This challenge gave us an image of a Atari POKEY Chip connected to a Salea Logic Analyzer as well as a CSV file containing the data from a session of keyboard inputs. I found the Data Sheet online for this chip as well as a thread that provided the decodings for these keyboard codes. I was able to decrypt the flag by writing a python script to debounce the key codes. I needed to add a time threshold (3 x 10^-7) to my code so that the correct values for each wire were chosen. FLAG;_8-BIT-HARDWARE-KEYLOGGER\n

Original writeup (https://speeeday.wordpress.com/2018/07/02/wired-csv-google-ctf-quals-2018/).