Analyzing circuit vulnerability to hardware Trojan insertion at the behavioral level | IEEE Conference Publication | IEEE Xplore