C. Gorman, Counterfeit chips on the rise, IEEE Spectrum, vol.49, issue.6, 2012.
DOI : 10.1109/MSPEC.2012.6203952

M. Pecht and S. Tiku, Bogus! Electronic manufacturing and consumers confront a rising tide of counterfeit electronics, IEEE Spectrum, 2006.

S. Narasimhan, S. Bhunia, and R. S. Chakraborty, Hardware IP Protection During Evaluation Using Embedded Sequential Trojan, IEEE Design & Test of Computers, vol.29, issue.3, p.7079, 2012.
DOI : 10.1109/MDT.2012.2205997

R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor, Trustworthy Hardware: Identifying and Classifying Hardware Trojans, Computer, vol.43, issue.10, pp.39-46, 2010.
DOI : 10.1109/MC.2010.299

M. Tehranipoor and F. Koushanfar, A Survey of Hardware Trojan Taxonomy and Detection, Design & Test of Computers IEEE, vol.27, issue.1, p.1025, 2010.

B. Legal and L. Bossuet, Automatic low-cost IP watermarking technique based on output mark insertions, Design Automation for Embedded Systems, vol.17, issue.5, pp.71-92, 2012.
DOI : 10.1007/s10617-012-9085-y

S. Skorobogatov and C. Woods, Breakthrough Silicon Scanning Discovers Backdoor in Military Chip, Cryptographic Hardware and Embedded Systems, CHES 2012, pp.23-40, 2012.
DOI : 10.1007/978-3-642-33027-8_2

C. Marsh, T. Kean, and D. Mclaren, Protecting designs with a passive thermal tag, 2008 15th IEEE International Conference on Electronics, Circuits and Systems, p.218, 2008.
DOI : 10.1109/ICECS.2008.4674830

G. T. Becker, M. Kasper, A. Moradi, and C. Paar, Side-channel based watermarks for integrated circuits, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2010.
DOI : 10.1109/HST.2010.5513117