Researchers are designing a chip that checks for sabotage

Intelligent Chip Reports: With the reports of bulk design and chip construction that deliberately (or undiscovered) backdoors for information services, large businesses and important individuals could be at risk of using a chip that while showing harmless, can allow hackers to sabotage appliances used in health care, public and financial infrastructure, military or government electronics.

Mr. Siddharth Garg, assistant professor of electrical and computer engineering (Tandon School of Engineering) at New York University, and colleagues of researchers develop a unique solution: a chip that contains a built-in module that will prove that its calculations are correct and another external module that will validate the proofs of the first module.chip

So software viruses are easy to detect and fix with downloadable patches, if they are intentionally placed, they are invisible and act covertly. For example, a hidden backdoor function could allow hackers to modify or take over a device or system at a specific time. The Garg system has a new approach called "verifiable computing" or "verifiable computing" (VC). The new feature keeps tabs on the performance of a chip and can detect signs of a possible Trojan.

The ability to control the components we put on our computers has become vital at a time when there is no confidence. Nowadays when a company designs and wants to build new hardware, production costs are now so large that projects are sent to offshore construction companies, and security can not always be guaranteed.

The system proposed by Garg and his colleagues has a verification processor that can be built separately from the chip. "It uses an external control unit from a trusted manufacturer, which means that even if the rest of the chip is manufactured by an unreliable manufacturer, there will be a module that can show proof of correctness," Garg said.

So the chir design company can turn to a reputable manufacturer to build a separate, less sophisticated unit: an ASIC (an application-specific integrated circuit), whose only job is to validate proofs of correctness created by the internal module of an unreliable chi.

Garg said that this setting provides a safety net to the end user's chip.

"According to the current system, I can get a chir that has a built-in Trojan. "He may not show up during the first test," Garg said. "But later he could start misbehaving." The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.098 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).