Last week, Wired Magazine reported on the findings regarding a large number of counterfeit military IC’s purchased from the company VisionTech by the US Navy. Business Insider published a similar article with slightly more alarmist leanings. Both articles discuss the worst-case scenario: foreign installed ‘Trojan Horses’ found in counterfeit ICs that have self-destruct timers or watch for specific input triggers to stop working (‘Kill Switches’).
February 2018 M T W T F S S « Jul 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
Post TagsAcalis Acalis Sentry accreditation Anti-Tamper applications audit Black Hat Boeing Boot Code certifications configuration counterfeit credentials cyber security cyber security czar defense appropriations digital signature DoD AT drone DTAG electronic security electronic voting electron microscope encrypted boot Encryption energy Entitlement Management export control FAA Flexera Flexera Software FMS Foreign Military Sales Gallardo Green Hills Software hardware design exposure hardware security HIS IBM IEEE Infineon INTEGRITY Intel IntrinsicID ITAR malware McAfee Mocana monroe doctrine NIST PowerPC PUF root of trust RSA SDK Secure Anchor Point secure boot secure hardware Security Engineer Sentry Server Silicon Uniqueness Smart Grid speculation stuxnet Suite B supply chain supply chain security Trojan Horses Trust trusted design trusted foundry trusted supplier UAV Wall Street Journal WSJ