Comment Technical details of malicious hardware (Score 5, Informative) 186
For those of you who are interested, you can find more technical details of how we designed and implemented malicious hardware from here
-- computer scientists from University of Illinois
-- computer scientists from University of Illinois