1. [1] Rostami, M., Koushanfar, F., Rajendran, J. and Karri, R.: Hardware security: threat models and metrics, Proc. International Conference on Computer-Aided Design (ICCAD), pp.819-823 (2013).
2. [2] Francq, J. and Frick, F.: Introduction to hardware Trojan detection methods, Proc. 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), EDAA, pp.770-775 (2015).
3. [3] Xiao, K., Forte, D., Jin, Y., Karri, R., Bhunia, S. and Tehranipoor, M.: Hardware trojans: lessons learned after one decade of research, ACM Trans. Design Automation of Electronic Systems (TODAES), Vol.22, No.1, pp.1-23 (2016).
4. [4] Liu, B. and Qu, G.: VLSI supply chain security risks and mitigation techniques: A survey, Integration, VLSI Journal, Vol.55, pp.438-448 (2016).
5. [5] TrustHub.org: Trust-HUB, available from <http://trust-hub.org/benchmarks/trojan>.