Chip level security: Why ? How ? | IEEE Conference Publication | IEEE Xplore