1. Hardware Trojans
2. A. Ahmed , F. Farahmandi , Y. Iskander , and P. Mishra , " Scalable hardware trojan activation by interleaving concrete simulation and symbolic execution," in 2018 IEEE International Test Conference (ITC) , 2018 . A. Ahmed, F. Farahmandi, Y. Iskander, and P. Mishra, "Scalable hardware trojan activation by interleaving concrete simulation and symbolic execution," in 2018 IEEE International Test Conference (ITC), 2018.
3. A. Vafaei , N. Hooten , M. Tehranipoor , and F. Farahmandi , " Symba: Symbolic execution at c-level for hardware trojan activation," in 2021 IEEE International Test Conference (ITC) , 2021 , pp. 223 -- 232 . A. Vafaei, N. Hooten, M. Tehranipoor, and F. Farahmandi, "Symba: Symbolic execution at c-level for hardware trojan activation," in 2021 IEEE International Test Conference (ITC), 2021, pp. 223--232.
4. J. Zhang and Q. Xu , " On hardware trojan design and implementation at register-transfer level," in 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) , 2013 , pp. 107 -- 112 . J. Zhang and Q. Xu, "On hardware trojan design and implementation at register-transfer level," in 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2013, pp. 107--112.
5. J. Rajendran , V. Vedula , and R. Karri , " Formal security verification of third party intellectual property cores for information leakage," in International Conference on Vlsi Design & International Conference on Embedded Systems , 2016 . J. Rajendran, V. Vedula, and R. Karri, "Formal security verification of third party intellectual property cores for information leakage," in International Conference on Vlsi Design & International Conference on Embedded Systems, 2016.