Introduction to System-on-Chip Design using Network-on-Chip.- Network-on-Chip Security Challenges due to Supply Chain.- Characterizing and Optimizing Performance in NoC Architectures.- Characterizing and Optimizing Energy in NoC Architectures.- Modeling NoC in Architectural Simulators.- Eavesdropping Attacks.- Data Integrity Attacks.- Denial-of-Service Attacks.- Side-Channel Attacks.- Emerging Security Vulnerabilities in NoC-based SoCs.- Lightweight Encryption and authentication in NoC-based SoCs.- Trust-aware Routing in NoC-based SoCs.- Route and Data Randomization in NoC-based SoCs.- Mitigating Side-Channel Attacks in NoC-based SoCs.- Real-time Detection and Localization of DoS attacks.- Digital Watermarking for Detecting Malicious IP Cores.- Authorization for NoC Resource Accesses.- Formal Verification of NoC Security Properties.- NoC Trust Verification using Security Assertions.- Securing Optical/Photonic NoC.- Securing Wireless NoC.- Securing 2.5 and 3D NoC.- Future of TrustworthyOn-Chip Communication.- Conclusions and Future Directions. <p></p><p></p>