"Designing and implementing malicious hardware"

Anne & Lynn Wheeler lynn at garlic.com
Sat Apr 26 11:22:06 EDT 2008

Leichter, Jerry wrote:
> While analysis of the actual silicon will clearly have to be part of
> any solution, it's going to be much harder than that:
> 	1.  Critical circuitry will likely be "tamper-resistant".
> 	    Tamper-resistance techniques make it hard to see what's
> 	    there, too.  So, paradoxically, the very mechanisms used
> 	    to protect circuitry against one attack make it more
> 	    vulnerable to another.  What this highlights, perhaps,
> 	    is the need for "transparent" tamper-resistance techniques,
> 	    which prevent tampering but don't interfere with inspec-
> 	    tion.

traditional approach is to make the compromise more expensive that any
reasonable expectation of benefit (security proportional to risk).

helping bracket expected fraud ROI is an infrastructure that can (quickly)
invalidate (identified) compromised units. there has been some issues
with these kinds of infrastructures since they have also been identified
with being able to support DRM (& other kinds of anti-piracy) efforts.

disclaimer: we actually have done some number of patents (that are 
in this area

The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com

More information about the cryptography mailing list