Designing and implementing a Malicious 8051 processor | IEEE Conference Publication | IEEE Xplore