Military chip's backdoor flaw poses national security questi

A hardware defect found in a Chinese-manufactured silicon chip used by the U.S. government could give attackers a way to tamper with sensitive applications connected to national security, experts say.

  Researchers at the University of Cambridge in the U.K. came across a secret access point in a field-programmable gate array (FPGA), a semiconductor device that can be configured by its users to add custom functionality.

  A Google search reveals that the chip in question, the Actel ProASIC3 (AP3), which is manufactured by California-based defense contractor Microsemi, are used by the military and other industries in sensitive applications, including weapons, flight controls, power distribution, and nuclear power plants, according to a study released by researchers at the university.

  “This backdoor access could be turned into an advanced Stuxnet weapon to attack potentially millions of systems,” Sergei Skorobogatov, a University of Cambridge researcher and co-author of the study, wrote in a Tuesday blog post. “The scale and range of possible attacks [have] huge implications for national security and public infrastructure.”

  According the study, while software vulnerabilities can be easily addressed by issuing a patch, hardware defects are not as easily fixable -- and are much more costly.

  “If the hardware has a vulnerability, then all the energy in defending at the software level is redundant,” he wrote. “An effort must be made to defend and detect at the hardware level for a more comprehensive strategy.”

  Although the study alludes to the backdoor being intentionally implemented, there is no evidence that points to malicious intent, Robert Graham, CEO of Errata Security, wrote in a blog post.

  While there's no negating a backdoor was found in a commonly used chip, Graham cites numerous holes in the study, including the fact that it only offers “speculation” and no actual clues that hint to cyber espionage efforts by the Chinese.

  “The Chinese might subvert FPGAs so that they could later steal intellectual property written to the chips, but the idea that they went through all of this to attack the U.S. military is pretty fanciful,” he wrote.

  A Microsemi spokesperson could not be reached for comment by SCMagazine.com.

(责任编辑:)

分享到:

更多
发表评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
  • 微笑/wx
  • 撇嘴/pz
  • 抓狂/zk
  • 流汗/lh
  • 大兵/db
  • 奋斗/fd
  • 疑问/yw
  • 晕/y
  • 偷笑/wx
  • 可爱/ka
  • 傲慢/am
  • 惊恐/jk
用户名: 验证码:点击我更换图片
资料下载专区
图文资讯

英国官员:让华为参与英国5G建设风险可控

英国官员:让华为参与英国5G建设风险可控

2月21日,英国金融时报报道称,在布鲁塞尔发表的一次演讲中,英国信号情报机构政府通...[详细]

西媒:以色列打造网络安全“硅谷”

西媒:以色列打造网络安全“硅谷”

2月13日报道 西媒称,凭借每年超过10亿美元的企业投资,以色列已经成为全球网络安全领...[详细]

俄罗斯力推脱离互联网计划 确保应急状态下

俄罗斯力推脱离互联网计划 确保应急状态下网络安全

俄罗斯新闻机构 RosBiznesKonsalting(RBK)上周报道称:作为计划实验的一部分,当局正...[详细]

GSMA呼吁欧洲守住网络安全和网络基建供应竞

GSMA呼吁欧洲守住网络安全和网络基建供应竞争力

5G将改变欧洲公民的生活和工作方式。5G作为现有4G网络的补充,与之协同工作将比以往更...[详细]

涉嫌窃取近千政界人士信息 德国20岁黑客遭

涉嫌窃取近千政界人士信息 德国20岁黑客遭逮捕

涉嫌窃取德国近千政界人士信息的黑客落网 政府拟修法加强网络安全 德国当局8日宣布,...[详细]

返回首页 返回顶部