1. Ahmed B, Bepary MK, Pundir N, Borza M, Raikhman O, Garg A, Donchin D, Cron A, Abdel-moneum MA, Farahmandi F, et al (2022) Quantifiable assurance: from IPs to platforms. Preprint. arXiv:220407909
2. Alam MM, Tehranipoor M, Forte D (2016) Recycled FPGA detection using exhaustive LUT path delay characterization. In: 2016 IEEE international test conference (ITC). IEEE, Piscataway, pp 1–10
3. Alam M, Chowdhury S, Tehranipoor MM, Guin U (2018) Robust, low-cost, and accurate detection of recycled ICs using digital signatures. In: 2018 IEEE international symposium on hardware oriented security and trust (HOST). IEEE, Piscataway, pp 209–214
4. Becher A, Benenson Z, Dornseif M (2006) Tampering with motes: real-world physical attacks on wireless sensor networks. In: International conference on security in pervasive computing. Springer, Berlin, pp 104–118
5. Bhunia S, Tehranipoor M (2018) Hardware security: a hands-on learning approach. Morgan Kaufmann, Burlington