Describe the taxonomy of different types of counterfeits.
1. Explain how IP overuse and IP piracy may take place. Provide respective examples.
2. Why do overproduced ICs cost less than their original counterpart?
3. Why does using out-of-spec chips pose a threat?
4. Why are Trojans inserted by the foundry difficult to detect?
5. What are the fundamental limitations of using IP encryption alone to address counterfeit issues?