Paper demonstrating viable attack between chipsets and a device’s main processor 

Interesting paper demonstrating a threat vector from replacement parts to consumer (easily commercial / industrial) electronic devices. This paper shows, ‘attacks by malicious peripherals are feasible, scalable, and invisible to most detection techniques.’ The authors of the paper demonstrate several use cases and prove the effectiveness of the technology.

Product cybersecurity extends well beyond the development and operate life cycle of a product, and clearly requires the maintenance phase too. The greatest challenge will be the attractiveness of non-branded 3rd party parts due to their $ savings and lack of IP protection. Other ideas and thoughts?

https://iss.oy.ne.ro/Shattered.pdf

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s