I. Introduction
FPGAs are prevalent in system prototyping, hardware implementation for low-volume products, and the replacement of obsolete components in legacy systems [1], [2]. As highlighted in the work [3], FPGA security gains increasing attention [4]. There are extensive research efforts on the secure operations conducted by FPGA devices and safe bitstream delivery. Driven by the large market profit, attackers are motivated to degrade the performance of FPGA based systems by using counterfeit FPGA chips [5], pirate the hardware description of FPGA configuration by reverse engineering the bitstream [6], or tamper with the FPGA configuration via malicious FPGA ComputerAided-Design (CAD) tools.