Science and Technology in Russian Federation

Sign in Sign up

Troyan Microelectronics: Antivirus; Mass DDoS

What can be considered a domestic microelectronics and why is it important to move to Russia the entire production chain? The industry’s leading players sorted out these questions during the round table “The Trojan microelectronics vs. development and production of competitive electronic components and devices in Russia”. At the meeting the need to unite at the national level was announced. The debate, organized by Telecom Daily together with GS Group Holding, the organizer of the 2nd All-Russian Contest of GS Group Programming conducted under the “umbrella” of All-Russian competition of engineering, was held on October 21 in Moscow.

Almost 90% of the electronic-component products are imported to Russia from abroad. The market is full of military and special orders, but even for the enterprises of the military-industrial complex our country doesn’t produce all the components. Meanwhile, microelectronics may apply “Trojan”: “Bookmarks” (micro-embedded in the chip, to get access to it and bring it down) can jeopardize information security industry and the state as a whole. Electronic “spy” is implanted in a chip in the encapsulation step, which is why it is important to strategically focus the entire production chain in Russia.

“Made in Russia” marker can be designated only to those products, which are designed and manufactured in our country. This is the basic criterion by which the chip can be recognized and used to the Russian electronics manufacturing special and dual purpose.

The government should fully support the Russian players and promote their development through the creation and protection of the domestic market, - the Director of Strategic Marketing GS Group, Andrei Bezrukov said in his speech.

In Russia, there are opportunities to enhance the localization of the production of electronic components and devices. The experience of Russian companies, including GS Nanotech (as part of the innovation cluster “Technopolis GS”), proves the economic viability of the production of microelectronic products in Russia. “Their own R&D-center and a powerful base for the implementation of the commercial production of microelectronics projects enables our company to the entire production chain - from the development of innovative solutions to product assembly,” - CEO of GS Nanotech, Evgeny Maslennikov.

To create a completely Russian production of components, including the development, testing, and array packages, domestic market participants are willing to enter into cooperation. This consortium has already begun to take shape. The leading role in this process has taken over the business community ready to unite for the formulation of proposals for the development of the industry in order to transfer them to the authorities. Panelists made a proposal to the Ministry of Industry and Trade of the Russian Federation to promote the organization and development consortium of electronics manufacturers at the national level.

“Now the moment has come to unite. When the Russian electronics market grew, there was no need in the pool, it was necessary to develop a growing market, everyone was counting on.

Then there was a series of crises, there was no time to deal with it as well. Now the economy has stabilized and is on a downtrend. If nothing is done, then Russian producers will develop this trend. Development strategy that will break this trend is needed, - the executive director of the Association of suppliers of electronic components, Ivan Pokrovsky, supported the initiative.

Meanwhile, on October 21 during a few hours, users were not able to use some popular sites: Twitter, CNN, eBay, PayPal, New York Times and many others. This was due to DDoS-attacks on one of the largest Internet providers Dyn – holders of the affected resource servers.

DDoS-attack (Distributed Denial of Service) is one of the varieties of hacker attacks, at which the server send an artificially created “garbage” traffic, hampering or even stopping the server.

Curiously, the DDoS-attack on the Dyn servers was done with the help of badly protected devices of the internet of things. Hacker traffic came from the tens of millions of the IP-addresses of web cameras, routers, and other “harmless”, at first glance, devices.

However, with the help of them in September 2016 hackers made the most powerful in the history of DDoS-attacks blog for information security specialist and former journalist Brian Krebs (as revenge for exposing the personalities of two hackers), as well as the French internet service provider OVH.

Anti-virus expert “Kaspersky Lab” Denis Legezo is convinced that smart devices today are perfect for hackers, because it is quite simply to access them. Many users don’t change default settings from the manufacturer, including passwords, and don’t always find it necessary to update the software. Finally, such devices are often connected to the network 24/7. Therefore, thousands of devices are available to the hacker world to suit all tastes, and all that is left to do is to go through default passwords.

In order the Internet of Things cease to be a means to achieve the goal of hackers, device manufacturers need to pay more attention to their safety, and regulators to create the legislative framework and the new standards for the use of such devices.

What can users do themselves to protect their devices from hacking? “First of all, you need to change the perception of such devices – Legezo responses. -

It’s time to start taking smart things, not as a conventional television or car. These are other devices, which have disproportionately greater opportunities, and they must be protected.

One can be protected from DDoS-attacks, but it is unlikely to eradicate them. Hacker attacks are similar to flu - there are many variations of the virus, and it’s necessary to find its solution for each one. “In the market there are companies that sell their infrastructure and service filter for cleaning traffic - explains the anonymous. - They have a lot of wide canals, standing empty, ready infrastructure for the automatic filters are already “known” attacks, and there are analysts who can come up and start to work out the new rules for the filters, cleaning traffic from attack packets. It works, but not in all cases.”


votes total: 0