1. M. Rostami, F. Koushanfar, R. Karri, A primer on hardware security: models. Methods Metr. 102(8), 1283–1287 (2014)
2. S. Skorobogatov, Hardware assurance and its importance to national security (2012),
http://www.cl.cam.ac.uk/sps32/secnews.html
3. A.I. Belous, V.A. Solodukha, S.V. Shvedov, Software and hardware Trojans—implementation methods and methods of counteraction, in The First Technical Encyclopedia, vol. 2. (TECHNOSPHERE, Moscow, 2018), 688 p. ISBN 978-5-94836-524-4
4. 112th Congress, Inquiry into counterfeit electronic parts in the department of defense supply chain, Senate Report of the Committee on Armed Services (2012)
5. J. Grand, J. Applebaum, C. Tarnovsky. «Smart» parking meter implementations, globalism, you aka meter maids eat their young (2009),
https://www.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-grandappelbaum-tarnovsky-smart_parking.pdf