Active hardware attacks and proactive countermeasures | IEEE Conference Publication | IEEE Xplore