Researchers show how invisible backdoors can be hidden in chips during manufacture

Adding backdoors at the chip level — Schneier on Security — “In this paper we propose an extremely stealthy approach for implementing hardware Trojans below the gate level… we insert our hardware Trojans by changing the dopant polarity of existing transistors. Since the modified circuit appears legitimate on all wiring layers (including all metal and polysilicon), our family of Trojans is resistant to most detection techniques.”