Limiting the Damage Potential of Discretionary Trojan Horses | IEEE Conference Publication | IEEE Xplore