A Survey Of Hardware Trojan Taxonomy And Detection·2010·DOIEngineering and TechnologyCommunication and Signal ProcessingVLSI Design and TechnologiesMicroarchitectural VulnerabilitiesAbstractCitations1,021Year2010PageRank3.9 / 10Relative influence (log-scaled)