Detecting hardware trojans: a tale of two techniques | IEEE Conference Publication | IEEE Xplore