This document discusses methods for detecting hardware trojan horses (HTHs) inserted into integrated circuits. It describes two main methods - functional testing and side channel analysis. Functional testing directly compares the logic and output of a device under testing (DUT) to a known good "golden circuit" under various input patterns. Side channel analysis examines indirect effects of added logic like changes in propagation delays or power consumption rather than direct functional outputs. The document provides examples of specific side channel techniques like path delay measurement and current analysis during different operating states.