1. R. Chakraborty, S. Narasimhan, S. Bhunia, Hardware trojan: threats and emerging solutions. Proceedings of HLDVT, (2009), pp. 166–171
2. M. Tehranipoor, F. Koushanfar, A survey of hardware trojan taxonomy and detection. IEEE Des. Test 25, 10–25 (2009)
3. S. Skorobogatov, C. Woods, Breakthrough silicon scanning discovers backdoor in military chip. Proceedings of CHES, (2012), pp. 23–40
4. W.J. Dally, B. Towles, Route packets, not wires. Proceedings of DAC, (2001)
5. D.A.B. Miller, Device requirements for optical interconnects to silicon chips. JPROC 97(7), 1166–1185 (2009)