Trust games: How game theory can guide the development of hardware Trojan detection methods | IEEE Conference Publication | IEEE Xplore