Analysis of the Security Vulnerabilities of 2.5-D and 3-D Integrated Circuits