Engineers built 'invisible' backdoors into computer chips that are so well-hidden, even the most powerful microscopes can't find them.
March 24, 2026
Original Paper
Hardware Trojans from Invisible Inversions: On the Trojanizability of Standard Cell Libraries
arXiv · 2603.21294
The Takeaway
We typically rely on microscopic scans to verify that the physical circuits on a computer chip haven't been tampered with. This research proves that two components can be visually identical at the atomic level while performing completely different logical functions, allowing a hidden "Trojan" to hide in plain sight where no scan can find it.
From the abstract
At S&P 2023, Puschner et al. made a valuable dataset for hardware Trojan detection research publicly available. It contains a complete set of Scanning Electron Microscope (SEM) images of four different digital Integrated Circuits (ICs) fabricated at progressively smaller semiconductor technology nodes. Puschner et al. reported preliminary evidence that feature sizes affect Trojan detection performance, but they were unable to disentangle effects caused by insertion strategies or by degrading ima