Interacting with Hardware Trojans over a network | IEEE Conference Publication | IEEE Xplore