1. Parametric counterfeit IC detection via Support Vector Machines
2. Post-deployment trust evaluation in wireless cryptographic ICs;jin;Design Automation & Test in Europe Conference & Exhibition,0
3. Practical secure hardware design for embedded systems;grand;Proceedings of the 2004 Embedded Systems Conference,2004
4. Early detection of system-level anomalous behavior using hardware performance counters;woo;2018 Design Automation & Test in Europe Conference & Exhibition (DATE),0
5. FIPS 140-3: Security Requirements for Cryptographic Modules;National Institute of Standards and Technology,2019