Securing Hardware from Malicious Attacks | IEEE Conference Publication | IEEE Xplore