Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory