aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Tech

Hardware Is A Cybersecurity Risk. Here’s What We Need To Know

  • root
  • December 20, 2019
  • 4 minute read

Cyberspace does not exist in a vacuum. All cyber systems are built using the physical hardware of the semiconductor chips found in all modern electronics, computers, communications networks and other critical infrastructure. These chips are becoming faster, cheaper and more powerful, and this has enabled the rise of artificial intelligence, the internet of things (IoT), and autonomous systems as key technologies of the future.

As the world becomes increasingly reliant on advanced technologies for economic growth and national security, implicit trust in hardware becomes an untenable option. Ultimately, hardware is the foundation for digital trust. A compromised physical component can undermine all additional layers of a system’s cybersecurity to devastating effect. Hardware security, therefore, focuses on protecting systems against the vulnerabilities at the physical layer of devices.


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

Hardware vulnerability

Hardware attacks take advantage of vulnerabilities in hardware-manufacturing supply chains. Modern chips are incredibly complex devices consisting of billions of transistor components that can be compromised during the processes of design, fabrication, and assembly and testing.

The complexity of integrated circuits and microelectronics makes hardware vulnerabilities difficult to detect. Physical modifications to a single integrated circuit can be well hidden among the sheer number of valid components and can function undetected for a long time. A well-designed hardware vulnerability could therefore go undetected until well after the malicious hardware has been widely incorporated into critical infrastructure.

What are the drivers changing global hardware security?

Recent global developments in industry, technology and geopolitics call for a greater focus on hardware security to ensure the continued health of our increasingly interconnected world.

Read More  Gadget Review: Best Wireless Keyboards

Industrial trends

Globalization has transformed the semiconductor industry over the past few decades. Original equipment manufacturers have relocated their assembly plants and foundries to inexpensive geographic regions and have tapped into economies of scale by outsourcing manufacturing to dedicated suppliers.

The semiconductor industry has experienced a 90% contraction in the number of companies with leading-edge fabrication capabilities, with only three remaining companies (TSMC, Samsung and Intel) maintaining state-of-the-art foundries.

Technology trends

The growing expense of advanced semiconductor fabrication reflects the fact that technological growth in semiconductors has largely been driven by process innovation and advanced hardware architecture design. The primary semiconductor technology has not fundamentally changed since its invention in the 1960s. Rather, advanced manufacturing and innovative designs allow smaller semiconductor structures to be packed with increasing density to boost computational power.

The staggering growth of microprocessor complexity since 1970 (note the logarithmic y-axis). Image: Karl Rupp et al.

Reducing feature size has been so successful that the semiconductor industry is now facing a barrier in the underlying physics; further attempts at decreasing size will increasingly result in unwanted quantum mechanical effects.

Geopolitical trends

All nations and their economies are increasingly dependent on advanced semiconductor-based technologies for high-tech sectors and economic growth. This is reflected by the technological investments of well-resourced nations that seek to bolster their semiconductor manufacturing and innovation base by concentrating on developing critical technical expertise and production capabilities.

Component-manufacturing capabilities and the technical workforce have consequently been concentrated in a few countries around the world. This has lead to the current paradigm of haves and have-nots in semiconductor innovation and fabrication. Growing competition among the resourced nations to take the lead in semiconductor-manufacturing technology and innovation is ongoing, and impacts hardware security through changes in oversight and control of the supply chain. Nations without a semiconductor industry are exposed to geopolitical risks akin to those faced by commodity markets such as oil-dependence in the energy sector, and will have little influence over the security standards for hardware.

Read More  IBM And Cohesity Announce New Data Security And Resiliency Collaboration Advancing Enterprises' Ability To Fight The Impacts Of Breaches And Cyberattacks

Achieving trusted hardware

Semiconductor technologies are essential to today’s economy and tomorrow’s prosperity. Consumers of microelectronics, from governments to corporations to individuals, purchase hardware with implicit trust, thereby exchanging security for capability. Ultimately, global cybersecurity requires diversified manufacturing sources of critical cyber infrastructure and future advances in hardware. Hardware manufacturers may also seek to ensure security and standards in their supply chain, and may be compelled to do so by governmental regulations.

Hardware security should be approached cooperatively by the private and public sectors. Both sectors have an important role to play in ensuring the safety and security of our digital infrastructure. This partnership should emulate well-established mechanisms in other engineering disciplines, such as civil or aeronautical engineering. The public sector sets standards and controls while the private sector designs, manufactures, builds and sustains. in the past, the global community has learned how to secure our physical infrastructure to safeguard our safety; now it is time to learn from that past and apply the same principles to secure our hardware.

The potential magnitude of impact of a successful hardware attack makes designing a comprehensive mitigation strategy imperative. Such an approach should seek not only to prevent a hardware vulnerability from occurring during the manufacturing stages, but also to enable systems to identify and respond to attacks as they take place. Prevention requires shoring up all stages of the manufacturing supply chain and developing thorough means of testing. Identification and response require designing integrated circuits with security features to detect, quarantine and shut down attacks as they occur. Success in achieving hardware security is possible only if the attacks are considered inevitable, not plausible, and are therefore pre-empted.

Read More  Safety And Security In Cloud Storage

 

Written by

Edlyn V. Levine, PhD Research Associate, Department of Physics, Harvard University

Algirde Pipikaite, Project Lead, Governance and Policy, World Economic Forum

This article is republished from World Economic Forum.


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

root

Related Topics
  • Cybersecurity
  • Cyberspace
  • Hardware
  • Internet Of Things
You May Also Like
Getting things done makes her feel amazing
View Post
  • Computing
  • Data
  • Featured
  • Learning
  • Tech
  • Technology

Nurturing Minds in the Digital Revolution

  • April 25, 2025
View Post
  • Tech

Deep dive into AI with Google Cloud’s global generative AI roadshow

  • February 18, 2025
Volvo Group: Confidently ahead at CES
View Post
  • Tech

Volvo Group: Confidently ahead at CES

  • January 8, 2025
zedreviews-ces-2025-social-meta
View Post
  • Featured
  • Gears
  • Tech
  • Technology

What Not to Miss at CES 2025

  • January 6, 2025
View Post
  • Tech

IBM and Pasqal Plan to Expand Quantum-Centric Supercomputing Initiative

  • November 21, 2024
Black Friday Gifts
View Post
  • Tech

Black Friday. How to Choose the Best Gifts for Yourself and Others, Plus Our Top Recommendations.

  • November 16, 2024
zedreviews-Apple-iPhone-16-Pro-finish-lineup-240909
View Post
  • Featured
  • Gears
  • Tech
  • Technology
  • Tools

Apple debuts iPhone 16 Pro and iPhone 16 Pro Max

  • September 10, 2024
zedreviews-Apple-iPhone-16-Apple-Intelligence-240909
View Post
  • Featured
  • Gears
  • Tech
  • Technology

Apple introduces iPhone 16 and iPhone 16 Plus

  • September 10, 2024

Stay Connected!
LATEST
  • college-of-cardinals-2025 1
    The Definitive Who’s Who of the 2025 Papal Conclave
    • May 7, 2025
  • conclave-poster-black-smoke 2
    The World Is Revalidating Itself
    • May 6, 2025
  • oracle-ibm 3
    IBM and Oracle Expand Partnership to Advance Agentic AI and Hybrid Cloud
    • May 6, 2025
  • 4
    Conclave: How A New Pope Is Chosen
    • April 25, 2025
  • Getting things done makes her feel amazing 5
    Nurturing Minds in the Digital Revolution
    • April 25, 2025
  • 6
    AI is automating our jobs – but values need to change if we are to be liberated by it
    • April 17, 2025
  • 7
    Canonical Releases Ubuntu 25.04 Plucky Puffin
    • April 17, 2025
  • 8
    United States Army Enterprise Cloud Management Agency Expands its Oracle Defense Cloud Services
    • April 15, 2025
  • 9
    Tokyo Electron and IBM Renew Collaboration for Advanced Semiconductor Technology
    • April 2, 2025
  • 10
    IBM Accelerates Momentum in the as a Service Space with Growing Portfolio of Tools Simplifying Infrastructure Management
    • March 27, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    Tariffs, Trump, and Other Things That Start With T – They’re Not The Problem, It’s How We Use Them
    • March 25, 2025
  • 2
    IBM contributes key open-source projects to Linux Foundation to advance AI community participation
    • March 22, 2025
  • 3
    Co-op mode: New partners driving the future of gaming with AI
    • March 22, 2025
  • 4
    Mitsubishi Motors Canada Launches AI-Powered “Intelligent Companion” to Transform the 2025 Outlander Buying Experience
    • March 10, 2025
  • PiPiPi 5
    The Unexpected Pi-Fect Deals This March 14
    • March 13, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.