<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>GL.IB.LY &#187; intel</title>
	<atom:link href="http://gl.ib.ly/tag/intel/feed/" rel="self" type="application/rss+xml" />
	<link>http://gl.ib.ly</link>
	<description>Thoughts on security, computing, business and stuff!</description>
	<lastBuildDate>Sun, 18 May 2014 11:51:56 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.1</generator>
	<item>
		<title>Paranoia deepens for security people as hardware trojans cloak</title>
		<link>http://gl.ib.ly/security/2013/09/18/parania-deepens-security-hardware-trojans-cloak/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=parania-deepens-security-hardware-trojans-cloak</link>
		<comments>http://gl.ib.ly/security/2013/09/18/parania-deepens-security-hardware-trojans-cloak/#comments</comments>
		<pubDate>Wed, 18 Sep 2013 08:47:28 +0000</pubDate>
		<dc:creator><![CDATA[tariq]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[amd]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[doping]]></category>
		<category><![CDATA[hardware trojan]]></category>
		<category><![CDATA[intel]]></category>
		<category><![CDATA[logic gate]]></category>
		<category><![CDATA[microcode]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[processor]]></category>
		<category><![CDATA[rng]]></category>
		<category><![CDATA[transistor]]></category>
		<category><![CDATA[trojan]]></category>

		<guid isPermaLink="false">http://gl.ib.ly/?p=22</guid>
		<description><![CDATA[<p>I remember being back in college writing little trojans for windows and linux. Hardware trojans troubled one of my lecturers. He had been paranoid, for a great number of years, about the complexity of computer chips and during one such<span class="ellipsis">&#8230;</span><div class="read-more"><a href="http://gl.ib.ly/security/2013/09/18/parania-deepens-security-hardware-trojans-cloak/">Read more &#8250;</a></div><!-- end of .read-more --></p><p>The post <a href="http://gl.ib.ly/security/2013/09/18/parania-deepens-security-hardware-trojans-cloak/">Paranoia deepens for security people as hardware trojans cloak</a> appeared first on <a href="http://gl.ib.ly">GL.IB.LY</a>.</p>]]></description>
				<content:encoded><![CDATA[<p>I remember being back in college writing little trojans for windows and linux. Hardware trojans troubled one of my lecturers. He had been paranoid, for a great number of years, about the complexity of computer chips and during one such comversation about microcode &#8212; one of the biggest evils he could imagine &#8212; he asked his colleague &#8220;the number of years that have passed since a single person understood the complexity of a microchip&#8221;. The non-challant reply was &#8220;plenty&#8221;.</p>
<p>Well I wonder how he would feel after <a href="http://people.umass.edu/gbecker/BeckerChes13.pdf">a paper</a> <a href="http://www.infoworld.com/d/security/security-researchers-create-undetectable-hardware-trojans-227062?page=0,1&amp;source=rss_security&amp;utm_source=feedburner&amp;utm_medium=twitter&amp;utm_campaign=Feed%3A%20Secureslinger%20%28SecureSlinger%29">was released</a> this month showing that you can change the logic gates of a microprocessor by changing the doping of transistors. Such changes, the trojan, would not be visible (functionaly or optically) and the underlying circuitry would be unaffected. As <a href="https://www.schneier.com/blog/archives/2013/09/surreptitiously.html">Brucie suggests</a> one of the best things to do with this is attack the random number generator (RNG) by lowering the entropy of random numbers. Random numbers underpin modern cryptography and should they become predictable then all security is lost.</p>
<p><em>Oh so what about that stuff with micro-code? </em>Tbh I don&#8217;t know, the more I learned the more dangerous it seemed. Here is an excerpt from <a href="http://cryptome.org/jya/intel-bug.htm">another article:</a></p>
<blockquote><p>But Intel&#8217;s biggest security feature may lie in keeping the technical<br />
details behind its BIOS Update technology a closely guarded secret. &#8220;There is<br />
no documentation,&#8221; said Frank Binns, an architect in Intel&#8217;s<br />
microprocessor group. &#8220;It&#8217;s not as if you can get an Intel &#8216;Red Book&#8217;<br />
with this stuff written down. It&#8217;s actually in the heads of less than 10<br />
people in the whole of Intel.</p></blockquote>
<p>Interesting,  this thing [levels of encryption within the processor that prevents malicious encrypted microcode updates] is known by a few people at Intel and bunch of people over at the NSA, a fair assumption given current revelations &#8212; I wish they&#8217;d tell me where I left my coke!</p>
<p>The post <a href="http://gl.ib.ly/security/2013/09/18/parania-deepens-security-hardware-trojans-cloak/">Paranoia deepens for security people as hardware trojans cloak</a> appeared first on <a href="http://gl.ib.ly">GL.IB.LY</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://gl.ib.ly/security/2013/09/18/parania-deepens-security-hardware-trojans-cloak/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
