CWE-1248: Semiconductor Defects in Hardware Logic with Security-Sensitive Implications

Export to Word

Description

The security-sensitive hardware module contains semiconductor defects.

Extended Description

A semiconductor device can fail for various reasons. While some are manufacturing and packaging defects, the rest are due to prolonged use or usage under extreme conditions. Some mechanisms that lead to semiconductor defects include encapsulation failure, die-attach failure, wire-bond failure, bulk-silicon defects, oxide-layer faults, aluminum-metal faults (including electromigration, corrosion of aluminum, etc.), and thermal/electrical stress. These defects manifest as faults on chip-internal signals or registers, have the effect of inputs, outputs, or intermediate signals being always 0 or always 1, and do not switch as expected. If such faults occur in security-sensitive hardware modules, the security objectives of the hardware module may be compromised.


ThreatScore

Threat Mapped score: 0.0

Industry: Finiancial

Threat priority: Unclassified


Observed Examples (CVEs)

Related Attack Patterns (CAPEC)


Attack TTPs

N/A

Modes of Introduction

Phase Note
Manufacturing May be introduced due to issues in the manufacturing environment or improper handling of components, for example.
Operation May be introduced by improper handling or usage outside of rated operating environments (temperature, humidity, etc.)

Common Consequences

Potential Mitigations

Applicable Platforms


Demonstrative Examples

Intro: The network-on-chip implements a firewall for access control to peripherals from all IP cores capable of mastering transactions.

Body: Post-manufacture testing must be performed to ensure that hardware logic implementing security functionalities is defect-free.

A manufacturing defect in this logic manifests itself as a logical fault, which always sets the output of the filter to "allow" access.

Notes

← Back to CWE list