4.5 Hardware Trojans and Split Manufacturing