Using outliers to detect stealthy hardware trojan triggering? | IEEE Conference Publication | IEEE Xplore