@article {BauSte10A, title = {A Case Study in Hardware Trojan Design and Implementation}, journal = {International Journal of Information Security (IJIS)}, volume = {10}, number = {1}, year = {2011}, pages = {1-14}, abstract = {As integrated circuits (ICs) continue to have an overwhelming presence in our digital information-dominated world, having trust in their manufacture and distribution mechanisms is crucial. However, with ever-shrinking transistor technologies, the cost of new fabrication facilities is becoming prohibitive, pushing industry to make greater use of potentially less reliable foreign sources for their IC supply. The 2008 Computer Security Awareness Week (CSAW) Embedded Systems Challenge at the Polytechnic Institute of NYU highlighted some of the vulnerabilities of the IC supply chain in the form of a hardware hacking challenge. This paper explores the design and implementation of our winning entry.}, author = {Alex Baumgarten and Michael Steffen and Matthew Clausman and Joseph Zambreno} }