“…3 Logical attacks, which deal with observing the response of a system to stimuli, include software attacks, such as viruses and exploiting crypto/protocol weaknesses in a system. 3,4 Circuit protection techniques are generally software-based and include cryptography (encryption/decryption), obfuscation of codes, layouts and data flows, and software guards. [5][6]7,8 Examples of hardware-based circuit protection include protective coatings on integrated circuits, entire product enclosures, trusted processors and foundries, and the introduction of complexity into circuit design and macro-sized selfdestructing components that protect critical circuits by destroying them prior to exploitation.…”