04-16-2018, 09:17 AM
Quote:In this paper we propose an extremely stealthy approach for implementing hardware Trojans below the gate level, and we evaluate their impact on the security of the target device. Instead of adding additional circuitry to the target design, we insert our hardware Trojans by changing the dopant polarity of existing transistors.
https://www.emsec.rub.de/media/crypto/ve...tended.pdf
“If you think you are too small to make a difference, try sleeping with a mosquito.” - Dalai Lama XIV