3.3 Hardware Trojans and Fault Attacks