Hardware trojan detection through information flow security verification | IEEE Conference Publication | IEEE Xplore