CAPEC-672: Malicious Code Implanted During Chip Programming
CAPEC版本: 3.9
更新日期: 2023-01-24
攻击模式描述
前提条件
- An adversary would need to have access to a foundry’s or chip maker’s development/production environment where programs for specific chips are developed, managed and uploaded into targeted chips prior to distribution or sale.
所需技能
后果影响
影响范围: Integrity
技术影响: Alter Execution Logic
缓解措施
Utilize DMEA’s (Defense Microelectronics Activity) Trusted Foundry Program members for acquisition of microelectronic components.
Ensure that each supplier performing hardware development implements comprehensive, security-focused configuration management of microcode and microcode generating tools and software.
Require that provenance of COTS microelectronic components be known whenever procured.
Conduct detailed vendor assessment before acquiring COTS hardware.
分类映射
| 分类名称 | 条目ID | 条目名称 |
|---|---|---|
| ATTACK | 1195.003 | Supply Chain Compromise: Compromise Hardware Supply Chain |