Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-1278 — Vulnerability Class 1

1 vulnerabilities classified as CWE-1278. AI Chinese analysis included.

CWE-1278 represents a critical hardware security weakness where sensitive information embedded within an integrated circuit’s physical structure remains exposed to sophisticated physical analysis. Attackers typically exploit this vulnerability by decapsulating the chip and employing high-magnification imaging techniques, such as scanning electron microscopy, to map the internal circuitry and extract proprietary algorithms or cryptographic keys. To mitigate this risk, developers must implement robust hardware protection mechanisms, including anti-tamper sensors that detect physical intrusion and trigger immediate data erasure. Additionally, employing obfuscation techniques, such as metal layer scrambling or dummy logic insertion, can significantly increase the complexity and cost of reverse engineering efforts, thereby deterring attackers from successfully recovering protected information through direct physical inspection of the silicon die.

MITRE CWE Description
Information stored in hardware may be recovered by an attacker with the capability to capture and analyze images of the integrated circuit using techniques such as scanning electron microscopy. The physical structure of a device, viewed at high enough magnification, can reveal the information stored inside. Typical steps in IC reverse engineering involve removing the chip packaging (decapsulation) then using various imaging techniques ranging from high resolution x-ray microscopy to invasive techniques involving removing IC layers and imaging each layer using a scanning electron microscope. The goal of such activities is to recover secret keys, unique device identifiers, and proprietary code and circuit designs embedded in hardware that the attacker has been unsuccessful at accessing through other means. These secrets may be stored in non-volatile memory or in the circuit netlist. Memory technologies such as masked ROM allow easier to extraction of secrets than One-time Programmable (OTP) memory.
Common Consequences (1)
ConfidentialityVaries by Context
A common goal of malicious actors who reverse engineer ICs is to produce and sell counterfeit versions of the IC.
Mitigations (1)
Architecture and DesignThe cost of secret extraction via IC reverse engineering should outweigh the potential value of the secrets being extracted. Threat model and value of secrets should be used to choose the technology used to safeguard those secrets. Examples include IC camouflaging and obfuscation, tamper-proof packaging, active shielding, and physical tampering detection information erasure.
Examples (1)
Consider an SoC design that embeds a secret key in read-only memory (ROM). The key is baked into the design logic and may not be modified after fabrication causing the key to be identical for all devices. An attacker in possession of the IC can decapsulate and delayer the device. After imaging the layers, computer vision algorithms or manual inspection of the circuit features locate the ROM and r…

Vulnerabilities classified as CWE-1278 represent 1 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.