S. Abk-+-07]-dakshi-agrawal, D. Baktir, P. Karakoyunlu, B. Rohatgi, and . Sunar, Trojan Detection using IC Fingerprinting, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.296-310, 2007.

S. Adee, The Hunt For The Kill Switch, IEEE Spectrum, vol.45, issue.5, pp.34-39, 2008.

F. Lanza-di-scalea-arun and . Manohar, Wavelet aided multivariate outlier analysis to enhance defect contrast in thermal images, vol.7981, 2011.

P. Bayon, L. Bossuet, A. Aubert, V. Fischer, F. Poucheret et al., Contactless electromagnetic active attack on ring oscillator based true random number generator, Constructive Side-Channel Analysis and Secure Design, pp.151-166, 2012.
URL : https://hal.archives-ouvertes.fr/ujm-00699618

J. Bauer, O. Breitenstein, and J. Wagner, Lock-in thermography: A versatile tool for failure analysis of solar cells. Electronic Device Failure Analysis, vol.11, 2009.

C. Bao, D. Forte, and A. Srivastava, Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol.34, issue.10, pp.1577-1585, 2015.

M. Beaumont, B. Hopkins, and T. Newby, Hardware Trojans -Prevention, Detection, Countermeasures, p.50, 2011.

P. Ba, M. Palanichamy, S. Dupuis, M. Flottes, G. D. Natale et al., Hardware trojan prevention using layout-level design approach, 2015 European Conference on Circuit Theory and Design (EC-CTD), pp.1-4, 2015.
URL : https://hal.archives-ouvertes.fr/lirmm-01234072

O. Breitenstein and . Rakotoniaina, New developments in ir lockin thermography

S. Bhasin and F. Regazzoni, A survey on hardware trojan detection techniques, 2015 IEEE International Symposium on Circuits and Systems (ISCAS), pp.2021-2024, 2015.

R. Bhan, R. Saxena, C. R. Jalwania, and S. K. Lomash, Uncooled infrared microbolometer arrays and their characterisation techniques, Defence Science Journal, vol.59, p.580, 2009.

O. Breitenstein, W. Warta, and M. Langenkamp, Lock-in Thermography, Springer Series in Advanced Microelectronics, vol.10, issue.5, pp.149-175, 2010.

O. Breitenstein, W. Warta, and M. Langenkamp, Lock-in Thermography, Springer Series in Advanced Microelectronics, vol.10, issue.1, pp.1-6, 2010.

O. Breitenstein, W. Warta, and M. Langenkamp, Lock-in Thermography, Springer Series in Advanced Microelectronics, vol.10, issue.2, pp.7-59, 2010.

O. Breitenstein, W. Warta, and M. Langenkamp, Lock-in Thermography, Springer Series in Advanced Microelectronics, chapter, vol.10, pp.107-153, 2010.

V. Carlier and H. Chabanne, Emmanuelle Dottax, and Hervé Pelletier. Electromagnetic side channels of an fpga implementation of aes, IACR Cryptology ePrint Archive, p.145, 2004.

A. C. Chen, Overview of code division multiple access technology for wireless communications, IECON '98. Proceedings of the 24th Annual Conference of the IEEE Industrial Electronics Society (Cat. No.98CH36200), vol.1, pp.15-24, 1998.

S. Rajat-subhra-chakraborty, S. Narasimhan, and . Bhunia, Hardware Trojan: Threats and emerging solutions, IEEE International High Level Design Validation and Test Workshop, pp.166-171, 2009.

J. D. Chisum and Z. Popovic, Performance limitations and measurement analysis of a near-field microwave microscope for nondestructive and subsurface detection, IEEE Transactions on Microwave Theory and Techniques, vol.60, issue.8, pp.2605-2615, 2012.

X. Chen, G. Yuan, G. Xu, L. Liu, and X. Kuang, Advanced fault localization techniques in microelectronics failure analysis, 10th International Conference on Reliability, Maintainability and Safety (ICRMS), pp.5-9, 2014.

, Trust in integrated circuits (tic), pp.10-11, 2007.

F. De-beer, M. Witteman, B. Gedrojc, and Y. Sheng, Practical Electro-Magnetic Analysis, p.18, 2011.

A. Dehbaoui, J. Dutertre, B. Robisson, and A. Tria, Electromagnetic transient faults injection on a hardware and a software implementations of aes, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.7-15, 2012.
URL : https://hal.archives-ouvertes.fr/emse-00742639

L. Fengchao and Z. Bin, The linear coefficient of thermal expansion of silicon at room temperature, Powder Diffraction, vol.6, issue.3, pp.147-152, 1991.

D. Forte, C. Bao, and A. Srivastava, Temperature tracking: An innovative run-time approach for hardware Trojan detection, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp.532-539, 2013.

V. M. Glazov and A. S. Pashinkin, The thermophysical properties (heat capacity and thermal expansion) of single-crystal silicon. High Temperature, vol.39, pp.413-419, 2001.

, Application note: Characteristics and use of infrared detectors, 2011.

, Solid State Division Hamamatsu Photonics. Application note: Thermal detectors, 2011.

F. P. Incropera and D. P. Dewitt, Fundamentals of heat and mass transfer, 2002.

F. P. Incropera and D. P. Dewitt, Fundamentals of heat and mass transfer, 2002.

A. Irace, Infrared thermography application to functional and failure analysis of electron devices and circuits. Microelectronics Reliability, vol.52, 2012.

S. Jha and S. Kumar-jha, Randomization based probabilistic approach to detect trojan circuits, 11th IEEE High Assurance Systems Engineering Symposium, pp.117-124, 2008.

M. Kohin and N. Butler, Performance limits of uncooled vox microbolometer focal plane arrays, Proceedings of SPIE -The International Society for Optical Engineering, 2004.

P. L. Komarov, M. G. Burzo, and P. E. Raad, A thermoreflectance thermography system for measuring the transient surface temperature field of activated electronic devices, Twenty-Second Annual IEEE Semiconductor Thermal Measurement And Management Symposium, pp.199-203, 2006.

P. L. Komarov, M. G. Burzo, and P. E. Raad, A thermoreflectance thermography system for measuring the transient surface temperature field of activated electronic devices, Twenty-Second Annual IEEE Semiconductor Thermal Measurement And Management Symposium, pp.199-203, 2006.

R. J. Keyes, Optical and Infrared Detectors, 1977.

. V-lakshminarayanan, Failure analysis techniques for semiconductors and other devices. info/card 84, RF semiconductors, pp.34-46, 2001.

O. Lo, W. J. Buchanan, and D. Carson, Power analysis attacks on the aes-128 s-box using differential power analysis (dpa) and correlation power analysis (cpa), Journal of Cyber Security Technology, vol.1, issue.2, pp.88-107, 2017.

J. Longo, E. Mulder, D. Page, and M. Tunstall, Soc it to em: Electromagnetic side-channel attacks on a complex system-on-chip, Cryptographic Hardware and Embedded Systems -CHES 2015, pp.620-640, 2015.

M. Lecomte, Système embarque de mesure de la tension pour la détection de contrefaçons et de chevaux de Troie matériels, 2016.

M. Lacruche and P. Maurine, Electromagnetic activity vs. logical activity: Near field scans for reverse engineering, Smart Card Research and Advanced Applications, pp.140-155, 2019.
URL : https://hal.archives-ouvertes.fr/lirmm-01943151

W. Liu and B. Yang, Thermography techniques for integrated circuits and semiconductor devices, Sensor Review, vol.27, issue.4, pp.298-309, 2007.

A. Majumdar, Scanning thermal microscopy, Annual Review of Materials Science, vol.29, pp.505-585, 1999.

A. Majumdar, M. Lai, O. Chandrachood, Y. Nakabeppu, Z. Wu et al., Thermal imaging by atomic force microscopy using thermocouple cantilever probes, Review of Scientific Instruments, vol.66, pp.3584-3592, 1995.

A. Manohar and F. Scalea, Detection of defects in wind turbine composite blades using statistically enhanced lock-in thermography, Structural Health Monitoring, vol.12, p.2013

P. Maurine, K. Tobich, T. Ordas, and P. Liardet, Yet Another Fault Injection Technique : by Forward Body Biasing Injection, YACC'2012: Yet Another Conference on Cryptography, 2012.
URL : https://hal.archives-ouvertes.fr/lirmm-00762035

K. Abdullah-nazma-nowroz, F. Hu, S. Koushanfar, and . Reda, Novel Techniques for High-Sensitivity Hardware Trojan Detection Using Thermal and Power Maps, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol.33, issue.12, pp.1792-1805, 2014.

X. T. Ngo, Z. Najm, S. Bhasin, S. Guilley, and J. Danger, Method Taking into Account Process Dispersions to Detect Hardware Trojan Horse by Side-Channel, vol.17, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01240241

A. Nowroz, G. Woods, and S. Reda, Improved postsilicon power modeling using AC lock-in techniques, Design Automation Conference (DAC), pp.101-107, 2011.

, IEEE, 2011.

T. Ordas, M. Lisart, and E. Sicard,

L. Torres, Near-field mapping system to scan in time domain the magnetic emissions of integrated circuits, Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation, pp.229-236, 2009.
URL : https://hal.archives-ouvertes.fr/lirmm-00394395

G. Robert, R. Meyer-paul, and . Gray, Analysis and Design of Analog Integrated Circuits, 1993.

F. Poucheret, K. Tobich, M. Lisarty, L. Chusseauz, B. Robissonx et al., Local and direct em injection of power into cmos integrated circuits, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.100-104, 2011.

S. Reda, R. Cochran, and A. Nowroz, Improved Thermal Tracking for Processors Using Hard and Soft Sensor Allocation Techniques, IEEE Transactions on Computers, vol.60, issue.6, pp.841-851, 2011.

S. Reda, Thermal and power characterization of real computing devices, IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol.1, issue.2, pp.76-87, 2011.

J. M. Soden and R. E. Anderson, Ic failure analysis: Techniques and tools for quality and reliability improvement. Microelectronics Reliability, vol.35, pp.429-453, 1995.

. Ch, F. Schmidt, O. Altmann, and . Breitenstein, Application of lock-in thermography for failure analysis in integrated circuits using quantitative phase shift analysis, MicroTherm2011 -Microtechnology and Thermal Problems in Electronics, vol.177, pp.1261-1267, 2012.

C. Schmidt, F. Altmann, R. Schlangen, and H. Deslandes, Nondestructive defect depth determination at fully packaged and stacked die devices using lock-in thermography, 17th IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits, pp.1-5, 2010.

W. George, W. G. Snedecor, and . Cochran, Statistical methods iowa state university press, 1967.

B. Sopori and W. Chen, Jamal Madjdpour, and Nuggehalli Ravindra. Calculation of emissivity of si wafers, Journal of Electronic Materials, vol.28, pp.1385-1389, 1999.

B. Shakya, T. He, H. Salmani, and D. Forte, Benchmarking of hardware trojans and maliciously affected circuits, Journal of Hardware and Systems Security, vol.1, issue.1, pp.85-102, 2017.

A. Schlösser, D. Nedospasov, J. Krämer, S. Orlic, and J. Seifert, Simple photonic emission analysis of aes, Cryptographic Hardware and Embedded Systems -CHES 2012, pp.41-57, 2012.

D. Skvortsov, M. Ng, T. Lundquist, J. Liao, S. Kasapi et al., Laser voltage imaging: A new perspective of laser voltage probing, ISTFA, pp.5-13, 2010.

S. K. Selvaraja, E. Rosseel, L. Fernandez, M. Tabat, W. Bogaerts et al., Soi thickness uniformity improvement using corrective etching for silicon nano-photonic device, 8th IEEE International Conference on Group IV Photonics, pp.71-73, 2011.

J. Shinde and S. S. Salankar, Clock gating: A power optimizing technique for VLSI circuits, 2011 Annual IEEE India Conference, pp.1-4, 2011.

H. Salmani, M. Tehranipoor, and R. Karri, On design vulnerability analysis and trust benchmarks development, 2013 IEEE 31st International Conference on Computer Design (ICCD), pp.471-474, 2013.

G. Tessier, M. Bardoux, C. Boué, C. Filloy, and D. Fournier, Back side thermal imaging of integrated circuits at high spatial resolution, Physics Letters, vol.90, issue.17, p.171112, 2007.

J. Technologies-teledyne, Datasheet: J12 series, inas detectors, operating notes, 2000.

J. Tao, P. Fang, and J. Wang, Backside ir photon emission microscopy (ir-pem) observation in failure analysis of the packaged devices, 8th International Conference on Electronic Packaging Technology, pp.1-4, 2007.

R. Torrance and D. James, The State-of-the-Art in IC Reverse Engineering, pp.363-381, 2009.

M. Tehranipoor and F. Koushanfar, A survey of hardware trojan taxonomy and detection, IEEE Design Test of Computers, vol.27, issue.1, pp.10-25, 2010.

S. Tajik, H. Lohrke, J. Seifert, and C. Boit, No place to hide: Contactless probing of secret data on fpgas, vol.9813, 2016.

, October, 2018.

D. P. Vallett, Ic failure analysis: The importance of test and diagnostics, IEEE Des. Test, vol.14, issue.3, pp.76-82, 1997.

A. Vasselle, P. Maurine, and M. Cozzi, Breaking mobile firmware encryption through near-field side-channel analysis, 2019 attacks and solutions in hardware security (ASHES), 2019.

. Jasper-gj-van-woudenberg, F. Marc-f-witteman, and . Menarini, Practical optical fault injection on secure microcontrollers, 2011 BIBLIOGRAPHY Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.91-99

, IEEE, 2011.

B. L. Welch, The Generalization of Student's Problem When Several Different Population Variance Are Involved, Biometrika, vol.34, issue.1-2, p.1947

X. Wang, M. Tehranipoor, and J. Plusquellic, Detecting malicious inclusions in secure hardware: Challenges and solutions, IEEE International Workshop on Hardware-Oriented Security and Trust, pp.15-19, 2008.

A. Ziabari, Z. Bian, and A. Shakouri, Adaptive power blurring techniques to calculate ic temperature profile under large temperature variations, vol.03, 2019.