Based off of medium article by Ryan Cornateanu: "Hardware Trojans IUnder a Microscope https://ryancor.medium.com/hardware-trojans-under-a-microscope-bf542acbcc29
Use DIP switches as input, 1- 4 is for normal circuit that would be considered "secure", and 5 - 8 for compromised circuit with embedded Hardware Trojan
No external hardware required, just TinyTapeout Carrier Board
# | Input | Output | Bidirectional |
---|---|---|---|
0 | r0_normal | Output from r0_normal - r3_normal circuit | |
1 | r1_normal | segment b not used | |
2 | r2_normal | segment c not used | |
3 | r3_normal | segment d not used | |
4 | r0_trojan | segment e not used | |
5 | r1_trojan | segment f not used | |
6 | r2_trojan | Output from r0_trojan - r3_trojan circuit | |
7 | r3_trojan | dot not used |