Hardware Trojans: Lessons Learned after One Decade of Research