Huang: Evaluating Precursor’s Hardware Security
([Security] Nov 23, 2020 18:06 UTC (Mon) (corbet))
- Reference: 0000838176
- News link: https://lwn.net/Articles/838176/
- Source link:
For those who are interested in security at the hardware level, [1]this blog post from Andrew 'bunnie' Huang is well worth a read. " Despite any claims you may have heard otherwise, tamper resistance is a largely unsolved problem. Any secrets committed to a non-volatile format are vulnerable to recovery by a sufficiently advanced adversary. The availability of near-atomic level microscopy, along with sophisticated photon and phonon based probing techniques, means that a lab equipped with a few million dollars worth of top-notch gear and well-trained technicians has a good chance of recovering secret key material out of virtually any non-volatile storage media. The hard part is figuring out where the secrets are located on the chip. "
[1] https://www.bunniestudios.com/blog/?p=5979
[1] https://www.bunniestudios.com/blog/?p=5979
Huang: Evaluating Precursor’s Hardware Security
[1]Ken Shirriff's blog is probably a good example of this .
[1] https://www.righto.com/
Huang: Evaluating Precursor’s Hardware Security
[1]Ken Shirriff's blog is probably a good example of this .
[1] https://www.righto.com/