back to article Boffins design security chip to spot hidden hardware trojans in processors

Scientists at the NYU Tandon School of Engineering have designed a new form of application-specific integrated circuit (ASIC) designed to spot hidden vulnerabilities deep within a processor's design. Very few people run their own chip fabrication plants these days. Most processors are designed by one firm, which then …

  1. Sampler

    But..

    ..who watches the watchmen?

    1. Christoph

      Re: But..

      You get three of these built by different foundries and then tell them to check each other.

      1. Charles 9

        Re: But..

        "You get three of these built by different foundries and then tell them to check each other."

        But what if a state has the capacity to subvert ALL the foundries?

    2. Vinyl-Junkie
      Angel

      Re: But..

      ..who watches the watchmen?

      Sam Vimes, that's who! :)

    3. Swarthy

      Re: But..

      It's turtles, all the way down.

      1. Paul Crawford Silver badge

        Re: But..

        The fact you have to have this ASIC built by a totally trusted organisation kind of makes a flaw - why didn't you use them to build your CPU in the first place?

    4. Fungus Bob

      Re: But.. ..who watches the watchmen?

      No one. It was a shitty movie.

      1. razorfishsl

        Re: But.. ..who watches the watchmen?

        Only to our low IQ brethren.....

        Who would not want to watch a hot chick in latex?

        1. Fungus Bob

          Re: But.. ..who watches the watchmen?

          "Who would not want to watch a hot chick in latex?"

          Needed more hot chick in latex. More cowbell too.

    5. energystar
      Happy

      I did...

      Very good Series

  2. bazza Silver badge

    For the fabless chip company they always have the option of decapping a chip and comparing what they see to the mask designs they'd originally sent off to the fab.

    It's a lot of work and needs some specialised kit, but it's a certain way of being sure. Anything like this that gets you a similar result but more automatically sounds like a good thing.

    1. Steve Evans

      The slice and scan technique certainly sounds like a better way to check to me.

      If "naughty" fab were to add a delay into their "naughty" bit, so it only became operable after several gazillion operations, it wouldn't show up during electrical testing unless the implementation had been particularly bad.

      1. Anonymous Coward
        Anonymous Coward

        I think this chip is designed for in-line work, like a guard, so it's continuously checking the CPU in normal use to make sure it keeps behaving the same way every time.

    2. annodomini2

      It's an independent Lock-step micro.

  3. energystar
    Windows

    Like a lot the nascent efforts to harden CPUs from "take-over" attacks. Most dangerous among those take-overs are the ones that virtualize the former behavior, as if nothing had happened.

    1. energystar
      Headmaster

      Embedding troyans...

      Not far fetched. Precise timings on CPU whole activities could be helpful also. [But expecting it to be rare on HW]. We need to evolve Chip Design & Fab Tech as to be easily auditable.

      1. Charles 9

        Re: Embedding troyans...

        Only problem is that KISS is running smack into necessary complexity. It's hard to keep a multi-GHz CPU fed; an electron can't even travel a foot in 1 nanosecond.

        1. DropBear
          Boffin

          Re: Embedding troyans...

          Actually that electron probably can't travel a foot even in 1 hour...

  4. razorfishsl

    Yawn......

    If you go back 1984 MMI System design handbook.. they had registered PROMS

    that were used to validate mainframe systems........

    1. energystar
      Windows

      Programmable Read Only Memories? Surely remember that. But what was MMI back in 1984?

      1. razorfishsl

        Monolithic Memories... the investors of PALS.....

        one of the first programable logic chip designs, as used in the old mac for the video system.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like