X. Wang, M. Tehranipoor, and J. Plusquellic, Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions, IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'08), pp.15-19, 2008.

M. Tehranipoor and F. Koushanfar, A Survey of Hardware Trojan Taxonomy and Detection, IEEE Design & Test of Computers, vol.27, issue.1, pp.10-25, 2010.
DOI : 10.1109/MDT.2010.7

S. Bhunia, M. S. Hsiao, M. Banga, and S. Narasimhan, Hardware Trojan Attacks: Threat Analysis and Countermeasures, Proceedings of the IEEE, pp.1229-1247, 2014.
DOI : 10.1109/JPROC.2014.2334493

Y. Jin and Y. Makris, Proof carrying-based information flow tracking for data secrecy protection and hardware trust, 2012 IEEE 30th VLSI Test Symposium (VTS), pp.252-257, 2012.
DOI : 10.1109/VTS.2012.6231062

X. Zhang and M. Tehranipoor, Case study: Detecting hardware Trojans in third-party digital IP cores, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, pp.67-70, 2011.
DOI : 10.1109/HST.2011.5954998

D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar, Trojan Detection using IC Fingerprinting, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.296-310, 2007.
DOI : 10.1109/SP.2007.36

X. Wang, H. Salmani, M. Tehranipoor, and J. Plusquellic, Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis, 2008 IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems, pp.87-95, 2008.
DOI : 10.1109/DFT.2008.61

Y. Jin and Y. Makris, Hardware Trojan Detection Using Path Delay Fingerprint, International Workshop on Hardware-Oriented Security and Trust (HOST'08), pp.51-57, 2008.

F. Wolf, C. Papachristou, S. Bhunia, and R. S. Chakraborty, Towards trojan-free trusted ICs, Proceedings of the conference on Design, automation and test in Europe, DATE '08, pp.1362-1365, 2008.
DOI : 10.1145/1403375.1403703

R. S. Chakraborty, F. Wolff, S. Paul, C. Papachristou, and S. Bhunia, MERO: A Statistical Approach for Hardware Trojan Detection, International Conference on Cryptographic Hardware and Embedded Systems (CHES'09), pp.396-410, 2009.
DOI : 10.1007/978-3-642-04138-9_28

S. Dupuis, P. Ba, M. Flottes, G. D. Natale, B. Rouzeyre et al., New Testing Procedure for Finding Insertion Sites of Stealthy Hardware Trojans Regaining Trust in VLSI Design: Design-for-Trust Techniques, Design Automation & Test in Europe (DATE'15) Proceedings of the IEEE, pp.776-781, 2014.

H. Salmani, M. Hassan, and J. Plusquellic, New design strategy for improving hardware Trojan detection and reducing Trojan activation time, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, pp.66-73, 2009.
DOI : 10.1109/HST.2009.5224968

S. Dupuis, P. Ba, G. Di-natale, M. Flottes, and B. Rouzeyre, A novel hardware logic encryption technique for thwarting illegal overproduction and Hardware Trojans, 2014 IEEE 20th International On-Line Testing Symposium (IOLTS), pp.49-54, 2014.
DOI : 10.1109/IOLTS.2014.6873671

URL : https://hal.archives-ouvertes.fr/lirmm-01025275

M. Hicks, M. Finnicum, S. T. King, M. M. Martin, and J. M. Smith, Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically, 2010 IEEE Symposium on Security and Privacy, pp.159-172, 2010.
DOI : 10.1109/SP.2010.18

J. Zhang, F. Yuan, L. Wei, Z. Sun, and Q. Xu, VeriTrust, Proceedings of the 50th Annual Design Automation Conference on, DAC '13, 2013.
DOI : 10.1145/2463209.2488808

A. Waksman, M. Suozzo, and S. Sethumadhavan, FANCI, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.697-708, 2013.
DOI : 10.1145/2508859.2516654

B. Cakir and S. Malik, Hardware Trojan detection for Gate-level ICs using signal correlation Based Clustering, Design, Automation & Test in Europe (DATE'15), pp.471-476, 2015.

C. Sturton, M. Hicks, D. Wagner, and S. T. King, Defeating UCI: Building Stealthy and Malicious Hardware, 2011 IEEE Symposium on Security and Privacy, pp.64-77, 2011.
DOI : 10.1109/SP.2011.32

J. Huang, H. Sun, J. Han, H. Deng, Y. Sun et al., SHRINK, Proceedings of the 19th ACM international conference on Information and knowledge management, CIKM '10, pp.121-132, 2010.
DOI : 10.1145/1871437.1871469

M. Ankerst, M. M. Breunig, H. Kriegel, and J. Sander, Ordering Point To Identify the Clustering Structure, International Conference on Management of Data, pp.49-60, 1999.

J. Wang, Classical multidimensional scaling In Geometric Structure of High-Dimensional Data and Dimensionality Reduction, pp.115-129, 2011.

M. M. Breunig, H. Kriegel, R. T. Ng, and J. Sander, OPTICS-OF: Identifying Local Outliers, European Conference in Principles of Data Mining and Knowledge Discovery, pp.262-270, 1999.
DOI : 10.1007/978-3-540-48247-5_28

H. Kriegel, P. Kroger, E. Schubert, and A. Zimek, Interpreting and Unifying Outlier Scores, SIAM International Conference on Data Mining, 2011.
DOI : 10.1137/1.9781611972818.2