On the mitigation of Hardware Trojan attacks in embedded processors by exploiting a Hardware-based obfuscator