Design of hardware trojan horse based on counter | IEEE Conference Publication | IEEE Xplore