An attacker inserts malicious logic into a product at some point during the supply chain lifecycle. Very often it is difficult to detect when the malicious modifications took place because of the complex nature of supply chain dynamics. One common example of malicious logic embedded into a product concerns USB Memory sticks shipping with viruses or trojans, infecting the host machine once they are inserted into the port.