On 18/09/13 11:07 PM, James Morris wrote: > On Sep 19, 2013 2:12 AM, "Rob Myers" <[email protected] > <mailto:[email protected]>> wrote: >> >> "Scientists have developed a technique to sabotage the cryptographic >> capabilities included in Intel's Ivy Bridge line of microprocessors. The >> technique works without being detected by built-in tests or physical >> inspection of the chip." - >> > http://arstechnica.com/security/2013/09/researchers-can-slip-an-undetectable-trojan-into-intels-ivy-bridge-cpus/ >> > > presented as scary stuff. but extremely easy top detect by software. > prng ffs!
Just have it fail after a certain date or in response to a particular message, then. ;-) Also: "In addition to the Ivy Bridge processor, the researchers applied the dopant technique to lodge a trojan in a chip prototype that was designed to withstand so-called side channel attacks. The result: cryptographic keys could be correctly extracted on the tampered device with a correlation close to 1. " _______________________________________________ NetBehaviour mailing list [email protected] http://www.netbehaviour.org/mailman/listinfo/netbehaviour
