Protecting the hardware supply chain

6 views
Skip to first unread message

Alan Karp

unread,
Jan 1, 2023, 8:28:44 PM1/1/23
to <friam@googlegroups.com>
How do you know that your chip was not manufactured with malicious changes?  Previously, you'd physically examine each layer of a chip, scraping off one layer to get to the next one.  Slow and destructive.

The May issue of IEEE Spectrum (Yes, I'm behind.) describes a non-destructive approach called ptychographic X-ray laminography that gives you a full picture of all layers.  It uses powerful X-rays to generate an interference pattern that can be used to construct a complete picture of a layer of the chip.  It currently takes 10s of hours to scan a part of a chip at 20 nm resolution, but stronger X-ray sources can reduce the scan time by a factor of 10,000.  That should make it practical to scan enough samples to reliably detect any deviations from what's in the design file.

--------------
Alan Karp

Mark S. Miller

unread,
Jan 1, 2023, 9:07:14 PM1/1/23
to fr...@googlegroups.com
This could be huge!

Link please?



--
You received this message because you are subscribed to the Google Groups "friam" group.
To unsubscribe from this group and stop receiving emails from it, send an email to friam+un...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/friam/CANpA1Z0NTngbBL0X9p2PHBsV8UbVQb4Ec316LD-yPk9oD3bbQg%40mail.gmail.com.


--
  Cheers,
  --MarkM

๏̯͡๏ Jasvir Nagra

unread,
Jan 1, 2023, 11:35:54 PM1/1/23
to fr...@googlegroups.com

Mark S. Miller

unread,
Jan 2, 2023, 1:09:50 AM1/2/23
to fr...@googlegroups.com
This is astonishing! 



Ben Laurie

unread,
Jan 2, 2023, 8:06:16 AM1/2/23
to fr...@googlegroups.com
Pretty cool, but ... don't forget doping attacks, which this will not show.

I suspect some combination of this kind of thing and careful design + test pads is needed to defeat that.

Tony Arcieri

unread,
Jan 2, 2023, 8:33:55 AM1/2/23
to fr...@googlegroups.com
On Mon, Jan 2, 2023 at 6:06 AM 'Ben Laurie' via friam <fr...@googlegroups.com> wrote:
Pretty cool, but ... don't forget doping attacks, which this will not show.

Where are we at on that cat-and-mouse game?

Last I saw they were detectable via scanning electron microscopy (SEM) or focused ion beam (FIB) imaging

--
Tony Arcieri

Alan Karp

unread,
Jan 2, 2023, 11:27:02 AM1/2/23
to fr...@googlegroups.com
I read the dead tree version, but https://ieeexplore.ieee.org/document/9771357.

According to the abstract of the Analog Malicious Hardware paper, the attack requires a single change to the chip.  The ptychographic mechanism was tested on such a case and detected the change.  I don't know if it would have picked up only a change in the size of a capacitor.

--------------
Alan Karp


Dale Schumacher

unread,
Jan 2, 2023, 1:08:58 PM1/2/23
to fr...@googlegroups.com
Amazing progress in terms of observability! I wonder how much such advances will complicate the storage of secrets.

Another approach is to use configurable hardware, so you can control the image you're running. For example, on the Precursor platform (https://www.crowdsupply.com/sutajio-kosagi/precursor).


Reply all
Reply to author
Forward
0 new messages