› Forums › Personal Topics › Unbidden Thoughts › Anti-backdoor Chip Theory
This topic contains 4 replies, has 1 voice, and was last updated by
josh August 10, 2022 at 12:18 am.
-
AuthorPosts
-
August 4, 2022 at 2:01 pm #119498

joshThe spec can include or not include specific elements that allow timing probes of various sorts. It’s more economic if the specified tests are decisive or if the failure of additional hidden tests of a similar nature would be unarguable as violation of a general contract clause, coupled with the other tests, etc.
-
August 4, 2022 at 2:02 pm #119499

joshThere might be tests that have no pratical use other than thwarting hacks.
-
August 9, 2022 at 10:55 pm #119927

joshGood feedback on this.
Scratch on some other places where GT can drive chip design…
a) Develop peer reviewed theory & algorithms for microcode & speculative execution, especially with extra concurrency
b) Data mine for patterns of instruction sequences that show up a lot in optimized code – candidates for hardware implementation with a theory that says why, at least empirically.
c) Try to downshift highly compatible existing low power designs to extra low power variations. Think of a bidirectional search between ideal low power usage & good compatiblity and see where they meet and how it could be tool supported. Due this also in the wireless radio space.
d) For streching mfg. design, keep stretching search for “clean box” rather than clean room & automated manufacture of the clean boxes.
-
August 10, 2022 at 12:18 am #119928

joshRe: b) intuitively, modern programming involves many hash table lookups that are not predictable and not efficiently pursued in all directions. So intuitively, one sort of speculation would involve pre-fetching all the one’s that might be used, where that is allowed. What does it look like in optimized microcode?
-
-
AuthorPosts
You must be logged in to reply to this topic.