In [6], the
authors show us how they design and implement a malicious
processor to provide hidden services. Based on the malicious
processor, attackers can escalate privilege, login through
backdoor and steal password without being detected by
traditional software-based access controls.