Researchers at Ruhr University Bochum and the Max Planck Institute for Security and Privacy have developed an approach to analysing die photos of real-world microchips to reveal hardware Trojan attacks, and are releasing their imagery and algorithm for all to try. Hardware Trojans could allow attackers to paralyse parts of the telecommunications infrastructure, warn the team. The researchers used designs created by Thorben Moos to automate the process of inspecting finished silicon chips for tampering, using chips built on 28nm, 40nm, 65nm and 90nm process nodes. Despite challenges associated with the analysis, the algorithm detected 37 of the 40 modifications, including all the modifications made to the chips built on process nodes between 40nm and 90nm. The algorithm did, however, throw up 500 false positives. The team’s paper is available on the IACR Cryptology ePrint Archive, while the full imagery and source code has been published to GitHub under the permissive MIT licence.
Source: Hackster.io
To mitigate potential threats, it is important to implement additional cybersecurity measures with the help of a trusted partner like INFRA www.infrascan.net or you can try your self using check.website.