zlacker

[parent] [thread] 2 comments
1. wang_l+(OP)[view] [source] 2024-10-07 23:12:26
If you have physical access to a device that you can solder an antenna you can compromise a TPM or anything else by sticking a custom DIMM in there that you can program from the “back side” so you can replace any part of memory with anything you want anytime you want. You don’t have to randomly flip a bit and hope for the best. You just inject your entire program.
replies(2): >>tucnak+lm1 >>vessen+aK8
2. tucnak+lm1[view] [source] 2024-10-08 13:47:40
>>wang_l+(OP)
Unless the hardware employs some variant of encrypted RAM, see cool paper by the NSA from a few months back that includes benchmarks in FPGA and silicon https://eprint.iacr.org/2024/1240
3. vessen+aK8[view] [source] 2024-10-11 03:28:37
>>wang_l+(OP)
A bit late in reply but dont forget that PUFs are a thing too.

Threat models vary of course. I personally believe my iPhone is safe against back side memory hardware swaps if I have turned it off. I could be wrong though!

[go to top]