Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Encryption Hardware

Stealthy Dopant-Level Hardware Trojans 166

DoctorBit writes "A team of researchers funded in part by the NSF has just published a paper in which they demonstrate a way to introduce hardware Trojans into a chip by altering only the dopant masks of a few of the chip's transistors. From the paper: 'Instead of adding additional circuitry to the target design, we insert our hardware Trojans by changing the dopant polarity of existing transistors. Since the modified circuit appears legitimate on all wiring layers (including all metal and polysilicon), our family of Trojans is resistant to most detection techniques, including fine-grain optical inspection and checking against "golden chips."' In a test of their technique against Intel's Ivy Bridge Random Number Generator (RNG) the researchers found that by setting selected flip-flop outputs to zero or one, 'Our Trojan is capable of reducing the security of the produced random number from 128 bits to n bits, where n can be chosen.' They conclude that 'Since the Trojan RNG has an entropy of n bits and [the original circuitry] uses a very good digital post-processing, namely AES, the Trojan easily passes the NIST random number test suite if n is chosen sufficiently high by the attacker. We tested the Trojan for n = 32 with the NIST random number test suite and it passed for all tests. The higher the value n that the attacker chooses, the harder it will be for an evaluator to detect that the random numbers have been compromised.'"
This discussion has been archived. No new comments can be posted.

Stealthy Dopant-Level Hardware Trojans

Comments Filter:
  • Fascinating... (Score:2, Insightful)

    by CajunArson ( 465943 ) on Friday September 13, 2013 @09:00AM (#44839681) Journal

    So all the NSA needs to do is kidnap your chip, microscopically re-dope it, and shove it back in your computer without you noticing!

    Phew... I'm glad there are absolutely no other simpler ways for the NSA to spy on us other than re-doping chips! I'll just superglue mine into the socket so I know I'm safe.

  • by Overzeetop ( 214511 ) on Friday September 13, 2013 @09:01AM (#44839685) Journal

    Can an entire three-letter-agency get a corporate hard-on? 'Cause if they can, this gave our favorite one the biggest boner in the known universe.

  • by Anonymous Coward on Friday September 13, 2013 @09:24AM (#44839893)

    There are easy numeric methods for determining how random data is.

    Actually, no. Technically speaking, there is no such thing as random data, only a random process. You can certainly test how random a data stream seems, but if the data source is a black box, you never really know.

    From TFS:

    Since the Trojan RNG has an entropy of n bits and [the original circuitry] uses a very good digital post-processing, namely AES, the Trojan easily passes the NIST random number test suite if n is chosen sufficiently high by the attacker. We tested the Trojan for n = 32 with the NIST random number test suite and it passed for all tests.

    What if your black box is just feeding you encrypted bits of pi? You would never know, but the black box's maker could trivially reproduce your "random" numbers.

  • Re:Fascinating... (Score:5, Insightful)

    by Anonymous Coward on Friday September 13, 2013 @09:36AM (#44839983)

    NSA? Probably not. The Chinese chip fab that has been known to have a third shift and has full access to masks and such? Certainly.

    The NSA isn't the only agency wanting to know everything a person does.

  • by Hizonner ( 38491 ) on Friday September 13, 2013 @09:51AM (#44840129)

    Yes, yes it is.

    In security, you're trying to change the behavior of corporate drones, idiots, and people who are invested in the status quo. People use these papers as ammunition for that.

    The drones will call your attack "theoretical" and "impractical" unless you spell out exactly how to do it, step by step. If they hadn't detailed exactly how to do it, the attitude would basically have been that nobody could possibly figure out the impossible complexity of weakening a REAL RNG. I mean, look at the self tests! Nobody could get around that! In fact, even people who weren't complete idiots might have guessed, at first glance, that the self tests would be hard to defeat, or that you couldn't do this hack without screwing up the chip.

    Even with a detailed paper, they will probably be ignored until somebody actually does it in the field. If you wrote a one-pager that said "Warning! Somebody could alter the behavior of gates by tweaking the dopants", they would 1000 percent ignore it.

    As for the verbose background information, it's standard in the field (although they went a bit heavy on it). It has zero cost, and readers in the field who don't need it simply skip it. So I don't know why you're getting so upset about it.

    Please don't trash people's work in fields you don't even slightly understand.

  • by return 42 ( 459012 ) on Friday September 13, 2013 @10:29AM (#44840467)

    Sigh.

    "Hello, Intel. Under the terms of this national security letter, you must change your verification software to ignore certain errors. The engineers who carry out this order must not reveal anything about this. Anyone who does will be subject to a term of incarceration not exceeding..."

    Tell me why this would not happen.

  • Re:I wonder (Score:4, Insightful)

    by daem0n1x ( 748565 ) on Friday September 13, 2013 @11:36AM (#44841121)
    Sabotage would be to make something stop working. The mentioned chips will work just fine, but their RNGs will be predictable. Only the ones who caused it know and will take advantage of it. Looks like a trojan to me.

The key elements in human thinking are not numbers but labels of fuzzy sets. -- L. Zadeh

Working...