This document describes hardware trojans and techniques for detecting them. It discusses how modern design practices have increased security risks by outsourcing fabrication and using third-party IP. Hardware trojans maliciously tamper with designs by adding a small number of gates. Detection methods discussed include logic testing, side-channel analysis, and design-for-trust techniques. A statistical approach called MERO generates test patterns to activate rare events in the design in order to detect trojans added by combining rare trigger conditions. The focus is on detecting trojans with eight or fewer activation nodes.