on, 2011, pp. 67-70. a) What kinds of coverage analysis may be used by verification engineers to determine if their simulations have done an adequate job of verification. How can these coverage numbers be used by verification engineers to try to identify suspected Trojans? b) What methods were used by the authors of this paper to reduce the number of suspicious signals? Describe them.