Trustworthy Hardware: Identifying and Classifying Hardware Trojans

   Abstract