Hardware Trojan Detection Solutions and Design-for-Trust Challenges

   Abstract