XOR based Methodology to Detect Hardware Trojan utilizing the Transition Probability | IEEE Conference Publication | IEEE Xplore