Fuzzing Hardware Like Software
Bomberman: Vetting Untrusted RTL Hardware for Ticking Timebomb Trojans
Integrated Circuit Portholes for Post-Fabrication Imaging of Untrusted ICs
Spoofing MEMS Accelerometers with Sound
Integrated Circuit Attack Surface (ICAS): Quantifying IC Layout Security
Targeted Tamper Evident Routing (T-TER) for Untrusted ICs