Explains details of hardware Trojan attacks and associated trust issues, including threat models/instances, attack surfaces, adversaries, and all sorts of protection approaches
Covers Trojan threats and protection approaches at all levels of hardware abstraction, from intellectual Property (IP) to microchip to Printed Circuit Board (PCB) and for all types of electronic hardware including analog/mixed-signal systems and FPGA
Presents taxonomies for hardware Trojan threats, Trojan models, trust benchmarks, and trust metrics
Offers realistic solutions for hardware Trojan threats in industry and government
Describes emerging trend in trustworthy hardware design and new research directions