defending against evil in all layers of hardware and software
Stephan Neuhaus
neuhaus at st.cs.uni-sb.de
Tue Apr 29 02:16:28 EDT 2008
On Apr 28, 2008, at 23:56, Perry E. Metzger wrote:
> If you have a rotten apple engineer, he will be able to hide what he's
> trying to do and make it look completely legit. If he's really good,
> it may not be possible to catch what he's done EVEN IN PRINCIPLE.
Fred Cohen proved in 1984 in his "Computer Viruses, Theory and
Experiments"[1] that "Program P is a virus" is undecidable. I assume
that this result can be applied to hardware in the form that "Chip C
contains malicious gates" is also undecidable. (Caveat: Cohen seems to
make the fundamental assumption that there is no fundamental
distinction between code and data, something that need not necessarily
hold everywhere inside a computer chip.)
Fun,
Stephan
[1] See for example http://vx.netlux.org/lib/afc01.html
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list