Hardware security: Threat models and metrics | IEEE Conference Publication | IEEE Xplore