Short Description: Various methods exist for detecting hardware Trojans in integrated circuits and FPGA bit streams. This survey strives to gain a structured overview.
Hardware Trojans are an emerging threat for application specific integrated circuits (ASICs) and field programmable gate arrays (FPGAs), as they affect all security principles, such as confidentiality, integrity and availability.
Various techniques for hardware Trojan detection (see e.g. ) exist at different levels of the circuit design flow. In this work, a well-structured overview of these approaches shall be given and an intuition shall be developed for the situations where the methods are applicable.
 K. Xiao, D. Forte, Y. Jin, R. Karri, S. Bhunia, and M. Tehranipoor, “Hardware Trojans: Lessons Learned After One Decade of Research,” ACM Trans. Des. Autom. Electron. Syst., vol. 22, no. 1, p. 6:1–6:23, May 2016.