With open source software, we’ve grown accustomed to a certain level of trust that whatever we are running on our computers is what we expect it to actually be. Thanks to hashing and public key signatures in various parts in the development and deployment cycle, it’s hard for a third party to modify source code or executables without us being easily able to spot it, even if it travels through untrustworthy channels.
On his talk this year at the 36C3, [bunnie] showed a detailed insight of several attack vectors we could face during manufacturing. Skipping the obvious ones like adding or substituting components, he’s focusing on highly ambitious and hard to detect modifications inside an IC’s package with wirebonded or through-silicon via (TSV) implants, down to modifying the netlist or mask of the integrated circuit itself.
[Source: Hackaday]
The post 36C3: Open Source Is Insufficient To Solve Trust Problems In Hardware appeared first on Linux.com.
source https://www.linux.com/news/36c3-open-source-is-insufficient-to-solve-trust-problems-in-hardware/
0 Comments