Continue to Site

Welcome to our site!

Electro Tech is an online community (with over 170,000 members) who enjoy talking about and building electronic circuits, projects and gadgets. To participate you need to register. Registration is free. Click here to register now.

  • Welcome to our site! Electro Tech is an online community (with over 170,000 members) who enjoy talking about and building electronic circuits, projects and gadgets. To participate you need to register. Registration is free. Click here to register now.

Are chip makers building electronic trapdoors in key military hardware?

Status
Not open for further replies.

Analog

New Member
**broken link removed**

Are chip makers building electronic trapdoors in key military hardware? The Pentagon is making its biggest effort yet to find out


Last September, Israeli jets bombed a suspected nuclear installation in northeastern Syria. Among the many mysteries still surrounding that strike was the failure of a Syrian radar—supposedly state-of-the-art—to warn the Syrian military of the incoming assault. It wasn't long before military and technology bloggers concluded that this was an incident of electronic warfare—and not just any kind.

Post after post speculated that the commercial off-the-shelf microprocessors in the Syrian radar might have been purposely fabricated with a hidden “backdoor” inside. By sending a preprogrammed code to those chips, an unknown antagonist had disrupted the chips' function and temporarily blocked the radar.

That same basic scenario is cropping up more frequently lately, and not just in the Middle East, where conspiracy theories abound. According to a U.S. defense contractor who spoke on condition of anonymity, a “European chip maker” recently built into its microprocessors a kill switch that could be accessed remotely. French defense contractors have used the chips in military equipment, the contractor told IEEE Spectrum. If in the future the equipment fell into hostile hands, “the French wanted a way to disable that circuit,” he said. Spectrum could not confirm this account independently, but spirited discussion about it among researchers and another defense contractor last summer at a military research conference reveals a lot about the fever dreams plaguing the U.S. Department of Defense (DOD).

Feeding those dreams is the Pentagon's realization that it no longer controls who manufactures the components that go into its increasingly complex systems. A single plane like the DOD's next generation F-35 Joint Strike Fighter, can contain an “insane number” of chips, says one semiconductor expert familiar with that aircraft's design. Estimates from other sources put the total at several hundred to more than a thousand. And tracing a part back to its source is not always straightforward. The dwindling of domestic chip and electronics manufacturing in the United States, combined with the phenomenal growth of suppliers in countries like China, has only deepened the U.S. military's concern.

Recognizing this enormous vulnerability, the DOD recently launched its most ambitious program yet to verify the integrity of the electronics that will underpin future additions to its arsenal. In December, the Defense Advanced Research Projects Agency (DARPA), the Pentagon's R&D wing, released details about a three-year initiative it calls the Trust in Integrated Circuits program. The findings from the program could give the military—and defense contractors who make sensitive microelectronics like the weapons systems for the F‑35—a guaranteed method of determining whether their chips have been compromised. In January, the Trust program started its prequalifying rounds by sending to three contractors four identical versions of a chip that contained unspecified malicious circuitry. The teams have until the end of this month to ferret out as many of the devious insertions as they can.

Vetting a chip with a hidden agenda can't be all that tough, right? Wrong. Although commercial chip makers routinely and exhaustively test chips with hundreds of millions of logic gates, they can't afford to inspect everything. So instead they focus on how well the chip performs specific functions. For a microprocessor destined for use in a cellphone, for instance, the chip maker will check to see whether all the phone's various functions work. Any extraneous circuitry that doesn't interfere with the chip's normal functions won't show up in these tests.

“You don't check for the infinite possible things that are not specified,” says electrical engineering professor Ruby Lee, a cryptography expert at Princeton. “You could check the obvious possibilities, but can you test for every unspecified function?”

Nor can chip makers afford to test every chip. From a batch of thousands, technicians select a single chip for physical inspection, assuming that the manufacturing process has yielded essentially identical devices. They then laboriously grind away a thin layer of the chip, put the chip into a scanning electron microscope, and then take a picture of it, repeating the process until every layer of the chip has been imaged. Even here, spotting a tiny discrepancy amid a chip's many layers and millions or billions of transistors is a fantastically difficult task, and the chip is destroyed in the process.

But the military can't really work that way. For ICs destined for mission-critical systems, you'd ideally want to test every chip without destroying it.
 
Analog said:
Vetting a chip with a hidden agenda can't be all that tough, right? Wrong.

Hm. THis is an IEEE article presumably written by an engineer. I would think that every engineer realizes how difficult it is. Sounds more like something a reporter would say.
 
Very interesting article, thanks for posting it.

Personally i think its an unlikely scenario but when you're in the bussiness of defending your country there is no such thing as being "too paranoid."

I do hope they successfully achieve the high level security they're after.
 
For the most part people in hi-tech new this was comming long ago.

To make anything bad happen the chips/systems have to have some sort of timer function that will trigger a behavior. Or they need built in functionality to accept a signal that will trigger the behavior. Is there another way?

Although the chips are made in various locations I THINK everything else is still done within the country or consortium making the weapon.
 
From what i know all R&D and fabrication that can be done in the country of origin is done in the country of origin.

Ofcourse i'm just a civilian and i don't think they would tell us how their procedures worked.

Maybe engineers now will have to move toward "sabotage tolerant" designs where they assume some of the chips might be "evil" or be compromised somehow. So instead of having one chip built by one company, they have multiple chips built by multiple companies and assuming that most of the chips are "friendly" they work together and can compensate for the behaviour of an "enemy" chip.

The 'fault tolerant' designs of critical systems like nuclear reactor computers or space craft computers already work this way to some extent. But they use multiple units of the same circuits with the same chip in a "majority rules" fashion. I guess the hard part will be to go from identically built units to identical-functioning but different component units.

Probably too expensive to implement but then again i'm not (mis)managing military budgets.
 
Interesting story and reminds me of some security discussions I had with a friend at IBM.

For a simple scenario, assume there is a malicious chip. Now, an aggressor sets off the backdoor, and the device stops working. In so doing, the aggressor has also announced he is coming. It seems like a one-time trick.

So, you have spook, anti-spook, anti-anti-spook, etc. devices developed. As Glyph says, it's only money in the military budget, and who's really worried about that? ;)

John
 
Status
Not open for further replies.

New Articles From Microcontroller Tips

Back
Top