
Based off of medium article by Ryan Cornateanu: "Hardware Trojans IUnder a Microscope https://ryancor.medium.com/hardware-trojans-under-a-microscope-bf542acbcc29
Use DIP switches as input, 1- 4 is for normal circuit that would be considered "secure", and 5 - 8 for compromised circuit with embedded Hardware Trojan
No external hardware required, just TinyTapeout Carrier Board
| # | Input | Output | Bidirectional |
|---|---|---|---|
| 0 | r0_normal | Output from r0_normal - r3_normal circuit | |
| 1 | r1_normal | segment b not used | |
| 2 | r2_normal | segment c not used | |
| 3 | r3_normal | segment d not used | |
| 4 | r0_trojan | segment e not used | |
| 5 | r1_trojan | segment f not used | |
| 6 | r2_trojan | Output from r0_trojan - r3_trojan circuit | |
| 7 | r3_trojan | dot not used |