
Sign up to save your podcasts
Or


In this episode of Below the Surface, host Paul Asadoorian is joined by co-hosts Larry Pesci, Joshua Marpet, and Vlad Babkin to delve into the complexities of hardware supply chain security. The discussion is sparked by a presentation from Andrew 'Bunny' Wong at Black Hat Asia, which raised critical questions about how we can trust the silicon in our devices. The conversation explores the challenges of validating hardware components, the potential for backdoors in devices, and the implications of counterfeit components in the supply chain. The hosts share anecdotes and insights about their experiences with hardware security, emphasizing the need for independent testing and the importance of understanding the provenance of hardware components.
00:00 Introduction to Hardware Supply Chain Security
02:53 Understanding Trust in Silicon
05:55 Challenges in Validating Hardware Components
09:01 Historical Context of Hardware Tampering
11:58 The Complexity of Supply Chains
14:55 Operationalizing Hardware Validation
18:01 The Role of Independent Researchers
20:59 Bounties and Community Involvement
23:56 Innovative Techniques for Hardware Analysis
27:06 The Future of Hardware Security
31:57 The Evolution of Computing: From Transistors to Quantum
36:11 Understanding Hardware Trust and Supply Chain Risks
41:52 The Need for Continuous Monitoring and Assurance
55:31 The Future of High Assurance Devices and Backdoors
By Eclypsium5
22 ratings
In this episode of Below the Surface, host Paul Asadoorian is joined by co-hosts Larry Pesci, Joshua Marpet, and Vlad Babkin to delve into the complexities of hardware supply chain security. The discussion is sparked by a presentation from Andrew 'Bunny' Wong at Black Hat Asia, which raised critical questions about how we can trust the silicon in our devices. The conversation explores the challenges of validating hardware components, the potential for backdoors in devices, and the implications of counterfeit components in the supply chain. The hosts share anecdotes and insights about their experiences with hardware security, emphasizing the need for independent testing and the importance of understanding the provenance of hardware components.
00:00 Introduction to Hardware Supply Chain Security
02:53 Understanding Trust in Silicon
05:55 Challenges in Validating Hardware Components
09:01 Historical Context of Hardware Tampering
11:58 The Complexity of Supply Chains
14:55 Operationalizing Hardware Validation
18:01 The Role of Independent Researchers
20:59 Bounties and Community Involvement
23:56 Innovative Techniques for Hardware Analysis
27:06 The Future of Hardware Security
31:57 The Evolution of Computing: From Transistors to Quantum
36:11 Understanding Hardware Trust and Supply Chain Risks
41:52 The Need for Continuous Monitoring and Assurance
55:31 The Future of High Assurance Devices and Backdoors

184 Listeners