“…The effects can be catastrophic, such as system failure and leakage of secret encryption keys (e.g., failure of ice-detection module in the P-8A Poseidon [2]), making it imperative to develop effective HT detection techniques. Some of the contemporary HT detection techniques utilize the timing [3] [4], power [5][6] [7], current or electromagnetic signals based golden signatures to detect anomalous electrical behavior [8] [9]. However, in case of the third-party-IP based designs, it is nearly impossible to extract the golden signatures.…”