Detection of Trojan HW by using hidden information on the system | IEEE Conference Publication | IEEE Xplore