Quantum Key Distribution with Untrusted Detectors Accessible to an Eavesdropper