Oh and http://en.wikipedia.org/wiki/Cycle_detection
On 19 September 2013 17:34, James Morris <jwm.art....@gmail.com> wrote: > > > > On 19 September 2013 16:52, Rob Myers <r...@robmyers.org> wrote: > >> On 18/09/13 11:07 PM, James Morris wrote: >> > On Sep 19, 2013 2:12 AM, "Rob Myers" <r...@robmyers.org >> > <mailto:r...@robmyers.org>> wrote: >> >> >> >> "Scientists have developed a technique to sabotage the cryptographic >> >> capabilities included in Intel's Ivy Bridge line of microprocessors. >> The >> >> technique works without being detected by built-in tests or physical >> >> inspection of the chip." - >> >> >> > >> http://arstechnica.com/security/2013/09/researchers-can-slip-an-undetectable-trojan-into-intels-ivy-bridge-cpus/ >> >> >> > >> > presented as scary stuff. but extremely easy top detect by software. >> > prng ffs! >> >> Just have it fail after a certain date or in response to a particular >> message, then. ;-) >> >> Well that would be an additive modification rather than subtractive - > quite a large leap from a reduction in bits which is what this is. But what > I'm getting at is what makes it useful to a hacker also allows it to be > detected: if keys can be extracted then we detect it ;-p > > > http://en.wikipedia.org/wiki/Random_number_generation#Practical_applications_and_uses > > >> Also: >> >> "In addition to the Ivy Bridge processor, the researchers applied the >> dopant technique to lodge a trojan in a chip prototype that was designed >> to withstand so-called side channel attacks. The result: cryptographic >> keys could be correctly extracted on the tampered device with a >> correlation close to 1. " >> >> Same again, if we can extract keys we detect it. > > The article fails to acknowledge the possibility of software detection in > order fear monger. As well as simulating attacks, unit testing would be > another possibility. I just don't think this is as undetectable as the > article tries to make out. http://en.wikipedia.org/wiki/Unit_testing > > But I don't really know. > > James. > > > > >
_______________________________________________ NetBehaviour mailing list NetBehaviour@netbehaviour.org http://www.netbehaviour.org/mailman/listinfo/netbehaviour