Malicious Hardware Hacking May Be the Next Frontier 146
An anonymous reader writes "It's a given that hackers will target software, and that's enough for many people to worry about. But now there's the possibility that hackers would hide malicious code in the hardware itself. A hardware hack could be an annoyance, by stopping a mobile phone from functioning. Or it could be more dangerous, if it damages the way a critical system operates. Villasenor says there are several types of attacks. Broadly they would fall into two categories: one is when a block stops a chip from functioning, while the other involves shipping data out."
lolwut? (Score:2, Insightful)
From the title of the summary:
Hardware Hackers May the Next Frontier
May what....MAY WHAT?!?!?!??!?!?!?!??!?! Seriously...what's with the editors around here?
Re:lolwut? (Score:5, Funny)
Re:lolwut? (Score:5, Funny)
Re: (Score:1)
Re: (Score:2)
Give Taco a break. After all he's been sitting at his computer since you went home from work last, night sifting through terribly written articles. He took a micro nap around 2 last night. He also sent Cowboy Neal on a Coffee run, but... well... I'm sure we all know how that story goes.
Re: (Score:2)
that's when the psycho killer attacked and accidentally the whole thing?
Re: (Score:1)
Re: (Score:2)
No verb, abuse of the term "hacker", marketroid terminology ("frontier"), and generally fails at providing any insight at all as to the article's contents.
This is one serious entry into the "worst Slashdot headline ever" competition.
Re: (Score:2)
Taco, I am disappoint.
Re: (Score:2)
Taco, I am disappoint.
I think we can cut Taco a break. If it was a kdawson article it would be titled
Malisheus Hardwear Hacking May be teh Next Fronteer
Re: (Score:1)
Re: (Score:1)
Uhm? (Score:1, Insightful)
Re:Uhm? (Score:5, Funny)
I think somebody accidentally the headline.
Re: (Score:1)
I think somebody accidentally the headline.
Damnit, I already posted so I can't mod you up!
Re:Uhm? (Score:5, Funny)
In Soviet Russia, you!
Re: (Score:2)
Clearly due to a hardware malfunction.
[Insert scary possibility] (Score:5, Insightful)
Re: (Score:2, Interesting)
Re: (Score:2)
'Hacker' carries a very negative connotation and it seems like, from this article, that some people are trying to perpetuate it.
"Some people?" More all, "almost everyone except hackers themselves." In a way, you can divide the population in four groups: hackers, non-hackers who respect hackers (a tiny minority), people who are annoyed by hackers and want to discredit them, and people who never knew what hacking was about and believed the mainstream media's attacks and propaganda about hackers. Even movies that have hackers as the protagonists seem to portray hackers as people who do nothing but break through security systems.
Re: (Score:1)
Language is multivalent, live with it (Score:1)
> the people who insist on calling themselves "hardware hackers" who are
> really "hardware tinkers" are causing a lot of confusion here
Words can have more than one meaning, different meanings in different contexts, and language constantly evolves. Live with it. It's stupid for old-timers to gripe that "hacker" has taken on a new negative meaning, but it is equally stupid to complain that the old meaning is confusing.
BTW, words also have connotations, and the connotation of "tinkerer" is very different
Re: (Score:2)
Re: (Score:1, Offtopic)
Re: (Score:1, Offtopic)
Re: (Score:2)
Don't forget.... CARS are made out of parts too!
Someone could manufacture nuts or bolts that melt in the rain!
OHMYGOD! Cars are as dangerous as electronics!
-
CPLD? (Score:2, Interesting)
Re:CPLD? (Score:5, Interesting)
Re: (Score:1)
Re: (Score:2)
TFA isn't really about hacking at least in the sense of it being remotely done or altering the device to do something different. All it is about is the danger of outsourcing to companies far and wide and the potential of not truly knowing is received and sold to the public at large (which means it was designed exactly for what it does which may or may not be in the interests of the future owner).
For some reason... (Score:3, Funny)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
The article from the Weekly World News which states "Hackers can turn your home computer into a bomb...& blow your family to smithereens!" is the desktop background on my laptop. It bothers some of my fellow engineers.
Re: (Score:2)
Article Headline Hackers May the Final Frontier (Score:3, Funny)
Ahem... (Score:4, Funny)
May. The Next Frontier. These are the failures of the Slashdot Editors. Their ongoing mission: To explore strange new URLs, to seek out new memes and new trending topics. To boldly fail where no man has failed before!
Re: (Score:2)
Back when I was a kid, Kirk was dating green women and Goatse was the frontier of strange URLs.
-
James May? (Score:1, Funny)
Re: (Score:2)
No, they're referring to Brian May [wikipedia.org], one of the best guitar hackers of all time.
Uhhh... (Score:5, Insightful)
Yeah, THAT sounds practical. The article author watches/reads too much science fiction.
Re: (Score:2)
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
Or more importantly, whoever is adding the exploit to begin with obviously knows about the redundancy in hardware, which would be bypassed, in the same hardware if you are exploiting. It would add a false sense of security. This is like having TWO latches on your screen door.
I like open source software just fine, but not preachy about it. However, when we are talking about critical infrastructure, this is a good argument for having the systems much, much more open and in plain view of many, many more eye
Re: (Score:2)
Re: (Score:3, Informative)
Re: (Score:3, Insightful)
The problem with subverting a sin
Re: (Score:3, Interesting)
Although it's not the solution mentioned in the article, one possibility is to have two competing outsourcers produce the same block, then add comparison logic that verifies that each block is doing the same thing.
Of course, this more than doubles the chip area. Also, the checking logic could be very difficult or practically impossible depending on the complexity of the block.
Re: (Score:2)
The whole "quis custodiet ipsos custodes" [wikipedia.org] thing applies to that solution big time.
Article about it (Score:3, Informative)
in the latest Scientific American, by the same guy.
Hackors (Score:4, Funny)
Looks like they already started... (Score:1)
A playground for Intelligence Services (Score:2)
I wouldn't be too surprised if various intelligence services already did this. A service that puts moles in deep cover for decades would certainly be patient enough to put code in silicon and wait years for the right moment to execute it.
Re: (Score:2)
Hardware hacking is not new, and neither is malicious hardware hacking.
Stop using "Hacker" pejoratively! (Score:1)
I really wish Slashdot headlines would stop using "Hacker" in the sense of "computer-oriented criminal." I clicked on this thinking it would be an interesting story about new hardware developments. It's just another boring story about what might be a problem for law enforcement. Who cares?
Re: (Score:2)
You know, I'm pretty sure we've lost that battle -- both within and outside of the geek community.
In my 25+ years of computers, it has primarily referred to people who muck about with systems, with a strong connotation of people who are getting into things they shouldn't just because they can (but not always).
It's only a specific generation who tried to get everybody else to use a different word after we
Re: (Score:2)
Re: (Score:1)
I just expect more from Slashdot; I expect Slashdot editors not to give in to "the public" you speak of. I'm getting pretty tired of Slashdot, so I'll just take my reading elsewhere.
Re: (Score:2)
Re: (Score:2)
Isn't it possible to be both a hacker and a "computer oriented criminal" at the same time? I know it's distasteful, but the traditional definition of "hacker" doesn't make any reference to moral values. It's about having an affinity for the technology, an inquisitive nature, a willingness to press the edges of, or even break through, perceived boundaries of what is possible. I'd posit that anybody who is capable of altering the behavior of hardware through physical means is probably a hacker, regardless of
Hackers may the next frontier... (Score:2)
... and so can you !
(Stephen Colbert's next book ?)
I can see compromised hardware being an issue (Score:2)
All it takes is the ability to do a flash of a motherboard with a ROM that does everything, except adds a keylogger, and a driver that checks for Windows, and reinstalls the botnet client.
Exact same mechanism that LoJack for Laptops uses to reinstall itself. Except done by the blackhats instead of the whitehats. With more and more machines having motherboards with independent network stacks, it would be trivial to enable two-way NAT and have botnet clients that are easily communicated with this way.
Only r
Re: (Score:2)
Re: (Score:2)
Maybe this is a job for NIST, where they either make a chip fab, or have a contractor under strict guidelines do this exact type of thing.
What I'd like to see is a chip with TPM-like functionality on it, but on a SIM card. This way, people concerned about DRM stacks don't have to worry because there is just a tray for the chip, while people who want additional assurance of their data can just buy a card, slide the card in and go from there. Perhaps stick a little bit of flash on it for encrypted storage s
Re: (Score:2)
The problem with DRM/TPM/... today is that the 'vendors' like Apple and Microsoft are taking
the control of the machine away from the owner. This means that a lot of advanced users will be on the 'must break DRM' side of the debate instead of 'DRM increases security'.
Re: (Score:2)
Actually, the big problem is that people confuse TPM with DPM. TPM lets someone control the hardware. If you have the keys, that someone is you, no hacking necessary. If you don't have the keys, then presumably you bought a console or a toaster or an iSomething, where you knew what the deal was. Vendors can only take control to the extent you buy their crap.
The big problem with TPM is that it's not an oen standard. Something very TPM-like (but an ISO standard) would allow some simple open source anti-m
policing functions are welcome (Score:2)
Most of the defenses involve adding a kind of "policing" function to the chip's architecture. For example, one could design a block that would monitor the behavior of other blocks and make sure they fit certain patterns. If another block misbehaves, it would be "quarantined" and the monitoring hardware would take over the now-missing functions.
it's about time this kind of thing makes it to peecees. mainframes have this buit-in for eons now. of course, they use this for realiability, but having mainframe class reliability on desktop machines would't be bad, for a few extra bucks
Hardware?? Firmware! (Score:2, Insightful)
Re: (Score:2)
Can you??
TFA is talking about someone embedding extra functionality at the chip-level which can later be accessed to achieve some desired result. It is not talking about injecting an update into the firmware of a running system. He's literally talking about hiding something at the circuit board level so by the time the chips are manufactured, they already have the embedded functionality.
So, before you start complaining about th
Re: (Score:2)
Re: (Score:2)
I see what you're saying, but my understanding of something at the chip-level is that while it still may be 'code', it's immutable because it's printed on/embedded in the chip (whatever the correct term is) and implements the logic, but it can't be changed.
Firmware is static, but can be modified. It's not clear to me that what is being described is firmware, but true, fixed, unchanging hardware. It just h
This story is so good... (Score:1)
...that 90% of the discussion is about the typo.
Nice QA as usual.
Again? (Score:1)
Hardware is traceable, software is not (Score:5, Interesting)
Disclaimer: I've been involved in some research in verification of ASICs to uncover trojan hardware. Frankly, I think the threat of hardware hacks tends to be overblown.
The problem with planting Trojan circuits in hardware is that they're traceable. Given a compromised chip, you can locate the manufacturer and the fab it came from, and work backwards to the people who had access to the layout. It would be a financial and P.R. disaster for any third party vendor that allowed such a thing to happen. Who would ever trust them again with a design? These companies want to make money, and allowing government or criminal organizations to compromise the manufacturing process is too big a risk.
On top of that, using a hardware hack is equivalent to firing a shotgun into a swarm of gnats. How can you know that a hacked chip is going to make it into a box that just might happen to be used by a competitor you care about? It's an insane risk with a ridiculously small hope of payoff.
The way to compromise systems is the way that has worked extremely well so far - via software. You can target the attack, you can cover your tracks, and you have plausible deniability if you're caught. If you bribe someone inside the organization, you can place the software you want right on the machines you care about. And as long as organizations keep using Windows, you'll never run out of attack vectors.
Re: (Score:3, Insightful)
A good point, except when small businesses try to extract the best value for money in an expensive IT purchase, counterfeit products can be very tempting - whether you know you're buying fake goods or not is irrelevent when the price is cheap. Cheap counterfeits are [arguabley] not traceable enough. Check out the Reg article on a recent Cisco raid [theregister.co.uk]
I remember reading another article on the Chinese fakes, where it was said that the only outward difference was the type of screw used. Scary to think that a spec
Re: (Score:2)
firing a shotgun into a swarm of gnats
Well ya gotta have something to do for entertainment after sex with the family gets boring and everyone runs out of "you might be a redneck" jokes.
-
Hardware is not all that traceable (Score:2, Insightful)
OK, so how about the recent articles about Dell servers with infected hardware (I think it was in the monitoring firmware?). Is it Dell's fault, the company that did their refurbs/repairs, or what?
How about all the times when a device with USB-storage came preloaded with malware. Or how about the Intel CPU's that were actually big chunks of useless metal.
So a third-party steals a chip/board design, makes a clone, and then sneaks it in somewhere along the line. It doesn't have to be at the manufacturer, they
Only two attacks? (Score:2)
Villasenor says there are several types of attacks. Broadly they would fall into two categories: one is when a block stops a chip from functioning, while the other involves shipping data out.
There are lots of other possibilites. Some examples:
Probably less actually (Score:2)
" * Enable unauthorized access"
And how exactly are you going to do that in microcode or even hardwired circuits? Its the same BS as when he talks about "shipping data out". Yeah , sure you could do it , if you took up half the chip die with "secret" ROM code that ran its own networking stack, hardware drivers etc etc. If you're thinking about modifying the BIOS thats not hardware hacking, thats software.
Re: (Score:2)
Maybe you lack imagination.
Let's suppose I'm Cisco making a new large enterprise switch. I outsource the design of, I don't know, let's say a large Content Addressable Memory used for IPv6 router tables, to Malco, a Chinese design firm that made a very low bid.
I plop the design in there and run the test suite -- all is perfect so I put the switch into production. Unfortunately, a Russian gang paid Malco to include a circuit that reroutes access to your IP address to their site so they can do MITM attacks
Re: (Score:2)
"Maybe you lack imagination."
I'm thinking you lack a clue.
"reroutes access to your IP address to their site so they can do MITM attacks and access all of your data"
And how does it decide when to re-route? Or does it for every single network connection you try to make? Yeah , that'll
go unnoticed for , oh , 30 seconds, when nothing works properly. And how do they decode encryption? Include another
100 gates for that? Please.
The 1990s called... (Score:1)
A hardware hack could be an annoyance, by stopping a mobile phone from functioning. Or it could be more dangerous, if it damages the way a critical system operates.
They wanted their BIOS-corrupting viruses back [wikipedia.org]
BTW, I remember an urban legend circulating that there was a virus that changed some low-level instructions in 3.5 floppy drives making them keep reading discs... which made the drives get on fire. Anyone has got more info on that?
Ubiquity is a potential factor (Score:3)
Let's get this "Microsoft is the most used and therefore the most targeted" bit out of the way. Yes, being ubiquitous is a factor, but not in the internet server arena because Microsoft Windows is not the leader in that market -- Linux is. So at least two factors make a hacking target worthwhile on a large scale:
1. Ubiquity
2. Vulnerability (ease of hacking)
One of the reasons Linux isn't an internet target is that there are so many of them and they are nearly all different. There are many distributions, many versions of many distributions, many custom applications on many versions of many distributions... all with different components installed and configured in different ways. (With Windows, things are all pretty much done the same way.)
But why am I talking about this? Seems off-topic yes? Well I wanted to establish some background before going into the hardware situation.
With regards to hardware, we have little in the way of ubiquity. Yes, an increasing number of devices are actually running Linux in the firmware. That makes Linux increasingly ubiquitous in hardware. We have seen exploits associated with HP printers in the past where SNMP was exploited even when it is "disabled." This is an issue because HP printers in the office are quite ubiquitous. We have also seen the news story about certain Dell server system boards were compromised out of the box. Dell is quite common in the office and the data center as well.
But on the whole, the hardware market is still widely varied. We should all be concerned as additional commoditization of hardware components make hardware devices less differentiated. This makes predicting the hardware targets all the more possible. (Although "guessing" the hardware is less of a concern where external exploits will still largely be a software issue and once entry is gained, listing the hardware components would be trivial... processing that list to select from a list of exploit packages would then be trivial as well.)
All of this says "yes, hardware is vulnerable, but never as vulnerable as the software running on it." Keep the software doors tight and you have less to worry about with hardware.
Re: (Score:2)
Reflections on trusting trust (Score:1)
Since nobody seems to have mentioned it yet: Reflections on trusting trust. [uwaterloo.ca]
Note that he already mentions planting exploits into microcode, which is already quite close to the hardware. Do you know for sure there's no exploit planted in the microcode of your CPU? Maybe someone manipulated the compiler for the microcode? The compiler on which the compiler for the microcode was compiled?
But even with the actual hardware, that's possible: Just as you can place an exploit in the C compiler, you can also place an
Hot Shots (Score:2)
Re: (Score:2)
Lev Andropov: It's stuck, yes?
Watts: Back off! You don't know the components!
Lev Andropov: [annoyed] Components. American components, Russian Components, ALL MADE IN TAIWAN!
Re: (Score:2)
Is it actually hacking? (Score:2)
If it's built in at the hardware level by some jerk, isn't that more of a backdoor?
Simple solution / countermeasure (Score:2)
Re: (Score:3, Funny)
Then again, July not.
Re: (Score:2)
The puns just keep marching along.
-
Re: (Score:2)
You have it all wrong. Hardware Hackers May, the Next Frontier. New trip-hop inspired gloom-core band. Don't any of you guys get the HHM street team newsletter?
Re: (Score:2)
Re: (Score:2)
Because that's the way it's used in the article? The summary is nothing but sentences yanked straight out of it.
Re: (Score:2)
You read that headline, and your biggest criticism is their use of the word 'hacker'?
Re: (Score:3, Funny)
Oh, and also -
A desktop tower is also now called the "CPU" or "hard drive"
RAM capacity and hard drive storage capacity can now be used interchangeably
Int
Re: (Score:1)
- Hardware need more cowbell.
- O'rly?
- Ya'rly.
- Chuck Norris doesn't need hardware. All he needs to do is stare at Microsoft Word and it will run by itself.
- SHOOOP DA WOOOP THE GAME WHILE SNAPE KILLS DUMBLEDORE
Old memes are old.
Re: (Score:2)
Or what Intel has been selling as a feature (Score:2)
So basically what Motorola did for the Droid X?
Or what Intel has been selling as a feature [wikipedia.org] for years.