Session 2.2: Trojan Horse Detection for RISC-V Cores Using Cross-Auditing