Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions, IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'08), pp.15-19, 2008. ,
A Survey of Hardware Trojan Taxonomy and Detection, IEEE Design & Test of Computer, pp.10-25, 2010. ,
Hardware Trojan Attacks: Threat Analysis and Countermeasures, Proceedings of the IEEE, pp.1229-1247, 2014. ,
DOI : 10.1109/JPROC.2014.2334493
Regaining Trust in VLSI Design: Design-for-Trust Techniques, Proceedings of the IEEE, pp.1266-1282, 2014. ,
DOI : 10.1109/JPROC.2014.2332154
Towards a hardware Trojan detection methodology, 2014 3rd Mediterranean Conference on Embedded Computing (MECO), pp.18-23, 2014. ,
DOI : 10.1109/MECO.2014.6862687
Trojan Detection using IC Fingerprinting, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.296-310, 2007. ,
DOI : 10.1109/SP.2007.36
Hardware Trojan Detection Using Path Delay Fingerprint, IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'08), pp.51-57, 2008. ,
Towards trojan-free trusted ICs, Proceedings of the conference on Design, automation and test in Europe, DATE '08, pp.1362-1365, 2008. ,
DOI : 10.1145/1403375.1403703
MERO: A Statistical Approach for Hardware Trojan Detection, International Conference on Cryptographic Hardware and Embedded Systems (CHES'09), pp.396-410, 2009. ,
DOI : 10.1007/978-3-642-04138-9_28
Hardware Trojan Horses in Cryptographic IP Cores, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.15-29, 2013. ,
DOI : 10.1109/FDTC.2013.15
URL : https://hal.archives-ouvertes.fr/hal-00855146
A Novel Sustained Vector Technique for the Detection of Hardware Trojans, 2009 22nd International Conference on VLSI Design, pp.327-332, 2009. ,
DOI : 10.1109/VLSI.Design.2009.22
A region based approach for the identification of hardware Trojans, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp.40-47, 2008. ,
DOI : 10.1109/HST.2008.4559047
Identification f Hardware Trojans triggering signals, First Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE'13), 2013. [14] Synopsys Tetramax ,