Pull the Rug from Under: Malicious Reconfiguration of Executing Program in FPGA and its Defense