Table 1: Effectiveness of IPP techniques for the following security aspects.

IPP techniquesAccess controlAuthenticationTrojan detection
IP IC Data from ICIPICFrom designFrom hardware

Charbon and Torunoglu 2000 [10] Y

Adi et al. 2006 [12] Y

Saha and Sur-Kolay 2009 [13] Y

Roy et al. 2008 [14] Y

Alkabani et al. 2008 [15] Y

Alkabani and Koushanfar 2007 [16] Y

Alkabani et al. 2007 [17] YY

Chakraborty and Bhunia 2009 [18] YY

Granado-Criado et al. 2010 [19] Y

Dyka and Langendoerfer 2005 [20] Y

Suzuki et al. 2004 [21] Y

Deng et al. 2009 [23] YY

Castillo et al. 2007 [24]Y

Abdel-Hamid et al. 2005 [25]Y

Saha and Sur-Kolay 2010 [26]Y

Majzoobi and Koushanfar 2009 [27]Y

Agrawal et al. 2007 [28]YY

Cui et al. 2008 [29]Y

Lach et al. 2001 [30] YY

Gu et al. 2009 [31]Y

Li and Lach 2008 [32]YY

Potkonjak et al. 2009 [33]Y

Wei et al. 2010 [34]Y

Dutt and Li 2009 [35]YY

Potkonjak 2010 [36]Y