Hardware Security Tutorial - Part 6 - Emerging Security Protections