Embedded tutorial: Regaining hardware security and trust | IEEE Conference Publication | IEEE Xplore