Revisiting Trojan Insertion Techniques for Post-Silicon Trojan Detection Evaluation | IEEE Conference Publication | IEEE Xplore