CAPEC-672: Malicious Code Implanted During Chip Programming

Detailed Draft 严重程度: High 攻击可能性: Low

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

前提条件

  • An adversary would need to have access to a foundry’s or chip maker’s development/production environment where programs for specific chips are developed, managed and uploaded into targeted chips prior to distribution or sale.

所需技能

Medium An adversary needs to be skilled in microprogramming, manipulation of configuration management systems, and in the operation of tools used for the uploading of programs into chips during manufacture. Uploading can be for individual chips or performed on a large scale basis.

后果影响

影响范围: Integrity

技术影响: Alter Execution Logic

缓解措施

Utilize DMEA’s (Defense Microelectronics Activity) Trusted Foundry Program members for acquisition of microelectronic components.

Ensure that each supplier performing hardware development implements comprehensive, security-focused configuration management of microcode and microcode generating tools and software.

Require that provenance of COTS microelectronic components be known whenever procured.

Conduct detailed vendor assessment before acquiring COTS hardware.

分类映射

分类名称 条目ID 条目名称
ATTACK 1195.003 Supply Chain Compromise: Compromise Hardware Supply Chain
关键信息

CAPEC ID: CAPEC-672

抽象级别: Detailed

状态: Draft

典型严重程度: High

攻击可能性: Low

相关攻击模式