> ‘In this paper we propose an extremely stealthy approach for imple- menting hardware Trojans below the gate level, and we evaluate their impact on the security of the target device’
And just as fictional! Whenever anybody is talking about one distant nuclear power physically invading another nuclear power they are reaching into your pocket.
https://link.springer.com/content/pdf/10.1007/978-3-642-4034...