Fishy Chips: Spies Want to Hack-Proof Circuits
In 2010, the U.S. military had a problem. It had bought over 59,000 microchips destined for installation in everything from missile defense systems to gadgets that tell friend from foe. The chips turned out to be counterfeits from China, but it could have been even worse. Instead of crappy Chinese fakes being put into Navy weapons systems, the chips could have been hacked, able to shut off a missile in the event of war or lie around just waiting to malfunction.
The Intelligence Advanced Research Projects Agency, the spy community’s way-out research arm, is looking to avoid a repeat. The Trusted Integrated Circuit program is Iarpa’s attempt to keep foreign adversaries from messing with our chips — and check the circuits for backdoors once they’ve been made.
The U.S. has been worried about its foreign-sourced chips in its supply chain for a while now. In a 2005 report, the Defense Science Board warned that the shift towards greater foreign circuit production posed the risk that “trojan horse” circuits could be unknowingly installed in critical military systems. Foreign adversaries could modify chips to fizzle out early, the report said, or add secret back doors that would place a kill switch in military systems.
...
The Defense Science Board warned in its report that “trust cannot be added to integrated circuits after fabrication.” Iarpa disagrees. The agency is looking for ways to check out chips once they’ve been made, asking for ideas on how the U.S. can verify that its foreign chips haven’t been hacked in the production process.
Keep your suggestions original, though. Iarpa’s sister-shop, Darpa, has already done some work on chip verification. Darpa’s TRUST program uses advanced imaging and X-rays to search for deviations from chips’ designs. Its IRIS program aims to check out chips when the U.S. doesn’t have the full designs to compare them to.
…
Iarpa’s also interested in hearing ideas on chip obfuscation. The idea is to hide the “intent of digital and analog functions and their associated building blocks” of an integrated circuit in the FEOL manufacturing stage. If potential adversaries can’t reverse-engineer or understand how a circuit works, it’ll be harder for them to modify it for malicious purposes.
…
September 2004 October 2004 November 2004 December 2004 February 2005 April 2005 July 2005 August 2005 September 2005 October 2005 November 2005 December 2005 January 2006 February 2006 March 2011 June 2011 August 2011 September 2011 May 2012 February 2017 June 2019 August 2020