Design Comparison to Identify Malicious Hardware in External Intellectual Property | IEEE Conference Publication | IEEE Xplore