New testing procedure for finding insertion sites of stealthy Hardware Trojans | IEEE Conference Publication | IEEE Xplore