publ-security.bib

@comment{{This file has been generated by bib2bib 1.99}}
@comment{{Command line: bib2bib -q -ob publ-security.bib --remove keywords -c 'key : "security"' /home/jantsch/Website/jantsch.se/AxelJantsch/publist.bib}}
@comment{{This file has been generated by bib2bib 1.99}}
@comment{{Command line: bib2bib -q -oc /home/jantsch/Website/jantsch.se/AxelJantsch/citefile -c '(( author : "Jantsch" or ( editor : "Jantsch" and $type : "book" ))
	    and ( not ( $key : "presentation" ))
	    and ( not ( $type : "techreport" ))
	    and ( not ( $type : "misc" ))
	    and ( not ( annotate : "not reviewed" )))
	    or $key = "hauer:2021a"
	    ' /home/jantsch/text/papers/lit.bib}}
@comment{{Example entry for online references:
miscWinNT,
  title = MS Windows NT Kernel Description,
  howpublished = \urlhttp://web.archive.org/web/20080207010024/http://www.808multimedia.com/winnt/kernel.htm,
  note = Accessed: 2010-09-30
}}
@comment{{Example:
miscWikiQuineMcCluskey,
  title =	 Quine-McCluskey Algorithm,
  author =  Wikipedia ,
  year = 2021,
  howpublished =
                  \urlhttps://en.wikipedia.org/wiki/Quine%E2%80%93McCluskey_algorithm,
  note =	 Accessed: 2021-08-11
}}
@inproceedings{tutzer:2019a,
  author = { Benedikt Tutzer and Christian Krieg and Clifford
                  Wolf and Axel Jantsch},
  title = {Python Wraps {Yosys} for Rapid Open-Source {EDA}
                  Application Development},
  booktitle = { DATE Workshop on Open-Source Design Automation for
                  FPGAs - OSDA },
  year = 2019,
  month = {March},
  address = {Florence},
  key = {security},
  url = {BenediktTutzer-OSDA.pdf}
}
@inproceedings{abbassi:2019a,
  author = {Imran Hafeez Abbassi and Faiq Khalid and Semeen
                  Rehman and Awais Mehmood Kamboh and Axel Jantsch and
                  Siddharth Garg and Muhammad Shafique},
  title = { {TrojanZero}: Switching Activity-Aware Design of
                  Undetectable Hardware Trojans with Zero Power and
                  Area Footprint},
  booktitle = {Proceedings of the Design and Test Europe Conference
                  (DATE)},
  year = 2019,
  month = {March},
  key = {security},
  address = {Florence, Italy},
  url = {https://arxiv.org/pdf/1812.02770.pdf}
}
@inproceedings{krieg:2016a,
  title = {Malicious {LUT}: A Stealthy {FPGA} Trojan Injected
                  and Triggered by the Design Flow},
  author = {Chrsitian Krieg and Clifford Wolf and Axel Jantsch},
  booktitle = {Proceedings of the International Conference on
                  Computer Aided Design (ICCAD)},
  year = 2016,
  key = {security},
  address = {Austin, Texas},
  month = {November},
  note = { {\bf Best Paper Award} },
  url = {http://jantsch.se/AxelJantsch/papers/2016/ChristianKrieg-ICCAD.pdf}
}
@inproceedings{krieg:2017a,
  title = {Toggle {MUX}: How {X}-Optimism Can Lead to Malicious
                  Hardware},
  author = {Christian Krieg and Clifford Wolf and Axel Jantsch
                  and Tanja Zseby},
  booktitle = {Proceedins of the Design Automation Conference
                  (DAC)},
  year = 2017,
  key = {security},
  address = {Austin, Texas, USA},
  month = {June},
  doi = {http://dx.doi.org/10.1145/3061639.3062328},
  url = {http://jantsch.se/AxelJantsch/papers/2017/ChristianKrieg-DAC.pdf}
}