Introduction.- Reconfigurability for Static Camouflaging.- Runtime Polymorphism for Dynamic Camouflaging.- Nonlinearity for Physically-Unclonable Functions.- Intrinsic Entropy for True Random Number Generation.- Heterogeneous Physical Integration for Securing the Hardware and the Runtime Data.- Tamper-Proof Hardware from Emerging Technologies.- Resilience Against Side-Channel Attacks in Emerging Technologies.- Conclusions.