A team of researchers from the US and Europe has demonstrated a "hardware trojan" attack on Intel's Ivy Bridge processor. This paper (PDF) describes the exploit, which changes the dopant polarity of individual transistors to weaken the chip's random number generator. The researchers were able to reduce the random number generator's entropy from 128 to 32 bits, making cryptographic keys much more predictable. They claim the exploit is stealthy enough to pass not only the CPU's built-in self-test, but also the National Institute of Standards and Technology's tests for random number generators.
Inserting the trojan involved altering the dopant masks of "only a few" transistors. Ivy Bridge has about 1.4 billion transistors, making the small change difficult to detect. According to the researchers, the "sub-transistor" trojan can't be exposed by optical reverse engineering because the chip's circuitry remains the same.
Ars Technica has a good summary of the paper, including some commentary from one of its authors. That researcher points out that hardware trojans haven't been found in the wild. However, the proof-of-concept attack illustrates that existing chips are vulnerable to hardware exploits that may be impossible to detect.
|1. Ryszard - $603||2. Hdfisise - $600||3. Andrew Lauritzen - $502|
|4. Redocbew - $350||5. the - $306||6. SomeOtherGeek - $300|
|7. chasp_0 - $251||8. Ryu Connor - $250||9. mbutrovich - $250|
|10. aeassa - $175|
|Apple's A9 impresses and the Nexus strikes back: The TR Podcast 188||2|
|Color is key with Dell's latest trio of Ultrasharp displays||32|
|Android 6.0 Marshmallow rolls out to Nexus devices starting today||18|
|Google Fiber has arrived in Damage Labs||108|
|Silverstone's PT18 chassis lets NUCs run fan-free||8|
|Intel to begin shipping Skylake CPUs with SGX enabled||28|
|Premium HDMI cables will be ready for next-generation media||52|
|Microsoft acquires Havok physics engine from Intel||84|
|AMD unleashes mobile Tonga with the FirePro W7170M||14|