Reusing Verification Assertions as Security Checkers for Hardware Trojan Detection | IEEE Conference Publication | IEEE Xplore