[121695] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: "Designing and implementing malicious hardware"

daemon@ATHENA.MIT.EDU (Adam Fields)
Sat Apr 26 12:04:43 2008

Date: Sat, 26 Apr 2008 11:49:43 -0400
From: Adam Fields <cryptography23094893@aquick.org>
To: Karsten Nohl <honk98@web.de>
Cc: Cryptography <cryptography@metzdowd.com>
In-Reply-To: <4812CCA7.9080405@web.de>

On Sat, Apr 26, 2008 at 02:33:11AM -0400, Karsten Nohl wrote:
[...]
> Assuming that hardware backdoors can be build, the interesting question 
> becomes how to defeat against them. Even after a particular triggering 
> string is identified, it is not clear whether software can be used to 
> detect malicious programs. It almost appears as if the processor would 
> need a hardware-based virus-scanner or sorts. This scanner could be 
> simple as it only has to match known signatures, but would need have 
> access to a large number of internal data structures while being 
> developed by a completely separate team of designers.

Wouldn't it be fun to assume that these are already present in all
sorts of devices?

-- 
				- Adam

** Expert Technical Project and Business Management
**** System Performance Analysis and Architecture
****** [ http://www.adamfields.com ]

[ http://www.morningside-analytics.com ] .. Latest Venture
[ http://www.confabb.com ] ................ Founder
[ http://www.aquick.org/blog ] ............ Blog
[ http://www.adamfields.com/resume.html ].. Experience
[ http://www.flickr.com/photos/fields ] ... Photos
[ http://www.aquicki.com/wiki ].............Wiki

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post