Skip to Content

High-Security Chip Cracked

Researcher opens up a chip used in various devices.
February 3, 2010

Christopher Tarnovsky, who operates the California-based consulting firm Flylogic Engineering, must strike dread into the heart of anyone working on secure computer chips.

At the Black Hat DC, a computer-security conference in Washington, DC, Tarnovsky gave an impressive demonstration of how even the most secure system will fall under a sustained, determined attack.

Tarnovsky says that he spends almost every waking moment hacking chips. He even owns a focused ion beam work station–a secret weapon for chip hackers. Such a machine costs a quarter of a million dollars, used.

The target in Tarnovsky’s demonstration was the family of chips used for trusted platform computing, and for controlling access to the Xbox 360, GSM SIM cards, and satellite television transmissions. After six months of intense work, Tarnovsky says he developed a technique that allows him to break one of these chips in a matter of hours.

That’s not to say that the chip’s security is poor. Tarnovsky speaks of its design with great respect. When he describes what he had to do to get into it, it’s easy to see why: the device is loaded with encryption, dummy data, light sensors that destroy the chip if they detect a signal, and a complex coating of mesh that will also kill the chip if it’s mishandled.

“It’s a really nice design,” Tarnovsky says, “but it’s not as secure as they claim it is.” This turns out to be the message he wants to get across. Since this chip is rated with extremely high security, Tarnovsky has identified improvements that he believes should be made to protect it further.

However, he acknowledges that few people have the skill and equipment needed to break the chip. In this case, announcing that he’s broken the device won’t mean a flood of copycat hackers. Instead, it just shows that nothing is invulnerable.

Keep Reading

Most Popular

Large language models can do jaw-dropping things. But nobody knows exactly why.

And that's a problem. Figuring it out is one of the biggest scientific puzzles of our time and a crucial step towards controlling more powerful future models.

How scientists traced a mysterious covid case back to six toilets

When wastewater surveillance turns into a hunt for a single infected individual, the ethics get tricky.

The problem with plug-in hybrids? Their drivers.

Plug-in hybrids are often sold as a transition to EVs, but new data from Europe shows we’re still underestimating the emissions they produce.

Google DeepMind’s new generative model makes Super Mario–like games from scratch

Genie learns how to control games by watching hours and hours of video. It could help train next-gen robots too.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.