“…In the classic supply chain management this threat existed already at the level of the top floor (ERP systems were already linked for example by EDI). [11], [3]) systematizes the knowledge in hardware security and design protection in the microelectronics industry, including a classification of threat models (hardware Trojans, IP piracy and IC overbuilding, reverse engineering, side channel analysis and counterfeiting), state-of-the-art defenses (design obfuscation, IP watermarking, IP fingerprinting, IC metering, split manufacturing IC camouflaging, IC information leakage reduction, key based authentication, noise injection secure-scan, physical unclonable functions PUF / unique IDs and aging sensors), and evaluation metrics for important hardware-based attacks. Using the network all connected systems at these two levels can be accessed and attacked.…”