Designing and Implementing Malicious Hardware


Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defensive techniques. Yet current work on trojan circuits considers only simple attacks against the hardware itself, and straightforward defenses. More complex designs that attack the… (More)
View Slides


4 Figures and Tables


Citations per Year

174 Citations

Semantic Scholar estimates that this publication has 174 citations based on the available data.

See our FAQ for additional information.