“…Hardware backdoors, often referred to as hardware Trojans, can be inserted at any phase of the chip manufacturing process-specification, registertransfer level (RTL) design, IP integration, physical design, and fabrication. Various defenses have been proposed against hardware Trojans including post-fabrication detection [1,12,21,44,51,105,107], run-time monitoring [98], and designtime deterrence [22,41,75,84,99,110]. However, these techniques are typically not comprehensive.…”