I met with Mohammad Tehranipoor today. We can no longer trust the hardware and just focus on software or network security. The IC chips today are composed of different cores from multiple suppliers that you may or may not trust. A core is a blueprint on how to perform a function in hardware. An attacker could add extra circuits to the IC chip to do an extra unanticipated function like shutting down when given a special code. Trust-hub.org focuses on this emerging area of hardware security.