2S. Adee, The hunt for the kill switch[J]. IEEE Spectrum, 2008, 45(5): 34, 39.
3S. Wei, S. Meguerdichian, and M. Potkonjak. Gate-Level Characterization: Foundations and Hardware Security Applications [C]. Design Automation Conference, 2010.
4Y. M. Alkabani, and F. Koushanfar, Active hardware metering for intellectual property protection and security [C]. USENIX Security Symposium, 2007. 1-16.
5N. Beckmann, M. Potkonjak, Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions [C]. Infornaation Hiding Conference, 2009. 206-220.
6B, Gassend, D. Clarke, M. van Dijk, and S. Devadas, Silicon physical random functions.[C]. ACM Conference on Computer and Communications Security, 2002. 148, 160.
7R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor, Roadmap for Trusted Hardware - Part I: Hardware Trojan Taxonomy and Design [J]. IEEE Computer Magazine, 2010.
8F. Koushanfar, A. Mirhoseini, and Y. Alkabani, A Unified Submodular Framework for Multimodal IC Trojan Detection [C]. Information Hiding Conference, 2010.
9M. Majzoobi, A. Elnably, and F. Koushanfar, FPGA Time-bounded Unclonable Authentication [C]. Information Hiding Conference, 2010.
10R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, Physical One- Way Functions [J]. Science 297, 2002, 2026-2030.