Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelity | IEEE Conference Publication | IEEE Xplore