend to agree with Crawford on this one. Some code can't be audited in practice due to sheer size and complexity. We saw this with OpenSSH were the first thing done when the issues surfaces was to dump huge chunks of ancient code away and do away with much of the optimizations.

    --
    compiling...