1. A primer on hardware security: Models, methods, and metrics;Rostami;Proc. IEEE,2014
2. Detecting malicious inclusions in secure hardware: Challenges and solutions;Wang,2008
3. Hardware trojan: Threats and emerging solutions;Chakraborty,2009
4. Privacy and security in internet of things and wearable devices;Arias;IEEE Trans. Multi-Scale Comput. Syst.,2015
5. Protecting endpoint devices in IoT supply chain;Yang,2015