CAPEC-539 - ASIC With Malicious Functionality

An attacker with access to the development environment process of an application-specific integrated circuit (ASIC) for a victim system being developed or maintained after initial deployment can insert malicious functionality into the system for the purpose of disruption or further compromise.






High level: Able to develop and manufacture malicious subroutines for an ASIC environment without degradation of existing functions and processes.

The attacker must have working knowledge of some if not all of the components involved in the target system as well as the infrastructure and development environment of the manufacturer.

Advanced knowledge about the ASIC installed within the target system.