1. Ahmed, B., Bepary, M.K., Pundir, N., Borza, M., Raikhman, O., Garg, A., Donchin, D., Cron, A., Abdel-moneum, M.A., Farahmandi, F., et al.: Quantifiable assurance: from IPs to platforms (2022). arXiv preprint arXiv:2204.07909
2. Anandakumar, N.N., Rahman, M.S., Rahman, M.M.M., Kibria, R., Das, U., Farahmandi, F., Rahman, F., Tehranipoor, M.M.: Rethinking watermark: providing proof of IP ownership in modern SoCs (2022). Cryptology ePrint Archive
3. Benz, F., Seffrin, A., Huss, S.A. Bil: a tool-chain for bitstream reverse-engineering. In: 22nd International Conference on Field Programmable Logic and Applications (FPL), pp. 735–738. IEEE, Piscataway (2012)
4. Bhunia, S., Tehranipoor, M.: Hardware Security: A Hands-on Learning Approach. Morgan Kaufmann, Los Altos (2018)
5. Chakraborty, R.S., Saha, I., Palchaudhuri, A., Naik, G.K.: Hardware trojan insertion by direct modification of FPGA configuration bitstream. IEEE Design Test 30(2), 45–54 (2013)