this post was submitted on 04 Aug 2024
160 points (99.4% liked)

Technology

59769 readers
3022 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS
 

… "The first of two versions of the RayV Lite will focus on laser fault injection (LFI). This technique uses a brief blast of light to interfere with the charges of a processor’s transistors, which could flip them from a 0 value to a 1 value or vice versa. Using LFI, Beaumont and Trowell have been able to pull off things like bypassing the security check in an automotive chip’s firmware or bypassing the PIN verification for a cryptocurrency hardware wallet.

The second version of the tool will be able to perform laser logic state imaging. This allows snooping on what’s happening inside a chip as it operates, potentially pulling out hints about the data and code it’s handling. Since this data could include sensitive secrets, LSI is another dangerous form of hacking that Beaumont and Trowell hope to raise awareness of." …

you are viewing a single comment's thread
view the rest of the comments
[–] A_A 5 points 4 months ago (2 children)

Safeguards against LSi may include :
Sensor-based detection ?
Error detection and correction ?
Redundancy and duplication ?
Shielding // physical + chemical protection ?
Anti-tamper mechanisms ?
Randomization and noise injection ?

[–] solrize 11 points 4 months ago

Chapter from "Security Engineering" (2nd ed) about physical tamper resistance:

https://www.cl.cam.ac.uk/~rja14/Papers/SEv2-c16.pdf

It's been ages since I read it so idr how much of it was at chip level. Really high end stuff have the secure chips in a tamper reactive enclosure so it's difficult to get to them without first erasing the contents. The chapter discusses that ;).

[–] [email protected] -3 points 4 months ago (1 children)

Why the question marks, the answer is always yes.

[–] A_A 5 points 4 months ago

Because this is not my domain of expertise and I seek comments from other people.