Modern electronic systems such as servers, personal computers, wearable health devices, mobile phones, network routers, and networked sensors need to store, access, manipulate, or communicate sensitive information or data, making security an important concern in their design. These general-purpose architectures and embedded system platforms are vulnerable to a variety of hardware-centric attacks, such as side channel analysis and hardware Trojans. Furthermore, in these systems, intellectual property (IP) cores or processing units, may come from different providers or venders and be executing code with varying levels of trust. It is therefore important to investigate and to develop techniques and methodologies for secure hardware implementations and executions. Our current research efforts in this area focus on developing security mechanisms for integrating multiple components, such as secure to non-secure cores, into the same chip design, while also maintaining their individual security, preventing data leakage and corruption, and promoting collaboration among the components.