I. Introduction
Trust is an important part of modern security and safety-critical systems. Counterfeit, tampered or otherwise illegiti-mate hardware can compromise the robustness or trustwor-thiness of a system resulting in anything from early failure to compromise by a bad actor. Counterfeit ICs may be unwittingly incorporated into deployed systems. Such a chip may not perform to the expected standard, having subpar performance or even incorporating security vulnerabilities. Vulnerabilities could be introduced either intentionally or unin-tentionally, depending on the motivations of the counterfeiter. To ensure proper security of a deployed device it is imperative that devices in the field can be securely and uniquely identified in a way that is difficult, or impossible, for an attacker to effectively clone.