IC piracy

Reusing logic masking to facilitate path-delay-based hardware Trojan detection