Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Required reading: "Stealthy Dopant-Level Hardware Trojans" by George Becker et al

https://link.springer.com/content/pdf/10.1007/978-3-642-4034...



> ‘In this paper we propose an extremely stealthy approach for imple- menting hardware Trojans below the gate level, and we evaluate their impact on the security of the target device’

Holy crap wtf.. how is this even possible


Who needs horror films when journal articles can be that scary!


And just as fictional! Whenever anybody is talking about one distant nuclear power physically invading another nuclear power they are reaching into your pocket.


Having talked with folks who were directly involved in that inter-plant incident, it wasn't fiction and it was a serious threat.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: