A region based approach for the identification of hardware Trojans | IEEE Conference Publication | IEEE Xplore