Hardware backdoor

Hardware backdoors are backdoors in hardware.

In most cases hardware backdoors involve code inside hardware − such may reside in the firmware of computer chips.[1]

Hardware backdoors can undermine security in smartcards and other cryptoprocessors unless investment is made in anti-backdoor design methods.[2] They have also been considered for car hacking.[3]

Severity

Hardware backdoors are considered highly problematic because:[1]

  1. They can’t be removed by conventional means such as antivirus software
  2. They can circumvent other types of security such as disk encryption
  3. They can be injected at manufacturing time where the user has no degree of control

Examples

Countermeasures

Dr Skorobogatov has developed a technique capable of detecting malicious insertions into chips.[9]

New York University Tandon School of Engineering researchers have developed a way to corroborate a chip's operation using verifiable computing whereby "manufactured for sale" chips contain an embedded verification module that proves the chip's calculations are correct and an associated external module validates the embedded verification module.[8]

China

The world's largest manufacturer of hardware is China which gives it unequaled capabilities for hardware backdoors.[1] Michael Maloof, a former senior security policy analyst in the Office of the Secretary of Defense, states the Chinese government ordered backdoors to be installed in devices made by Huawei and ZTE Corporation and also sources this with a recent passage of China's new anti-terrorism law that requires telecommunications operators and Internet service providers to provide the Chinese government with "backdoor" access to their products.[8][18]

See also

References

  1. 1 2 3 4 "Rakshasa: The hardware backdoor that China could embed in every computer - ExtremeTech". ExtremeTech. 1 August 2012. Retrieved 22 January 2017.
  2. Waksman, Adam (2010), "Tamper Evident Microprocessors" (PDF), Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California
  3. Smith, Craig. The Car Hacker's Handbook: A Guide for the Penetration Tester. No Starch Press. ISBN 9781593277031. Retrieved 22 January 2017.
  4. Wagner, David. Advances in Cryptology - CRYPTO 2008: 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008, Proceedings. Springer Science & Business Media. ISBN 9783540851738. Retrieved 22 January 2017.
  5. Mishra, Prabhat; Bhunia, Swarup; Tehranipoor, Mark. Hardware IP Security and Trust. Springer. ISBN 9783319490250. Retrieved 22 January 2017.
  6. "Hardware-Hack: Backdoor in China-Chips entdeckt?" (in German). CHIP Online. Retrieved 22 January 2017.
  7. "Hackers Could Access US Weapons Systems Through Chip". CNBC. 8 June 2012. Retrieved 22 January 2017.
  8. 1 2 3 "Self-checking chips could eliminate hardware security issues - TechRepublic". Tech Republic. Retrieved 22 January 2017.
  9. 1 2 "Cambridge Scientist Defends Claim That US Military Chips Made In China Have 'Backdoors'". Business Insider. Retrieved 22 January 2017.
  10. Lee, Michael. "Researchers find backdoor on ZTE Android phones | ZDNet". ZDNet. Retrieved 22 January 2017.
  11. "Researchers find new, ultra-low-level method of hacking CPUs - and there's no way to detect it - ExtremeTech". ExtremeTech. 16 September 2013. Retrieved 22 January 2017.
  12. "Photos of an NSA "upgrade" factory show Cisco router getting implant". Ars Technica. Retrieved 22 January 2017.
  13. "NSA's Secret Toolbox: Unit Offers Spy Gadgets for Every Need". SPIEGEL ONLINE. Retrieved 22 January 2017.
  14. "Your USB cable, the spy: Inside the NSA’s catalog of surveillance magic". Ars Technica. Retrieved 22 January 2017.
  15. Greenberg, Andy. "This ‘Demonically Clever’ Backdoor Hides In a Tiny Slice of a Computer Chip". WIRED. Retrieved 22 January 2017.
  16. Storm, Darlene. "Researchers built devious, undetectable hardware-level backdoor in computer chips". Computerworld. Retrieved 22 January 2017.
  17. "Hardware hack defeats iPhone passcode security". BBC News. 19 September 2016. Retrieved 22 January 2017.
  18. "China: ‘Pervasive access’ to 80% of telecoms". WND. Retrieved 22 January 2017.

Further reading

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.