8.5 From NBTI to IoT security: industrial experiences