I. Introduction
The globalization of integrated circuit (IC) industries, such as smart devices, makes ICs face a huge risk of being implanted into hardware Trojans (HTs) by rivals. HTs typically consist of triggers and payloads [1], which will lead to product denial of service (DoS), functional damage, performance decline, or disclosure of confidential information when triggered [2], [3]. Traditional HT detection methods can be divided into pre-silicon detection [4], [5], [6], [7], [8] and post-silicon [9], [10], [11], [12] detection. Pre-silicon detection mainly involves test vector generation and formal verification (FV), while post-silicon detection encompasses reverse engineering and side-channel analysis. As some HTs can activate malicious functions by modifying circuit logic, testers aim to activate HTs using a set of test vectors. However, this approach proves to be highly inefficient in detecting large-scale designs. Furthermore, FV requires the definition of a set of security properties, limiting the effectiveness of this approach. In addition, the lack of golden models hinders the practical implementation of certain post-silicon detection techniques. Some suggested enhancements include integrating side-channel analysis with automatic test pattern generation (ATPG) algorithms to optimize path delay difference through logical testing [13]. Another enhancement is proposed by Chakraborty et al. [14], which reduces the target space of test vectors effectively using a genetic algorithm and significantly decreases the runtime compared to MERO [15].