51. J. Rajendran, V. Vedula, and R. Karri. 2015. Detecting malicious modifications of data in third-party intellec- tual property cores. In Proceedings of the 52nd Annual Design Automation Conference (DAC’ 15). ACM, New York, NY, Article 112,6 pages. DOI: http:// dx.doi.org/10.1145/2744769.2744823.
52. J. Rajendran, H. Zhang, O. Sinanoglu, and R. Karri. 2013. High-level synthesis for security and trust. In Proceedings of the 2013 IEEE 19th International On-Line Testing Symposium (IOLTS’13). 232–233. DOI:http://dx.doi.org/10.1109/IOLTS
. 2013.6604087.53. A. Ramdas, S. M. Saeed, and O. Sinanoglu. 2014. Slack removal for enhanced reliability and trust. In Proceedings of the 2014 9th IEEE International Conference on Design Technology of Integrated Systems in Nanoscale Era (DTIS’14). 1–4. DOLhttp:// dx.doi.org/10.1109/DTIS.2014.6850660.
54. M. Rathmair, F. Schupfer, and C. Krieg. 2014. Applied formal methods for hardware Trojan detection. In Proceedings of the 2014 IEEE International Symposium on Circuits and Systems (ISCAS’14). 169–172. DOI:http://dx.doi.org/10.1109/
ISCAS.2014.6865092.55. T. Reece, D. B. Limbrick, and W. H. Robinson. 2011. Design comparison to identify malicious hard- ware in external intellectual property. In Proceedings of the 2011 IEEE 10th International Confer- ence on Trust, Security and Privacy in Computing and Communications (TrustCom’ll). 639–646. DOI:http://dx.doi
. org/10.1109/TrustCom.2011.82.56. M. Rostami, F. Koushanfar, J. Rajendran, and R. Karri. 2013. Hardware security: Threat models and metrics. In Proceedings of the International Conference on Computer-Aided Design (ICCAD’ 13). IEEE Press, Piscataway, NJ, 819–823.
57. J. A. Roy, F. Koushanfar, and I. L. Markov. 2008. EPIC: Ending piracy of integrated circuits. In De- sign, Automation and Test in Europe, 2008 (DATE’08). 1069–1074. DOI:http://dx.doi
. org/10.1109/DATE. 2008.4484823.58. H. Salmani and M. Tehranipoor. 2012. Layout-aware switching activity localization to enhance hardware Trojan detection. IEEE Transactions on Information Forensics and Security 7,1 (Feb. 2012), 76–87. DOI:http://dx.doi.org/10.1109/TIFS.2011.2164908
.59. H. Salmani and M. Tehranipoor. 2013. Analyzing circuit vulnerability to hardware Trojan insertion at the behavioral level. In Proceedings of the 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT’13). 190–195. DOI:http://dx.doi.org/10.1109/DFT
. 2013.6653605.60. H. Salmani, M. Tehranipoor, and R. Karri. 2013. On design vulnerability analysis and trust benchmarks development. In Proceedings of the 2013 IEEE 31st International Conference on Computer Design (ICCD’13). 471–474. DOI:http://dx.doi
. org/10.1109/ICCD.2013.6657085.61. H. Salmani, M. Tehranipoor, and J. Plusquellic. 2012. A novel technique for improving hardware Trojan detection and reducing Trojan activation time. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 20, 1 (Jan. 2012), 112–125. DOI:http://dx.doi.org/10.1109/TVLSI.2010.2093547
.62. 6Y. Shiyanovskii, F. Wolff, A. Rajendran, C. Papachristou, D. Weyer, and W. Clay. 2010. Process reliability based Trojans through NBTI and HCI effects. In Proceedings of the 2010 NASA/ ESA Conference on Adaptive Hardware and Systems (AHS’10). 215–222. DOI:http://dx.doi.org/10.1109/AHS.2010.5546257
.63. F. Stellari, Peilin Song, A. J. Weger, J. Culp, A. Herbert, and
D. Pfeiffer. 2014. Verification of untrusted chips using trusted layout and emission measurements. In Proceedings of the 2014 IEEE Interna- tional Symposium on Hardware-Oriented Security and Trust (HOST’14). 19–24. DOI: http://dx.doi.org/ 10.1109/ HST.2014.6855562.
64. Tehranipoor and C. Wang. 2012. Introduction to Hardware Security and Trust. Springer.
65. G. Tsoutsos and M. Maniatakos. 2014. Fabrication attacks: Zero-overhead malicious modifications enabling modem microprocessor privilege escalation. IEEE Transactions on Emerging Topics in Computing 2, 1 (March 2014), 81–93. DOI: http://dx.doi.org/l 0.1109/TETC.2013.2287186.
66. K. Vaidyanathan, В. P. Das, E. Sumbul, R. Liu, and L. Pileggi. 2014. Building trusted ICs using split fabrication. In Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’14). 1–6. DOI:http://dx.doi
. org/10.1109/HST.2014.6855559.67. J. Valamehr, T. Sherwood, R. Kastner, D. Marangoni-Simonsen, T. Huffmire, C. Irvine, and T. Levin. 2013. A 3-d split manufacturing approach to trustworthy system development. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 32, 4 (April 2013), 611–615. DOLhttp:// dx.doi.org/10.1109/TCAD.2012.2227257.