Security News Supply chain compromise: Adding undetectable hardware Trojans to integrated circuits

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Feb 4, 2016
2,520
Is it possible for attackers to equip integrated circuits with hardware Trojans that will not change the area or power consumption of the IC, making them thus indiscernible through power-based post fabrication analysis?

A group of researchers from the National University of Sciences and Technology (Islamabad, Pakistan), the Vienna University of Technology and New York University have proven it is.

They have also demonstrated that hardware Trojans (HTs) can be implanted not only by adding logical gates to the original circuit, but also by identifying and safely removing expendable, redundant gates and embedding malicious circuitry at the appropriate locations.
 

oneeye

Level 4
Verified
Jul 14, 2014
174
Bloomberg News recently reported on this type of attacks, and Apple & US Homeland Security called BS on them, even after a second article.

There is a very good reason that many Western Countries are banning telecommunications equipment from the likes of Chinese Companies like Huawei and ZTE. They can't be trusted, but then again, who the hell can be trusted in ANY big tech these days, from ANY country?
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top