[NetBehaviour] Links
Rob Myers
rob at robmyers.org
Thu Sep 19 17:52:37 CEST 2013
On 18/09/13 11:07 PM, James Morris wrote:
> On Sep 19, 2013 2:12 AM, "Rob Myers" <rob at robmyers.org
> <mailto:rob at robmyers.org>> wrote:
>>
>> "Scientists have developed a technique to sabotage the cryptographic
>> capabilities included in Intel's Ivy Bridge line of microprocessors. The
>> technique works without being detected by built-in tests or physical
>> inspection of the chip." -
>>
> http://arstechnica.com/security/2013/09/researchers-can-slip-an-undetectable-trojan-into-intels-ivy-bridge-cpus/
>>
>
> presented as scary stuff. but extremely easy top detect by software.
> prng ffs!
Just have it fail after a certain date or in response to a particular
message, then. ;-)
Also:
"In addition to the Ivy Bridge processor, the researchers applied the
dopant technique to lodge a trojan in a chip prototype that was designed
to withstand so-called side channel attacks. The result: cryptographic
keys could be correctly extracted on the tampered device with a
correlation close to 1. "
More information about the NetBehaviour
mailing list