1. S. Aftabjahani, R. Kastner, M. Tehranipoor, F. Farahmandi, J. Oberg, A. Nordstrom, N. Fern, A. Althoff, Special session: cad for hardware security-automation is key to adoption of solutions, in 2021 IEEE 39th VLSI Test Symposium (VTS) (IEEE, Piscataway, 2021), pp. 1–10
2. L. Azriel, R. Ginosar, A. Mendelson, SoK: an overview of algorithmic methods in IC reverse engineering, in Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop (2019), pp. 65–74
3. L. Azriel, J. Speith, N. Albartus, R. Ginosar, A. Mendelson, C. Paar, A survey of algorithmic methods in IC reverse engineering. J. Cryptogr. Eng. 11(3), 299–315 (2021)
4. L. Benini, G. De Micheli, State assignment for low power dissipation. IEEE J. Solid State Circuits 30(3), 258–268 (1995)
5. U.J. Botero, R. Wilson, H. Lu, M.T. Rahman, M.A. Mallaiyan, F. Ganji, N. Asadizanjani, M.M. Tehranipoor, D.L. Woodard, D. Forte, Hardware Trust and Assurance Through Reverse Engineering (Association for Computing Machinery, New York, 2020)