Detecting malicious modifications of data in third-party intellectual property cores | IEEE Conference Publication | IEEE Xplore