HN Top New Show Ask Jobs

settings

Theme

Hand Mode

Feed

Comment by userbinator

Comment by userbinator 14 hours ago

0 replies

View on Hacker News

how a fabrication-time attacker can leverage analog circuits to create a hardware attack that is small (i.e., requires as little as one gate) and stealthy (i.e., requires an unlikely trigger sequence before effecting a chip’s functionality).

Surprisingly no mention of the Z80 "trap gates" in that section, as it's extremely relevant: https://retrocomputing.stackexchange.com/questions/11143/in-...