Drupal-Bibcite47<style face="normal" font="default" size="100%">Detecting hardware trojans: a tale of two techniques</style>