Provides a comprehensive vulnerability analysis across the integrated circuits design flow
Introduces security metrics to measure quantitatively the vulnerability of a circuit to hardware Trojan insertion
Describes design techniques to prevent hardware Trojan insertion and to facilitate hardware Trojan detection
Presents testing techniques for trustworthiness at each circuit level