1. A. Adamov etal 2009. The problem of Hardware Trojans detection in System-on-Chip. In CADSM. 178--179. A. Adamov et al. 2009. The problem of Hardware Trojans detection in System-on-Chip. In CADSM. 178--179.
2. A. Ahmed etal 2018. Scalable hardware trojan activation by interleaving concrete simulation and symbolic execution. In ITC. 1--10. A. Ahmed et al. 2018. Scalable hardware trojan activation by interleaving concrete simulation and symbolic execution. In ITC. 1--10.
3. A. Tyagi etal 2022. TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities. arXiv 2201.09941 (2022). A. Tyagi et al. 2022. TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities. arXiv 2201.09941 (2022).
4. G. Dessouky etal 2019. {HardFails}: Insights into {Software-Exploitable} Hardware Bugs. In USENIX Security. 213--230. G. Dessouky et al. 2019. {HardFails}: Insights into {Software-Exploitable} Hardware Bugs. In USENIX Security. 213--230.
5. H. Al Shebli etal 2018. A study on penetration testing process and tools. In LISAT. 1--7. H. Al Shebli et al. 2018. A study on penetration testing process and tools. In LISAT. 1--7.