A Process for the Detection of Design-Level Hardware Trojans Using Verification Methods | IEEE Conference Publication | IEEE Xplore