1. P. Jiang, D.J. Li. "Information countermeasure". Tsinghua University press, Chinese People's Public Security University press, pp.8--11. 2007.
2. D.Agrawal, S.Baktir and D. Karakoyunlu, Trojan Detection using IC Fingerprinting. Proceedings of IEEE Symposium on Security and Privacy (SSP'07), pp.296--310, 2007.
3. D.Jia and S.Smith, A hardware threat modeling concept for trustable integrated circuits. Proceedings of IEEE Region 5 Technical Conference, pp.354--357, 2007.
4. X. Wang, M. Tehranipoor and J. Plusquellic. Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions. IEEE International Workshop on Hardware-Oriented Security and Trust(HOST'08), pp. 15--19, 2008.
5. Z.X. Zheng, L. Han, Y. Li and X.C. Zou. "The Implementation and Analysis of a Trojan Circuit in IC Chips". Microelectronics and computer, vol.29, no.10, pp.78--80, 2012.