Case study: Detecting hardware Trojans in third-party digital IP cores | IEEE Conference Publication | IEEE Xplore