1. Walker-Roberts S, Hammoudeh M, Aldabbas O, Aydin M, Dehghantanha A (2020) Threats on the horizon: Understanding security threats in the era of cyber-physical systems. J Supercomput 76(4):2643–2664
2. Garg S, Gupta TK (2018) Low power domino logic circuits in deep-submicron technology using CMOS. Eng Sci Technol 21(4):625–38
3. Bozzato C, Focardi R, Palmarini F (2019) Shaping the glitch: optimizing voltage fault injection attacks. IACR Trans Cryptogr Hardware Embed Syst 28:199–224
4. Rioja U, Paguada S, Batina L, Armendariz I (2020) The uncertainty of side-channel analysis: A way to leverage from heuristics. arXiv preprint arXiv:2006.12810
5. Kenjar Z, Frassetto T, Gens D, Franz M, Sadeghi AR (2020) V0LTpwn: Attacking x86 processor integrity from software. In: 29th {USENIX} Security Symposium ({USENIX} Security 20)