Trojan-D2: Post-Layout Design and Detection of Stealthy Hardware Trojans - a RISC-V Case Study | IEEE Conference Publication | IEEE Xplore