9. Another paper we read was: Xuehui Zhang and M. Tehranipoor, "Case study: Detecting hardware Trojans in third-party digital IP cores," in Hardware-Oriented Security and Trust (HOST), 2011 IEEE International Symposium

on, 2011, pp. 67-70. a) What kinds of coverage analysis may be used by verification engineers to determine if their simulations have done an adequate job of verification. How can these coverage numbers be used by verification engineers to try to identify suspected Trojans? b) What methods were used by the authors of this paper to reduce the number of suspicious signals? Describe them.