Hardware Trojan Prevention Through Limiting Access to the Active Region | IEEE Conference Publication | IEEE Xplore