Software-Inspired Techniques For Digital Hardware Security