CAPEC 539 ASIC With Malicious Functionality

Draft Detailed Low Risk
Severity High

Description

An attacker with access to the development environment process of an application-specific integrated circuit (ASIC) for a victim system being developed or maintained after initial deployment can insert malicious functionality into the system for the purpose of disruption or further compromise.

Consequences

Relationships

Related ATT&CK Techniques

1