Introduction to hardware Trojan detection methods | IEEE Conference Publication | IEEE Xplore