D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar, Trojan Detection using IC Fingerprinting, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.296-310, 2007.
DOI : 10.1109/SP.2007.36

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.123.467

Y. Alkabani and F. Koushanfar, Consistency-based characterization for IC Trojan detection, Proceedings of the 2009 International Conference on Computer-Aided Design, ICCAD '09, pp.123-127, 2009.
DOI : 10.1145/1687399.1687426

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.476.2796

M. Banga and M. S. Hsiao, A Novel Sustained Vector Technique for the Detection of Hardware Trojans, 2009 22nd International Conference on VLSI Design, pp.327-332, 2009.
DOI : 10.1109/VLSI.Design.2009.22

A. Baumgarten, M. Steffen, M. Clausman, and J. Zambreno, A case study in hardware Trojan design and implementation, International Journal of Information Security, vol.10, issue.1, pp.1-14, 2011.
DOI : 10.1007/s10207-010-0115-0

G. T. Becker, A. Lakshminarasimhan, L. Lin, S. Srivathsa, V. B. Suresh et al., Implementing hardware Trojans: Experiences from a hardware Trojan challenge, 2011 IEEE 29th International Conference on Computer Design (ICCD), pp.301-304, 2011.
DOI : 10.1109/ICCD.2011.6081414

R. S. Chakraborty and S. Bhunia, Security against hardware Trojan through a novel application of design obfuscation, Proceedings of the 2009 International Conference on Computer-Aided Design, ICCAD '09, pp.113-116, 2009.
DOI : 10.1145/1687399.1687424

R. S. Chakraborty, S. Paul, and S. , On-demand transparency for improving hardware Trojan detectability, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp.48-50, 2008.
DOI : 10.1109/HST.2008.4559048

R. S. Chakraborty, F. Wolff, S. Paul, C. Papachristou, and S. Bhunia, MERO: A Statistical Approach for Hardware Trojan Detection, International Conference on Cryptographic Hardware and Embedded Systems (CHES'09), pp.396-410, 2009.
DOI : 10.1007/978-3-642-04138-9_28

D. Du, S. Narasimhan, R. S. Chakraborty, and S. Bhunia, Selfreferencing : A Scalable Side-Channel, International Conference on Cryptographic Hardware and Embedded Systems (CHES'10), pp.173-187, 2010.

Y. Jin and N. Kupp, Experiences in Hardware Trojan design and implementation, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, pp.50-57, 2009.
DOI : 10.1109/HST.2009.5224971

Y. Jin and Y. Makris, Hardware Trojan Detection Using Path Delay Fingerprint, IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'08), pp.51-57, 2008.

Y. Jin and Y. Makris, Proof carrying-based information flow tracking for data secrecy protection and hardware trust, 2012 IEEE 30th VLSI Test Symposium (VTS), pp.252-257, 2012.
DOI : 10.1109/VTS.2012.6231062

M. Li, A. Davoodi, and M. Tehranipoor, A Sensor-Assisted Self- Authentication Framework for Hardware Trojan Detection, Design, Automation and Test in Europe (DATE'12), 2012.

L. Lin, M. Kasper, T. Güneysu, C. Paar, and W. Burleson, Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering, International Conference on Cryptographic Hardware and Embedded Systems (CHES'09), pp.382-395, 2009.
DOI : 10.1007/978-3-642-04138-9_27

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.182.904

M. Potkonjak, A. Nahapetian, M. Nelson, and T. Massey, Hardware Trojan horse detection using gate-level characterization, Proceedings of the 46th Annual Design Automation Conference on ZZZ, DAC '09, pp.688-693, 2009.
DOI : 10.1145/1629911.1630091

R. M. Rad, X. Wang, M. Tehranipoor, and J. Plusquellic, Power supply signal calibration techniques for improving detection resolution to hardware Trojans, 2008 IEEE/ACM International Conference on Computer-Aided Design, pp.632-639, 2008.
DOI : 10.1109/ICCAD.2008.4681643

H. Salmani, M. Tehranipoor, and J. Plusquellic, A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits, 2010 IEEE International Workshop on Information Forensics and Security, pp.1-6, 2010.
DOI : 10.1109/WIFS.2010.5711438

H. Salmani, M. Tehranipoor, and J. Plusquellic, A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, pp.112-125, 2012.
DOI : 10.1109/TVLSI.2010.2093547

M. Tehranipoor and F. Koushanfar, A Survey of Hardware Trojan Taxonomy and Detection, IEEE Design & Test of Computers, vol.27, issue.1, pp.10-25, 2010.
DOI : 10.1109/MDT.2010.7

X. Wang, M. Tehranipoor, and J. Plusquellic, Detecting malicious inclusions in secure hardware: Challenges and solutions, IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'08), pp.15-19, 2008.

F. Wolff, C. Papachristou, S. Bhunia, and R. S. Chakraborty, Towards trojan-free trusted ICs, Proceedings of the conference on Design, automation and test in Europe, DATE '08, pp.1362-1365, 2008.
DOI : 10.1145/1403375.1403703