5.2 Hardware Trojan and Active Implementation Attacks