1. S. Bhunia, S. Ray, S. Sur-Kolay (eds.), Fundamentals of IP and SoC Security: Design, Validation, and Debug (Springer, Cham, 2017)
2. E.M. Clarke, O. Grumberg, D.A. Peled, Model-Checking (The MIT Press, Cambridge, 2000)
3. EMVCo: EMV®; Specifications. See http://www.emvco.com
4. A. Gupta, Formal hardware verification methods: a survey. Formal Methods Syst. Des. 2(3), 151–238 (1992)
5. JasperGold Security Verification Path App. See https://www.cadence.com/content/cadence-www/global/en_US/home/tools/system-design-and-verification/formal-and-static-verification/jasper-gold-verification-platform/security-path-verification-app.html