Hardware IP Protection During Evaluation Using Embedded Sequential Trojan | IEEE Journals & Magazine | IEEE Xplore