Session 2.2: Trojan Horse Detection for RISC-V Cores Using Cross-Auditing Author(s): Siang-Cheng Huang, Shi-Yu Huang Download