A software development company since 1986
Phone: (713) 682-1556
Stopping Hardware Chip Viruses
Supply Line chain disruption, manufacturing invasion, any number of 1st, 2nd and 3rd party alterations to hardware makes the machines dangerous to use. Every electronic device is at risk. The latest hardware attacks have been both deliberate and negligence (flaws in the hardware design).
To address the negligence of bad hardware design is a flaw in the hardware / software non-corporation. The most common failure is the contamination of logic across processes, which is the inability of hardware to isolate process memory.
To address the deliberate modification of hardware the few cases that have been found, is because they announced themselves. That is a chip pinged a remote site, and this took a team three years to track down. It would be far more dangerous for a time-bomb to be planted that would permanently kill hardware with a break in a single wire. Bomb the ball bearing plants, "all for the want of a horseshoe nail..."
Single software environment:
Multiple number of entry points: Today's hardware has many points of access to many of the critical parts of the system. Security means building a system that is trustworthy. Restrict physical access, this can be accomplished by limiting access to as many devices as possible from each other. For example internal data communication limited to a single entry point optical device. Isolation of memory, clock, cpu, registers, ..., et cetera, ...