Perspectives on Trust in Hardware Supply Chains
This talk explores the practical realities of hardware supply chain attacks, focusing on how economic incentives drive fraud and malicious modifications rather than high-end state-sponsored implants. It examines the lifecycle of hardware components, from manufacturing defects to the gray market, and how these can be exploited for warranty fraud or hardware-level backdoors. The speaker demonstrates how simple modifications, such as wire-bonding or relabeling, can be used to compromise hardware integrity. The presentation emphasizes that hardware security is a cat-and-mouse game and advocates for better inspection techniques like infrared verification.
The Hidden Economics of Hardware Supply Chain Attacks
TLDR: Hardware supply chain security is often mischaracterized as a realm of state-sponsored implants, but the real threat is driven by mundane economic incentives like warranty fraud and gray-market component recycling. Attackers are increasingly using sophisticated techniques like wire-bonding and laser-engraving to create "Franken-devices" that bypass standard integrity checks. Pentesters and researchers need to shift their focus from theoretical backdoors to the practical, low-cost modifications that are already compromising hardware at scale.
Security researchers often fixate on the "Big Hack"—the idea of a nation-state actor surreptitiously soldering a microscopic chip onto a server motherboard to exfiltrate data. While that makes for compelling headlines, it ignores the reality of how hardware is actually compromised in the wild. The real threat to hardware integrity isn't a bespoke, million-dollar implant; it is a $3-an-hour technician in a gray-market repair shop who has figured out how to turn a broken device into a profitable one.
The Economics of Hardware Fraud
Hardware supply chains are not monolithic, secure pipelines. They are messy, global, and highly distributed networks of design houses, foundries, packaging facilities, and distributors. Every hand that touches a component is a potential point of failure. When we look at the economics of these supply chains, we see that the highest profit margins exist at the point of initial sale. As competition increases and volume grows, profitability drops. This creates a massive incentive for actors to find ways to extract value from the "long tail" of hardware—the broken, returned, or discarded units that would otherwise be written off as e-waste.
Warranty fraud is the primary driver here. If an attacker can identify a common manufacturing defect that triggers a specific error code, they can replicate that state on a device assembled from scrap parts. By returning these "Franken-devices" to the manufacturer, they secure a brand-new unit, which is then sold as genuine. This is not a theoretical attack; it is a multi-billion dollar industry. The NIST National Vulnerability Database and similar disclosures often focus on software, but the physical layer remains largely unmonitored.
Technical Realities of Physical Modification
Attackers are not just swapping parts; they are performing advanced physical modifications that are surprisingly accessible. Wire-bonding, once the domain of high-end semiconductor labs, is now a standard service in many electronics districts. An attacker can walk into a shop with a board and a chip, and for a nominal fee, have the chip professionally bonded to the circuit board. This allows for the creation of custom hardware that looks and behaves like a genuine production unit.
Consider the case of relabeled FPGAs or microcontrollers. An attacker takes an engineering sample (ES) chip, uses a laser engraver to blast off the original markings, and then re-marks it as a high-value production part. Because the chip is functionally identical to the production version, it passes basic software-level checks. The OWASP Hardware Security Project provides a framework for understanding these risks, but the barrier to entry for these attacks is lower than most security teams realize.
Detecting the Undetectable
The most dangerous aspect of these modifications is that they are designed to be invisible to standard inspection methods. If an attacker modifies a chip by changing only the mid-level metal layers, the external appearance remains unchanged. There are no extra logic gates to trigger a power-analysis alarm, and the device functions perfectly under normal operating conditions.
Current defensive strategies, such as X-ray inspection, are often too slow or expensive to be applied to every unit in a production run. This is where techniques like Infrared (IR) In-Situ Verification become critical. Silicon is transparent to infrared light, allowing researchers to image the internal structure of a chip while it is still mounted on a circuit board. By comparing the IR signature of a suspect chip against a known-good reference, we can detect unauthorized modifications without damaging the device.
Moving Beyond the Big Hack
For the pentester, the lesson is clear: stop looking for the "Big Hack" and start looking for the "Small Fraud." When you are assessing hardware, look for signs of physical tampering that might indicate a device has been through a gray-market repair cycle. Check for inconsistent markings, unusual solder patterns, or components that don't match the bill of materials.
Defenders must also recognize that hardware security is not a "set it and forget it" problem. We need to move toward a model of continuous verification. If your organization relies on high-assurance hardware, you cannot assume that the device you received is the device that was designed. We need to demand better transparency from our vendors and invest in the tools necessary to verify the integrity of our hardware at the point of use. The supply chain is under attack, but the battle is being fought in the repair shops and the gray markets, not just in the high-security labs. If we want to secure our infrastructure, we have to start by understanding the economics of the people who are trying to break it.
Vulnerability Classes
Target Technologies
Attack Techniques
Up Next From This Conference
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Hacking Apple's USB-C Port Controller




