15. B. Cha and S. K. Gupta. 2014. A resizing method to minimize effects of hardware Trojans. In Proceedings of the 2014 IEEE 23rd Asian Test Symposium (ATS’14). 192–199. DOkhttp:// dx.doi.org/10.1109/ATS.2014.44.
16. R. S. Chakraborty and S. Bhunia. 2009. Security against hardware Trojan through a novel application of design obfuscation. In Proceedings of the IEEE/АСМ International Conference on Computer-Aided Design — Digest of Technical Papers, 2009 (ICCAD’09). 113–116.
17. R. S. Chakraborty, F. Wolff, S. Paul, C. Papachristou, and S. Bhunia. 2009. MERO: A statistical approach for hardware Trojan detection. In Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems (CHES’09). Springer-Verlag, Berlin, 396–410. DOLhttp:// dx.doi.org/ 10.1007/978-3-642-04138-9 28.
18. A. Chidley. 2014. Use COTS parts to cut costs in military and aerospace systems. Electronic Design Magazine Retrieved from http://electronicdesign.com/components/use-cots-parts-cut-costs-military-and-aerospace-systems
.19. Cisco. 2005. Defense agencies meet readiness challenges with commercial off the shelf (COTS)-based systems. Retrieved from http://www.cisco.eom/c/dam/en_us/solutions/industries/docs/
gov/space_COTS_v2.pdf.20. R. P. Cocchi, J. P. Baukus, L. W. Chow, and B. J. Wang. 2014. Circuit camouflage integration for hardware IP protection. In Proceedings of the 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC’14). 1–5. DOI:http://dx.doi
. org/10.1145/2593069.2602554.21. DIGITIMES. 2012. Trends in the global IC design service market. Retrieved from http://www.digitimes.com/
news/ a20120313RS400.html?chid=2.22. J. Dubeuf, D. Hely, and R. Karri. 2013. Run-time detection of hardware Trojans: The processor protection unit. In Proceedings of the 2013 18th IEEE European Test Symposium (ETS’ 13). 1–6. DOI:http://dx.doi.org/10.1109/ETS.2013.6569378
.23. Dunbar and G. Qu. 2014. Designing trusted embedded systems from finite state machines. ACM Transactions on Embedded Computing Systems 13, 5s, Article 153 (Oct. 2014), 20 pages. DOI:http://dx.doi.org/10.1145/2638555
.24. Forte, Chongxi Bao, and A. Srivastava. 2013. Temperature tracking: An innovative run-time approach for hardware Trojan detection. In Proceedings of the 2013 IEEE/АСМ International Conference on Computer-Aided Design (ICCAD’13). 532–539. DOI:http://dx.doi
.org/10.11094CCAD.2O13.6691167.25. S. R. Hasan, S. F. Mossa, O. S. A. Elkeelany, and F. Awwad. 2015. Tenacious hardware Trojans due to high temperature in middle tiers of 3-D ICs. In Proceedings of the 2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS’15). 1^1. DOI:http://dx.doi.org/10.1109/MWSCAS
. 2015.7282148.26. W. Herr. 2015. Keynote talk: Is it safe? In Proceedings of the 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST’15).
27. M. Hicks, M. Finnicum, S. T. King, M. Martin, and J. M. Smith. 2010. Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically. In Proceedings of the 2010 IEEE Symposium on Security and Privacy (SP’10). 159–172. DOI:http://dx.doi.org/10.1109/SP.2010.18
.28. B. Hill, R. Karmazin, С. T. O. Otero, J. Tse, and R. Manohar.
2013. A split-foundry asynchronous FPGA. In Proceedings of the 2013 IEEE Custom Integrated Circuits Conference (CICC’13). 1^1. DOI:http://dx.doi.org/10.1109/CICC
. 2013. 6658536.29. IARPA. 2011. Trusted integrated circuits (TIC) program announcement. Retrieved from http://www.fbo.gov
.30. F. Imeson, A. Emtenan, S. Garg, and M. V. Tripunitara. 2013. Securing computer hardware using 3D integrated circuit (IC) technology and split manufacturing for obfuscation. In Proceedings of the 22ndUSENIX Conference on Security (SEC’13). USENIX Association, Berkeley, CA, 495–510.
31. M. Jagasivamani, P. Gadfort, M. Sika, M. Bajura, and M. Fritze.
2014. Split-fabrication obfuscation: Metrics and techniques. In Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’14). 7-12. DOI:http://dx.doi.org/10.1109/HST.2014.6855560
.32. Y. Jin and Y. Makris. 2008. Hardware Trojan detection using path delay fingerprint. In Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008 (HOST’08). 51–57. DOI:http://dx.doi.org/10.1109/
HST.2008.4559049.