Stealth assessment of hardware Trojans in a microcontroller | IEEE Conference Publication | IEEE Xplore