A. Rostami, F. Koushanfar, J. Rajendran, and R. Karri, Hardware security: Threat models and metrics, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp.819-823, 2013.
DOI : 10.1109/ICCAD.2013.6691207

B. Colombier and L. Bossuet, Survey of hardware protection of design data for integrated circuits and intellectual properties, IET Computers & Digital Techniques, vol.8, issue.6, p.274, 2014.
DOI : 10.1049/iet-cdt.2014.0028

URL : https://hal.archives-ouvertes.fr/ujm-01180551

H. Ke, J. M. Carulli, and Y. Makris, Counterfeit electronics: A rising threat in the semiconductor manufacturing industry, Proceedings of the IEEE International Test Conference, pp.1-4, 2013.

C. Gorman, Counterfeit chips on the rise, IEEE Spectrum, vol.49, issue.6, 2012.
DOI : 10.1109/MSPEC.2012.6203952

M. Pecht and S. Tiku, Bogus! Electronic manufacturing and consumers confront a rising tide of counterfeit electronics, IEEE Spectrum, 2006.

L. Bossuet and D. Hely, SALWARE: Salutary Hardware to design Trusted IC, Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00961641

B. Legal and L. Bossuet, Automatic low-cost IP watermarking technique based on output mark insertions, Design Automation for Embedded Systems, vol.17, issue.5, pp.71-92, 2012.
DOI : 10.1007/s10617-012-9085-y

C. Marchand, L. Bossuet, and E. Jung, IP watermark verification based on power consumption analysis, 2014 27th IEEE International System-on-Chip Conference (SOCC), pp.330-335, 2014.
DOI : 10.1109/SOCC.2014.6948949

URL : https://hal.archives-ouvertes.fr/ujm-01063085

. Myth, Fact or Busted? A Security Evaluation of Physically Unclonalble Functions Cast in Silicon, Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, Spinger, Lecture Note on Computer Science, pp.283-301, 2012.

L. Bossuet, P. Bayon, and V. Fischer, Contactless transmission of intellectual property data to protect FPGA designs, 2015 IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC), pp.19-24, 2015.
DOI : 10.1109/VLSI-SoC.2015.7314385

URL : https://hal.archives-ouvertes.fr/hal-01218722

R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor, Trustworthy Hardware: Identifying and Classifying Hardware Trojans, Computer, vol.43, issue.10, pp.39-46, 2010.
DOI : 10.1109/MC.2010.299

M. Tehranipoor and F. Koushanfar, A Survey of Hardware Trojan Taxonomy and Detection, IEEE Design & Test of Computers, vol.27, issue.1, pp.10-25, 2010.
DOI : 10.1109/MDT.2010.7

S. Narasimhan, S. Bhunia, and R. S. Chakraborty, Hardware IP Protection During Evaluation Using Embedded Sequential Trojan, IEEE Design & Test of Computers, vol.29, issue.3, pp.70-79, 2012.
DOI : 10.1109/MDT.2012.2205997

P. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, Proceedings of the 19th Annual International Cryptology Conference, pp.388-397, 1999.
DOI : 10.1007/3-540-48405-1_25

N. Kamoun, L. Bossuet, and A. Gazel, Experimental implementation of 2ODPA attacks on AES design with flash-based FPGA technology, 2010 International Conference on Microelectronics, pp.407-410, 2010.
DOI : 10.1109/ICM.2010.5696173

URL : https://hal.archives-ouvertes.fr/ujm-00552196

C. Marsh, T. Kean, and D. Mclaren, Protecting designs with a passive thermal tag, 2008 15th IEEE International Conference on Electronics, Circuits and Systems, pp.218-221, 2008.
DOI : 10.1109/ICECS.2008.4674830

D. Ziener and J. Teich, Power Signature Watermarking of IP Cores for FPGAs, Journal of Signal Processing Systems, vol.51, issue.1, pp.123-136, 2008.
DOI : 10.1007/s11265-007-0136-8

G. T. Becker, M. Kasper, A. Moradi, and C. Paar, Side-channel based watermarks for integrated circuits, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.30-35, 2010.
DOI : 10.1109/HST.2010.5513117

S. Kerckhof, F. Durvaux, F. X. Standaert, and B. Gérard, Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.7-12, 2013.
DOI : 10.1109/HST.2013.6581557

L. Bossuet, M. Grand, L. Gaspar, V. Fischer, and G. Gogniat, Architectures of flexible symmetric key crypto engines???a survey, ACM Computing Surveys, vol.45, issue.4, 2013.
DOI : 10.1145/2501654.2501655

URL : https://hal.archives-ouvertes.fr/hal-00765634

L. Lin, M. Kasper, T. Güneysu, C. Paar, and W. Burleson, Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering, Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, pp.382-395, 2009.
DOI : 10.1007/978-3-642-04138-9_27

S. Kutzner, A. Poschmann, and M. Stöttinger, TROJANUS: An ultra-lightweight side-channel leakage generator for FPGAs, 2013 International Conference on Field-Programmable Technology (FPT), pp.160-167, 2013.
DOI : 10.1109/FPT.2013.6718347

L. Gaspar, V. Fischer, F. Bernard, L. Bossuet, and P. Cotret, HCrypt: A Novel Reconfigurable Crypto-processor with Secured Key Management, the Proceedings of the International Conference on ReConFigurable Computing and FPGAs, pp.280-285, 2010.
URL : https://hal.archives-ouvertes.fr/ujm-00552139

J. F. Gallais, J. Großschädl, N. Hanley, M. Kasper, M. Medwed et al., Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software, Proceedings of the Second International Conference on Trusted Systems, pp.253-270, 2010.
DOI : 10.1109/SP.2010.19

D. Du, S. Narasimhan, R. S. Chakraborty, and S. Bhunia, Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection, Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, CHES 2010, pp.173-187, 2010.
DOI : 10.1007/978-3-642-15031-9_12

S. Narasimhan, D. Dongdong, R. S. Chakraborty, S. Paul, F. G. Wolff et al., Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis, IEEE Transactions on Computers, vol.62, issue.11, pp.2183-2195, 2013.
DOI : 10.1109/TC.2012.200

R. Rad, J. Plusquellic, and M. Tehranipoor, A Sensitivity Analysis of Power Signal Methods for Detecting Hardware Trojans Under Real Process and Environmental Conditions, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, pp.1735-1744, 2010.
DOI : 10.1109/TVLSI.2009.2029117

P. Bayon, L. Bossuet, A. Aubert, V. Fischer, F. Poucheret et al., Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator, Proceedings on International Workshop on Constructive Side-Channel Analysis and Secure Design, pp.151-166, 2012.
DOI : 10.1007/978-3-642-29912-4_12

URL : https://hal.archives-ouvertes.fr/lirmm-00761824

P. Bayon, L. Bossuet, A. Aubert, and V. Fischer, EM leakage analysis on True Random Number Generator: Frequency and localization retrieval method, Proceedings of the Asia Pacific International Symposium and Exhibition on Electromagnetic Compatibility, 2013.

R. Torrance and D. James, The state-of-the-art in semiconductor reverse engineering, Proceedings of the 48th Design Automation Conference on, DAC '11, pp.333-338, 2011.
DOI : 10.1145/2024724.2024805

P. Subramanyan, N. Tsiskaridze, W. Li, A. Gascon, W. Tan et al., Reverse Engineering Digital Circuits Using Structural and Functional Analyses, IEEE Transactions on Emerging Topics in Computing, 2013.
DOI : 10.1109/TETC.2013.2294918

D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar, Trojan Detection using IC Fingerprinting, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.296-310, 2007.
DOI : 10.1109/SP.2007.36

Y. Jin and Y. Makris, Hardware Trojan Detection using Path Delay Fingerprint, IEEE International Workshop on Hardware-Oriented Security and Trust, pp.51-57, 2008.

R. Tektronix and . Series, Available online: http://www.tek.com/sites/tek.com/files/media/media/resources/RSA5000- Series-Spectrum-Analyzers-Datasheet-37W2627414_1, Spectrum Analyzers Datasheet, 2015.

M. Kasper, A. Moradi, G. T. Becker, O. Mischke, T. Güneysu et al., Side channels as building blocks, Journal of Cryptographic Engineering, vol.51, issue.1, pp.143-159, 2012.
DOI : 10.1007/s13389-012-0040-4

M. Tehranipoor, U. Guin, and D. Forte, Counterfeit Integrated Circuits -Detection and Avoidance, 2015.

L. Bossuet, X. T. Ngo, Z. Cherif, and V. Fischer, A PUF Based on a Transient Effect Ring Oscillator and Insensitive to Locking Phenomenon, IEEE Transactions on Emerging Topics in Computing, vol.2, issue.1, pp.30-36, 2014.
DOI : 10.1109/TETC.2013.2287182

URL : https://hal.archives-ouvertes.fr/hal-00961503

N. Kamoun, L. Bossuet, and A. Ghazel, Correlated power noise generator as a low cost DPA countermeasures to secure hardware AES cipher, 2009 3rd International Conference on Signals, Circuits and Systems (SCS), pp.1-6, 2009.
DOI : 10.1109/ICSCS.2009.5412604