1. Rajat Subhra Chakraborty, Francis Wolff, Somnath Paul, Christos Papachristou, and Swarup Bhunia. 2009. MERO: A statistical approach for hardware Trojan detection. In Cryptographic Hardware and Embedded Systems (CHES’09), Christophe Clavier and Kris Gaj (Eds.). Springer, Berlin,396–410.
2. Hardware Trojan Horse Detection through Improved Switching of Dormant Nets
3. Introduction to Hardware Trojan Detection Methods
4. K. Hasegawa, M. Oya, M. Yanagisawa, and N. Togawa. 2016. Hardware Trojans classification for gate-level netlists based on machine learning. In 2016 IEEE 22nd International Symposium on On-line Testing and Robust System Design (IOLTS’16). 203–206.
5. K. Hasegawa, M. Yanagisawa, and N. Togawa. 2018. A hardware-Trojan classification method utilizing boundary net structures. In 2018 IEEE International Conference on Consumer Electronics (ICCE’18). 1–4.