M. Tehranipoor and F. Koushanfar, A Survey of Hardware Trojan Taxonomy and Detection, IEEE Design & Test, vol.27, issue.1, pp.10-25, 2010.
DOI : 10.1109/MDT.2009.159

K. Xiao and M. Tehranipoor, BISA: Built-in self-authentication for preventing hardware Trojan insertion, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.45-50, 2013.
DOI : 10.1109/HST.2013.6581564

S. M. Shekarian and M. S. Zamani, A Trust-Driven Placement Approach: A New Perspective on Design for Hardware Trust, Journal of Circuits, Systems and Computers, vol.24, issue.08, p.1550115, 2015.
DOI : 10.1142/S0218126615501157

U. Guin, K. Huang, D. Dimase, J. M. Carulli, M. Tehranipoor et al., Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain, Proc. IEEE, pp.1207-1228, 2014.
DOI : 10.1109/JPROC.2014.2332291

F. Courbon, P. Loubet-moundi, J. J. Fournier, and A. Tria, A High Efficiency Hardware Trojan Detection Technique Based on Fast SEM Imaging, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015, pp.788-793, 2015.
DOI : 10.7873/DATE.2015.1104

D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar, Trojan Detection using IC Fingerprinting, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.296-310, 2007.
DOI : 10.1109/SP.2007.36

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Li and J. Lach, At-speed delay characterization for ic authentication and Trojan horse detection, Proc. HOST, pp.8-14, 2008.

M. Abramovici and P. Bradley, Integrated circuit security, Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW '09, 2009.
DOI : 10.1145/1558607.1558671

R. S. Chakraborty, F. Wolff, S. Paul, C. Papachristou, and S. Bhunia, MERO: A Statistical Approach for Hardware Trojan Detection, Cryptographic Hardware and Embedded Systems?CHES, pp.396-410, 2009.
DOI : 10.1007/978-3-642-04138-9_28

S. Narasimhan, Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.13-18, 2010.
DOI : 10.1109/HST.2010.5513122

K. Bowman, Dynamic variation monitor for measuring the impact of voltage droops on microprocessor clock frequency, IEEE Custom Integrated Circuits Conference 2010, pp.1-4, 2010.
DOI : 10.1109/CICC.2010.5617415

C. Lamech, R. M. Rad, M. Tehranipoor, and J. Plusquellic, An Experimental Analysis of Power and Delay Signal-to-Noise Requirements for Detecting Trojans and Methods for Achieving the Required Detection Sensitivities, IEEE Transactions on Information Forensics and Security, vol.6, issue.3, pp.1170-1179, 2011.
DOI : 10.1109/TIFS.2011.2136339

X. Zhang and M. Tehranipoor, Ron: An on-chip ring oscillator network for hardware Trojan detection, Proc. DATE, pp.1-6, 2011.

A. Ferraiuolo, X. Zhang, and M. Tehranipoor, Experimental analysis of a ring oscillator network for hardware trojan detection in a 90nm ASIC, Proceedings of the International Conference on Computer-Aided Design, ICCAD '12, pp.37-42, 2012.
DOI : 10.1145/2429384.2429392

S. Chang and . Chen, Cluster-based distributed active current timer for hardware Trojan detection, Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), pp.1010-1013, 2013.

O. Soll, T. Korak, M. Muehlberghuber, and M. Hutter, EM-based detection of hardware trojans on FPGAs, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.84-87, 2014.
DOI : 10.1109/HST.2014.6855574

J. Balasch, B. Gierlichs, and I. Verbauwhede, Electromagnetic circuit fingerprints for Hardware Trojan detection, 2015 IEEE International Symposium on Electromagnetic Compatibility (EMC), pp.246-251, 2015.
DOI : 10.1109/ISEMC.2015.7256167

N. , X. Thuy, N. Zakaria, S. Bhasin, G. Sylvain et al., Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis, J. Cryptogr. Eng, vol.6, pp.239-247, 2016.

C. Liu and Y. Chang, Power/Ground Network and Floorplan Cosynthesis for Fast Design Convergence, Proc. ISPD, pp.86-93, 2006.
DOI : 10.1109/TCAD.2007.892336

URL : http://cc.ee.ntu.edu.tw/~ywchang/Papers/tcad07-pgnetwork.pdf

M. Development and K. Spartan-3e-1600e-edition-user-guide, Available: http://www.digilentinc.com/Data/Products/ S3E1600/ug257.pdf [22] Federal Information Processing Standards Publication 197 Specification for the Advanced Encryption Standard (AES), 2001.

A. Keshavarzi, Measurements and modeling of intrinsic fluctuations in MOSFET threshold voltage, Proceedings of the 2005 international symposium on Low power electronics and design , ISLPED '05, pp.26-29, 2005.
DOI : 10.1145/1077603.1077611

A. Bhavnagarwala, Fluctuation limits & amp; scaling opportunities for CMOS SRAM cells, IEEE InternationalElectron Devices Meeting, 2005. IEDM Technical Digest., pp.659-662, 2005.
DOI : 10.1109/IEDM.2005.1609437

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

F. Stellari, P. Song, and H. Ainspan, Functional block extraction for hardware security detection using time-integrated and time-resolved emission measurements, 2014 IEEE 32nd VLSI Test Symposium (VTS), pp.1-6, 2014.
DOI : 10.1109/VTS.2014.6818792