Defeating UCI: Building Stealthy and Malicious Hardware | IEEE Conference Publication | IEEE Xplore