1. S. Bhunia, M.S. Hsiao, M. Banga, S. Narasimhan, Hardware trojan attacks: threat analysis and countermeasures. Proc. IEEE 102(8), 1229–1247 (2014). https://doi.org/10.1109/JPROC.2014.2334493
2. S. Bhunia, M. Tehranipoor, Hardware security: a hands-on learning approach, 1st edn. (Morgan Kaufmann Publishers, San Francisco, 2018)
3. R. Karri, J. Rajendran, K. Rosenfeld, M. Tehranipoor, Trustworthy hardware: identifying and classifying hardware trojans. Computer 43(10), 39–46 (2010). https://doi.org/10.1109/MC.2010.299
4. S.E. Quadir, J. Chen, D. Forte, N. Asadizanjani, S. Shahbazmohamadi, L. Wang, J. Chandy, M. Tehranipoor, A survey on chip to system reverse engineering. J. Emerg. Technol. Comput. Syst. 13(1) (2016). https://doi.org/10.1145/2755563
5. J. Rajendran, M. Sam, O. Sinanoglu, R. Karri, Security analysis of integrated circuit camouflaging, in Proceedings of the 2013 ACM SIGSAC Conference on Compute and Communications Security, CCS ’13 (Association for Computing Machinery, New York, 2013), S. 709–720. https://doi.org/10.1145/2508859.2516656