“A team of researchers from the University of Massachusetts, the Technical University of Delft, the University of Lugano, and the Gortz Institute for IT-Security have identified new way in which hardware Trojans could be added to a chip which is essentially undetectable by any of the methods described above. Using that technique, they succeeded in sabotaging the pseudorandom number generator at the heart of the cryptographic functions of the Intel Ivy Bridge processors, which include most of the Intel i3, i5, and i7 processors built using Intel’s 22 nm manufacturing process, demonstrating disruption of the Ivy Bridge chip so that it generates far simpler pseudorandom numbers.”
http://www.gizmag.com/doping-level-hardware-trojans-compromise-cryptography/29220/