Part I. Threat Modelling of Hardware Supply Chain.- Chapter 1. CIST: A Threat Modelling Approach for Hardware Supply Chain Security.- Part II. Emerging Hardware-based Security Attacks and Countermeasures.- Chapter 2. A Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon.- Chapter 3. Anti-counterfeiting Techniques for Resources-Constrained Devices.- Part III. Anomaly Detection in Embedded Systems.- Chapter 4. Anomalous Behaviour in Embedded Systems.- Chapter 5. Hardware Performance Counters (HPCs) for Anomaly Detection.- Chapter 6. Anomaly Detection in an Embedded System.