Return to Article Details A Deep Review of Hardware Trojan Identification Methods in System-on-Chip Architecture Download Download PDF