Exploring the Limitations of the Property-based Hardware-Trojan Detection Methods | IEEE Conference Publication | IEEE Xplore