Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Stealthy Dopant-Level Hardware Trojans [govt funded research to defeat encryption]
Slashdot ^ | 9/13/2013

Posted on 09/13/2013 6:11:57 AM PDT by markomalley

"A team of researchers funded in part by the NSF has just published a paper in which they demonstrate a way to introduce hardware Trojans into a chip by altering only the dopant masks of a few of the chip's transistors. From the paper: 'Instead of adding additional circuitry to the target design, we insert our hardware Trojans by changing the dopant polarity of existing transistors. Since the modified circuit appears legitimate on all wiring layers (including all metal and polysilicon), our family of Trojans is resistant to most detection techniques, including fine-grain optical inspection and checking against "golden chips."' In a test of their technique against Intel's Ivy Bridge Random Number Generator (RNG) the researchers found that by setting selected flip-flop outputs to zero or one, 'Our Trojan is capable of reducing the security of the produced random number from 128 bits to n bits, where n can be chosen.' They conclude that 'Since the Trojan RNG has an entropy of n bits and [the original circuitry] uses a very good digital post-processing, namely AES, the Trojan easily passes the NIST random number test suite if n is chosen sufficiently high by the attacker. We tested the Trojan for n = 32 with the NIST random number test suite and it passed for all tests. The higher the value n that the attacker chooses, the harder it will be for an evaluator to detect that the random numbers have been compromised.'"


TOPICS: Computers/Internet
KEYWORDS: nsa; surveillance; trojan
URL for the paper.

Abstract. In recent years, hardware Trojans have drawn the attention of governments and industry as well as the scientifi c community. One of the main concerns is that integrated circuits, e.g., for military or critical infrastructure applications, could be maliciously manipulated during the manufacturing process, which often takes place abroad. However, since there have been no reported hardware Trojans in practice yet, little is known about how such a Trojan would look like, and how dicult it would be in practice to implement one.

In this paper we propose an extremely stealthy approach for implementing hardware Trojans below the gate level, and we evaluate their impact on the security of the target device. Instead of adding additional circuitry to the target design, we insert our hardware Trojans by changing the dopant polarity of existing transistors. Since the modifi ed circuit appears legitimate on all wiring layers (including all metal and polysilicon), our family of Trojans is resistant to most detection techniques, including fi ne-grain optical inspection and checking against \golden chips". We demonstrate the effectiveness of our approach by inserting Trojans into two designs | a digital post-processing derived from Intel's cryptographically secure RNG design used in the Ivy Bridge processors and a side-channel resistant SBox implementation | and by exploring their detectability and their e ffects on security.

1 posted on 09/13/2013 6:11:57 AM PDT by markomalley
[ Post Reply | Private Reply | View Replies]

To: markomalley

And I thought learning about NPN,PNP at NAS Jax in the 70’s was big time.


2 posted on 09/13/2013 6:14:48 AM PDT by CGASMIA68
[ Post Reply | Private Reply | To 1 | View Replies]

To: markomalley

They published this? In a public paper? They’d better see Vladamir about getting an apartment in Moscow.


3 posted on 09/13/2013 6:23:30 AM PDT by DManA
[ Post Reply | Private Reply | To 1 | View Replies]

To: markomalley

With all the different forms of Trojans, now they have a Hardware Trojan?
4 posted on 09/13/2013 6:23:57 AM PDT by mountn man (The Pleasure You Get From Life Is Equal To The Attitude You Put Into It)
[ Post Reply | Private Reply | To 1 | View Replies]

To: markomalley
From theregister:

This was the week when Linus Torvalds, chief Penguin of LinuxLand, unleashed not one, but two mighty rants on the interwebs. First, Torvalds said he resented recent attacks on the integrity of the kernel's security.

This is after a call was made for the use of Intel processor instruction RdRand for generating random numbers to be pulled from the kernel, purportedly by a lad from Yorkshire who reckoned it could be influenced by US spooks to produce cryptographically weak values.

He branded a petition asking for it to be pulled "ignorant". In a comparatively restrained rant, he said:

Where do I start a petition to raise the IQ and kernel knowledge of people? Guys, go read drivers/char/random.c. Then, learn about cryptography. Finally, come back here and admit to the world that you were wrong.

Short answer: we actually know what we are doing. You don't.

http://www.theregister.co.uk/2013/09/13/quotw_ending_november_13/

I don't profess to know the answer to all the questions, but there sure are a lot of questions.

5 posted on 09/13/2013 6:47:31 AM PDT by quimby
[ Post Reply | Private Reply | To 1 | View Replies]

To: mountn man

The hardware line was created at my special request.


6 posted on 09/13/2013 6:47:52 AM PDT by Rebelbase (Tagline: (optional, printed after your name on post))
[ Post Reply | Private Reply | To 4 | View Replies]

To: markomalley

I can’t understate this enough: this is bad. Manipulation of hardware at the gate level is a literal Trojan horse. There’s little anyone could do to fix the problem short of reconstructing the processor from the gate layer up (Read: Impossible).


7 posted on 09/13/2013 7:23:19 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: mountn man

They had to. Software trojans kept falling off.


8 posted on 09/13/2013 7:24:22 AM PDT by 1raider1
[ Post Reply | Private Reply | To 4 | View Replies]

To: quimby
His second rant was more important:

I still really despise the absolute incredible sh*t that is non-discoverable buses, and I hope that ARM SoC hardware designers all die in some incredibly painful accident.

The ARM hardware is part of the new problem. These chips are in everything "mobile" these days, and they're the primary carrier of new snooping problems. The "big" producers (Intel and AMD) are still holding fast, but I don't give us very long before they are integrating non-discoverable buses into their chipsets.

9 posted on 09/13/2013 7:29:14 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: rarestia
I still really despise the absolute incredible sh*t that is non-discoverable buses, and I hope that ARM SoC hardware designers all die in some incredibly painful accident.

Like having their car accelerate to 70mph at 4am on a deserted road, run itself into a tree, and explode?

10 posted on 09/13/2013 7:45:39 AM PDT by Dr.Deth
[ Post Reply | Private Reply | To 9 | View Replies]

To: Dr.Deth

Seems legit


11 posted on 09/13/2013 7:46:19 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: mountn man

Noticed the packs that say “armor.” Do they have a shaped charge at the tip? :)


12 posted on 09/13/2013 8:17:15 AM PDT by steelhead_trout (MYOB)
[ Post Reply | Private Reply | To 4 | View Replies]

To: steelhead_trout
Noticed the packs that say “armor.” Do they have a shaped charge at the tip? :)

"I don't think so Tim" (Al Borland-tool time)

Armor is for extra protection for "special" occasions.

"Special" Occasions

.

.

The "Armor" serves as protection in two ways.
First, it protects the wearer (just not enough)
Second, it protects humanity from the spawn of "Special" Ocassions.

13 posted on 09/13/2013 11:17:43 AM PDT by mountn man (The Pleasure You Get From Life Is Equal To The Attitude You Put Into It)
[ Post Reply | Private Reply | To 12 | View Replies]

To: markomalley

Isn’t it nice how the criminals that operate our government have no respect at all for us, our privacy, or our security.


14 posted on 09/13/2013 11:22:21 AM PDT by zeugma (Is it evil of me to teach my bird to say "here kitty, kitty"?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: mountn man
you are absolutely evil. That was totally unnecessary dude. I had to go to this thread for eyewash.
15 posted on 09/13/2013 11:25:47 AM PDT by zeugma (Is it evil of me to teach my bird to say "here kitty, kitty"?)
[ Post Reply | Private Reply | To 13 | View Replies]

To: mountn man

Yikes. That thing better be made of kevlar—and cover your entire body. Like a hazmat suit!


16 posted on 09/13/2013 11:32:03 AM PDT by steelhead_trout (MYOB)
[ Post Reply | Private Reply | To 13 | View Replies]

To: zeugma
Yeah, I've been over at that thread a few times.

She is one of the most stunningly beautiful women I have seen (but alas, not in real life).

Now if she would have a personality as beautiful as her looks...
Add to that her Irish brogue...

Then she might, if she was fortunate, have a chance to date me.

Aoife Walsh-youtube

17 posted on 09/13/2013 11:48:25 AM PDT by mountn man (The Pleasure You Get From Life Is Equal To The Attitude You Put Into It)
[ Post Reply | Private Reply | To 15 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson