1. The hunt for the kill switch;Adee;IEEE Spectrum,2008
2. Old trick threatens the newest weapons;Markoff;The New York Times,2009
3. Code coverage analysis for IP trust verification;Nahiyan,2017
4. A survey of hardware Trojan taxonomy and detection;Tehranipoor;IEEE Design & Test of Computers,2010
5. Integrated Circuit Authentication: Hardware Trojans and Counterfeit Detection;Tehranipoor,2013