Hacker News new | past | comments | ask | show | jobs | submit login

It’d be a pretty gargantuan task to backdoor the FPGA silicon itself. You’d have to have compromised Xilinx’s software and had some idea of what signals you want to tap. Kinda interesting to think about... I suppose that’s were open source tools for FPGAs would be nice.

The image? Sure, could easily be backdoored, but that’s what open source is for; auditability.

Edit: FPGA silicon is kinda backdoored by definition thanks to JTAG configurability/readability. (Barring cases where keys are used.) So I think the really interesting thing would be addition of nefarious logic by the design tools.




Well, yes, but in the past this type of device would be floated as an attempt to fight state-level actors. And... it can't do that. That's all I'm pointing out.

Either the silicon, the synthesis software, or both could be compromised. Per leaked documents usually what gets attacked is random number generation, but there are more avenues I am sure.

You can usually turn off JTAG, but having JTAG or other debug interface not be permanently disabled is actually an exploit class.


What’s stopping the toolchain for your micro from being backdoored as well? The chain of trust has to start somewhere.


This is the likely target for NSA. Intercepting supply chains for stock parts inside of China is not their specialty. Further, to bother with custom hardware would require substantial resources and time to develop before even getting it deployed. Nobody is going to do that. Bunnie's compiler just changed checksum...

To fight such an attack, the output of deterministic builds running on geographically dispersed systems with disparate stacks (physical, cloud, newly purchased, multiple OSs, etc.) may be compared before release.

The protected body of software should also include the firmware upload utilities.

Another attack, given the open source nature of the device, could be distributing cheap, compromised units broadly after the fact to ensure they are widely adopted.


>Intercepting supply chains for stock parts inside of China is not [the NSA's] specialty

>Another attack, given the open source nature of the device, could be distributing cheap, compromised units broadly after the fact to ensure they are widely adopted.

I like thinking about high-level threat models as much as the next guy, but these two statements seem to be at odds. Unless by "compromised units" you don't mean what I think you mean.


First was referring to supply chain interdiction for third party fabricators attempting to produce non-compromised units. Second was referring to active fabrication and distribution of compromised units to unsuspecting consumers.


Oh, ok. So its the difference between opening the box to put in a wayward chip, versus starting a factory who makes units with the wayward chip to begin with. Fair enough.


the iCE40 chip used is supported by icestorm/yosys/nextpnr stack.

But I do not know if the Xilinx reversing effort supports the Xilinx chip. That project is in a much earlier state of development.

And I do have to wonder if an ecp5 (supported by trellis project) wouldn't have been able to do the job.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: