Designing and implementing malicious hardware is a white paper written by the University of Illinois, very interesting, which shows how we can have a major security risk and not through the software as usual. Processors such as generators of insecurity.
Read it in pdf format, here:
Fernando "Jago_ff" Ferrari
Alguna sugerencia?, enviame un mail