1. KPMG, Managing the Risks of Counterfeiting in the Information Technology Industry, Online, 2006, https://www.agmaglobal.org/uploads/whitePapers/KPMG-AGMA_ManagingRiskWhitePaper_V5.pdf
2. Guin, U., Huang, K., DiMase, D., Carulli, J.M., Tehranipoor, M., Makris, Y.: Counterfeit integrated circuits: a rising threat in the global semiconductor supply chain. Proc. IEEE 102(8), 1207–1228 (2014)
3. Alkabani, Y., Koushanfar, F.: Active hardware metering for intellectual property protection and security. In: USENIX Security Symposium (2007)
4. Yasin, M., Sengupta, A., Nabeel, M.T., Ashraf, M., Rajendran, J.J., Sinanoglu, O.: Provably-secure logic locking: from theory to practice. In: ACM CCS 2017. ACM, pp. 1601–1618 (2017)
5. Sengupta, A., Sinanoglu, O.: CAS-Unlock: Unlocking CAS-Lock Without Access to a Reverse-Engineered Netlist, Cryptology ePrint Archive, Report 2019/1443, (2019) https://eprint.iacr.org/2019/1443