Information related to intentionally making an IC have issues including

See also

Forgery

References

  1. “Stealthy Dopant-Level Hardware Trojans”: http://people.umass.edu/gbecker/BeckerChes13.pdf