Can you trust your chipset? What if a fabrication-time attacker could slightly modify a processor circuit design to include a weaponizable modification? One that normal testing is not likely to detect and eludes activation by a diverse set of benchmarks? Matthew Hicks and his research partners have done this with the addition of a small analog ciruit to an open source processor; it is the first openly malicious processor. Come hear about the details.