This vulnerability occurs when hardware lacks safeguards against physical inspection, allowing attackers to extract sensitive data by capturing and analyzing high-resolution images of the integrated circuit's internal structure.
Attackers can physically reverse-engineer chips to uncover secrets stored within the silicon. By removing the chip packaging and using advanced imaging techniques—from non-invasive X-ray microscopy to destructive layer-by-layer scanning electron microscopy—they can visually map the circuit's layout and memory contents. This process directly reveals information that software attacks cannot access. Hardware secrets like encryption keys, device identifiers, proprietary firmware, or circuit designs stored in non-volatile memory (such as Masked ROM) or within the circuit netlist itself are exposed. While some memory types like One-Time Programmable (OTP) memory offer more resistance, the absence of dedicated anti-tampering protections makes extraction feasible for determined adversaries with specialized equipment.
Impact: Varies by Context
A common goal of malicious actors who reverse engineer ICs is to produce and sell counterfeit versions of the IC.