Software exploitable hardware Trojans in embedded processor | IEEE Conference Publication | IEEE Xplore