I. Introduction
In today's world, IC security is an important area of concern. We can identify a number of hardware design threats such as
Counterfeiting - Copying the same IC. It is also known as cloning by which attacker can copy and resell a design.
Reverse engineering - Extracting IP or sensitive data, such as cryptographic keys, in the on-chip memory. It is a threat to intellectual property and data security.
Tampering to IC operation or insert malicious functionality, using Trojans or kill switches. Tampering is the attempts of an attacker to gain unauthorized access to an electronic system. It is a threat to integrity and trustworthiness.