Exploiting hardware obfuscation methods to prevent and detect hardware Trojans