Lemonade from lemons: Harnessing device wearout to create limited-use security architectures | IEEE Conference Publication | IEEE Xplore