A new chip design has been created to help detect the tampering of microprocessors during production and check that they haven’t been loaded with malicious back doors and other nasties.
The microprocessors’ on-chip engines act like a shrink wrap or tamper-evident seal on packaging, allowing the owner to know if the CPU has been opened by someone other than the end user. These engines monitor operations flowing through a CPU for signs that its microcode has been altered during the design cycle. This innovative approach ensures that any unauthorized modifications are detected early, preventing potential security breaches.

How the New Chip Design Works
The new designs are being made public at the 31st IEEE Symposium on Security & Privacy. The security design is based on two engines. The first engine, named TrustNet, sends an alert whenever a unit executes more or fewer instructions than expected. This discrepancy can indicate that the microprocessor has been tampered with, as unauthorized modifications often result in abnormal instruction execution patterns.
The second engine, named DataWatch, monitors chip data for signs that the CPU has been maliciously modified. DataWatch scrutinizes the data being processed by the CPU, looking for anomalies that could suggest the presence of malicious code. During testing, no false positives occurred, and all malicious alterations were identified, demonstrating the effectiveness of these engines in maintaining the integrity of the microprocessors.
Implications and Future Applications
The implications of this new chip design are significant for various industries, particularly those that rely heavily on secure and reliable computing systems. For example, the defense sector, financial institutions, and healthcare providers all require high levels of security to protect sensitive information. The ability to detect tampering during the production phase can prevent the deployment of compromised hardware, thereby enhancing overall system security.
Moreover, this technology could be integrated into consumer electronics, providing an additional layer of security for everyday users. As cyber threats continue to evolve, the need for robust security measures becomes increasingly critical. By incorporating tamper-evident features directly into the hardware, manufacturers can offer greater assurance to their customers that their devices are secure from the outset.
Another potential application of this technology is in the supply chain management of electronic components. With the global nature of electronics manufacturing, components often pass through multiple hands before reaching the end user. Ensuring that these components have not been tampered with at any stage of the supply chain is crucial for maintaining the integrity of the final product. The on-chip engines could serve as a valuable tool for verifying the authenticity and security of components throughout the supply chain.
Via The Register
Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, Geeky Gadgets may earn an affiliate commission. Learn about our Disclosure Policy.