Improving the Detection of Hardware Trojan Horses in Microprocessors via Hamming Codes | Publicación