Advanced techniques for designing stealthy hardware trojans | IEEE Conference Publication | IEEE Xplore