Engineers design transistor that disguises key computer chip hardware from hackers

A hacker can reproduce a circuit on a chip by discovering what key transistors are doing in a circuit – but not if the transistor “type” is undetectable. Purdue University photo/John Underwood Purdue University engineers have demonstrated a way to disg… Continue reading Engineers design transistor that disguises key computer chip hardware from hackers

Tiny, high-capacity “atomristor” stores data in single-atom switches

Engineers at the University of Texas have created one of the smallest memory storage devices ever, made out of a two-dimensional material measuring one nanometer square. Dubbed an “atomristor,” the device works on the movements of single atoms, which c… Continue reading Tiny, high-capacity “atomristor” stores data in single-atom switches

Researchers break Intel SGX by creating $30 device to control CPU voltage

Researchers at the University of Birmingham have managed to break Intel SGX, a set of security functions used by Intel processors, by creating a $30 device to control CPU voltage. Break Intel SGX The work follows a 2019 project, in which an internation… Continue reading Researchers break Intel SGX by creating $30 device to control CPU voltage

New side-channel attacks allow access to sensitive data on Intel CPUs

An international team of security researchers is presenting new side-channel attacks (CVE-2020-8694 and CVE-2020-8695), which use fluctuations in software power consumption to access sensitive data on Intel CPUs. Intel and power side-channel attacks Po… Continue reading New side-channel attacks allow access to sensitive data on Intel CPUs

2D material helps new computer chip process and store data like a neuron

Engineers at EPFL have created a new computer chip that can both process and store data in the same circuit. It’s made using a two-dimensional material called molybdenum disulfide (MoS2), paving the way for smaller and more energy efficient electronics… Continue reading 2D material helps new computer chip process and store data like a neuron

Deep-Sleep Problems Lead to Forensic Investigation of Troublesome Chip

When you buy a chip, how can you be sure you’re getting what you paid for? After all, it’s just a black fleck of plastic with some leads sticking out of it, and a few laser-etched markings on it that attest to what lies within. All of that’s straightforward to …read more

Continue reading Deep-Sleep Problems Lead to Forensic Investigation of Troublesome Chip

Starbleed vulnerability: Attackers can gain control over FPGAs

Field Programmable Gate Arrays, FPGAs for short, are flexibly programmable computer chips that are considered very secure components in many applications. Starbleed vulnerability In a joint research project, scientists have now discovered that a critic… Continue reading Starbleed vulnerability: Attackers can gain control over FPGAs

Researchers develop self-healing and self-concealing PUF for hardware security

A team of researchers from the National University of Singapore (NUS) has developed a novel technique that allows Physically Unclonable Functions (PUFs) to produce more secure, unique ‘fingerprint’ outputs at a very low cost. This achieveme… Continue reading Researchers develop self-healing and self-concealing PUF for hardware security

Most computers easy to hack due to vulnerability in memory chips

Most computer systems are still very easy to hack, due to a vulnerability in memory chips produced by Samsung, Micron and Hynix, according to a study by researchers from VUSec of the Vrije Universiteit Amsterdam. The vulnerability in question is called… Continue reading Most computers easy to hack due to vulnerability in memory chips

Tiny cryptographic ID chip can help combat hardware counterfeiting

To combat supply chain counterfeiting, which can cost companies billions of dollars annually, MIT researchers have invented a cryptographic ID tag that’s small enough to fit on virtually any product and verify its authenticity. A 2018 report from… Continue reading Tiny cryptographic ID chip can help combat hardware counterfeiting