1. Hardware trojan protection for third party ips;Al-Anwar,2013
2. Fort-nocs: Mitigating the threat of a compromised noc;Ancajas,2014
3. ARM, ARM Cortex-A72 MPCore Processor Technical Reference Manual, 2015. http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.100095_0001_02_en/index.html.
4. Trusted rtl: Trojan detection methodology in pre-silicon designs;Banga,2010
5. FPGA soc architecture and runtime to prevent hardware trojans from leaking secrets;Bloom,2015