CAPEC-539 - ASIC With Malicious Functionality

An attacker with access to the development environment process of an application-specific integrated circuit (ASIC) for a victim system being developed or maintained after initial deployment can insert malicious functionality into the system for the purpose of disruption or further compromise.

Severity

Likelihood

Confidentiality

Integrity

Availability

High level: Able to develop and manufacture malicious subroutines for an ASIC environment without degradation of existing functions and processes.

The attacker must have working knowledge of some if not all of the components involved in the target system as well as the infrastructure and development environment of the manufacturer.

Advanced knowledge about the ASIC installed within the target system.