[148698] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] [IP] 'We cannot trust' Intel and Via's

daemon@ATHENA.MIT.EDU (Bill Cox)
Wed Dec 25 14:50:18 2013

X-Original-To: cryptography@metzdowd.com
Date: Wed, 25 Dec 2013 09:18:42 -0500
From: Bill Cox <waywardgeek@gmail.com>
To: dj@deadhat.com
In-Reply-To: <d5aee0cd6bdca61a6d2cbc4d585dfeec.squirrel@www.deadhat.com>
Cc: "cryptography@metzdowd.com" <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 12/25/2013 6:27 AM, dj@deadhat.com wrote:
> It would be normal to add characterization circuits to chips to 
> measure the properties of the silicon during and after manufacture. 
> But if you were doing your own layout, leaving space for these would 
> be part of the design rules. Is there anything substantive to suggest 
> it was something else? 

I heard this second hand, but the guy at the time was pretty freaked 
out.  I never heard what became of this story.  Characterization 
transistors are normally added in small gaps between die, not on the die 
itself.  Xilinx does a good job of using all the available area for 
circuitry, even putting transistors in the corners where almost every 
other die you'll see has nothing but wasted space, and some 45-degree 
turns for IO power busing.  The extra transistors were added in some of 
the few remaining spaces that Xilinx didn't fill. The fact that I never 
heard about this again probably means it either was not malicious or our 
guys decided not to make it public for some reason.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post