Traditionally, the computing system security has been tackled as a software-level problem. With the globalization of the modern semiconductor industry, the design of a system may involve different parties, especially for the design of system-on-chip (SoC) where the high complexity of the design has pushed designers towards using the third-party components that may have been modified with malicious additions without notice of the designer. Such a malicious modification (known as hardware Trojan) may be very small and can escape the scrutiny of the offline circuit-level testing and appear in the final product, which creates a new class of threats that have to be addressed at the hardware level and at the runtime. For SoCs, one of the most v...