Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Пишет LWN.net ([info]syn_lwnheadline)
@ 2016-05-26 20:54:00


Previous Entry  Add to memories!  Tell a Friend!  Next Entry
Analog malicious hardware
Worth a read: this
paper [PDF]
From Kaiyuan Yang et al. on how an analog back door can be
placed into a hardware platform like a CPU. "In this paper, we show
how a fabrication-time attacker can leverage analog circuits to create a
hardware attack that is small (i.e., requires as little as one gate) and
stealthy (i.e., requires an unlikely trigger sequence before effecting
[sic] a
chip’s functionality). In the open spaces of an already placed and routed
design, we construct a circuit that uses capacitors to siphon charge from
nearby wires as they transition between digital values. When the capacitors
fully charge, they deploy an attack that forces a victim flip-flop to a
desired value. We weaponize this attack into a remotely-controllable
privilege escalation by attaching the capacitor to a wire controllable and
by selecting a victim flip-flop that holds the privilege bit for our
processor.
"


(Читать комментарии) (Добавить комментарий)