The security-sensitive hardware module contains semiconductor defects.
A semiconductor device can fail for various reasons. While some are manufacturing and packaging defects, the rest are due to prolonged use or usage under extreme conditions. Some mechanisms that lead to semiconductor defects include encapsulation failure, die-attach failure, wire-bond failure, bulk-silicon defects, oxide-layer faults, aluminum-metal faults (including electromigration, corrosion of aluminum, etc.), and thermal/electrical stress. These defects manifest as faults on chip-internal signals or registers, have the effect of inputs, outputs, or intermediate signals being always 0 or always 1, and do not switch as expected. If such faults occur in security-sensitive hardware modules, the security objectives of the hardware module may be compromised.
Threat Mapped score: 0.0
Industry: Finiancial
Threat priority: Unclassified
N/A
Phase | Note |
---|---|
Manufacturing | May be introduced due to issues in the manufacturing environment or improper handling of components, for example. |
Operation | May be introduced by improper handling or usage outside of rated operating environments (temperature, humidity, etc.) |
Intro: The network-on-chip implements a firewall for access control to peripherals from all IP cores capable of mastering transactions.
Body: Post-manufacture testing must be performed to ensure that hardware logic implementing security functionalities is defect-free.
A manufacturing defect in this logic manifests itself as a logical fault, which always sets the output of the filter to "allow" access.