Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry | IEEE Conference Publication | IEEE Xplore