Copyright © Intellitech Corp. 2010. All rights reserved.
14
Simply adding points to transistors
that become inputs to a trojan
Is not achievable
-
Cheaper for attacker to bribe designer
Than to use this approach