1. ISCAS’89 sequential benchmark circuits. https://filebox.ece.vt.edu/~mhsiao/iscas89.html.
2. Daniel Arp et al. Effective and efficient malware detection at the end host. In 18th USENIX, Montreal, Quebec, 2009.
3. R. Chakraborty et al. MERO: A statistical approach for hardware trojan detection. In CHES, pages 396–410, 2009.
4. George E. Dahl, Jack W. Stokes, Li Deng, and Dong Yu. Large-scale malware classification using random projections and neural networks. In ICASSP, pages 3422–3426, 2013.
5. Kathrin Grosse et al. Adversarial perturbations against deep neural networks for malware classification. CoRR, 2016.