American technologists have warned that hackers may soon start using malicious hardware in place of computer viruses to steal important records like credit card details and passwords from their victim’s PCs.
Samuel King, an expert from the University of Illinois at Urbana-Champaign, says that such malicious hardware will be much more difficult to detect as compared to computer worms. He and his colleagues have shown that they could gain control of a computer by adding malicious circuits to its processor.
Since such circuits interfere with the computer at a deeper level than a virus, they effectively operate ’below the radar’ of anti-virus software. For determining the risk from malicious hardware, the researchers designed their own malicious circuits.
The research team used a processor called a field programmable gate array (FPGA), whose logic circuits can be rearranged, to create a replica of an existing open source processor called Leon3, which contains around 1.7 million circuits.
About 1000 malicious circuits, not present in Leon3, were then added. The researchers observed that the circuits allowed them to bypass security controls on Leon3 in a similar way to how a virus hands control of a computer to a hacker, but without requiring a flaw in a software application.
Samuel King, an expert from the University of Illinois at Urbana-Champaign, says that such malicious hardware will be much more difficult to detect as compared to computer worms. He and his colleagues have shown that they could gain control of a computer by adding malicious circuits to its processor.
Since such circuits interfere with the computer at a deeper level than a virus, they effectively operate ’below the radar’ of anti-virus software. For determining the risk from malicious hardware, the researchers designed their own malicious circuits.
The research team used a processor called a field programmable gate array (FPGA), whose logic circuits can be rearranged, to create a replica of an existing open source processor called Leon3, which contains around 1.7 million circuits.
About 1000 malicious circuits, not present in Leon3, were then added. The researchers observed that the circuits allowed them to bypass security controls on Leon3 in a similar way to how a virus hands control of a computer to a hacker, but without requiring a flaw in a software application.
Technorati Tags: Beware, Your Processor will be hacked Soon.
Del.Icio.Us Tags: Beware, Your Processor will be hacked Soon.