Provides a comprehensive vulnerability analysis across the integrated circuits design flow Introduces security metrics to measure quantitatively the vulnerability of a circuit to hardware Trojan insertion Describes design techniques to prevent hardware Trojan insertion and to facilitate hardware Trojan detection Presents testing techniques for trustworthiness at each circuit level