On Modeling and Detecting Trojans in Instruction Sets | IEEE Journals & Magazine | IEEE Xplore