publ-security.bib
@comment{{This file has been generated by bib2bib 1.98}}
@comment{{Command line: /usr/bin/bib2bib -q -ob publ-security.bib --remove keywords -c 'key : "security"' /home/jantsch/Website/jantsch.se/AxelJantsch/publist.bib}}
@comment{{This file has been generated by bib2bib 1.98}}
@comment{{Command line: /usr/bin/bib2bib -q -oc /home/jantsch/Website/jantsch.se/AxelJantsch/citefile -c '(( author : "Jantsch" or ( editor : "Jantsch" and $type : "book" ))
and ( not ( $key : "presentation" ))
and ( not ( $type : "techreport" ))
and ( not ( $type : "misc" ))
and ( not ( annotate : "not reviewed" )))
or $key = "hauer:2021a"
' /home/jantsch/text/papers/lit.bib}}
@comment{{Example entry for online references:
miscWinNT,
title = MS Windows NT Kernel Description,
howpublished = \urlhttp://web.archive.org/web/20080207010024/http://www.808multimedia.com/winnt/kernel.htm,
note = Accessed: 2010-09-30
}}
@comment{{Example:
miscWikiQuineMcCluskey,
title = Quine-McCluskey Algorithm,
author = Wikipedia ,
year = 2021,
howpublished =
\urlhttps://en.wikipedia.org/wiki/Quine%E2%80%93McCluskey_algorithm,
note = Accessed: 2021-08-11
}}
@inproceedings{tutzer:2019a,
author = { Benedikt Tutzer and Christian Krieg and Clifford
Wolf and Axel Jantsch},
title = {Python Wraps {Yosys} for Rapid Open-Source {EDA}
Application Development},
booktitle = { DATE Workshop on Open-Source Design Automation for
FPGAs - OSDA },
year = 2019,
month = {March},
address = {Florence},
key = {security},
url = {BenediktTutzer-OSDA.pdf}
}
@inproceedings{abbassi:2019a,
author = {Imran Hafeez Abbassi and Faiq Khalid and Semeen
Rehman and Awais Mehmood Kamboh and Axel Jantsch and
Siddharth Garg and Muhammad Shafique},
title = { {TrojanZero}: Switching Activity-Aware Design of
Undetectable Hardware Trojans with Zero Power and
Area Footprint},
booktitle = {Proceedings of the Design and Test Europe Conference
(DATE)},
year = 2019,
month = {March},
key = {security},
address = {Florence, Italy},
url = {https://arxiv.org/pdf/1812.02770.pdf}
}
@inproceedings{krieg:2016a,
title = {Malicious {LUT}: A Stealthy {FPGA} Trojan Injected
and Triggered by the Design Flow},
author = {Chrsitian Krieg and Clifford Wolf and Axel Jantsch},
booktitle = {Proceedings of the International Conference on
Computer Aided Design (ICCAD)},
year = 2016,
key = {security},
address = {Austin, Texas},
month = {November},
note = { {\bf Best Paper Award} },
url = {http://jantsch.se/AxelJantsch/papers/2016/ChristianKrieg-ICCAD.pdf}
}
@inproceedings{krieg:2017a,
title = {Toggle {MUX}: How {X}-Optimism Can Lead to Malicious
Hardware},
author = {Christian Krieg and Clifford Wolf and Axel Jantsch
and Tanja Zseby},
booktitle = {Proceedins of the Design Automation Conference
(DAC)},
year = 2017,
key = {security},
address = {Austin, Texas, USA},
month = {June},
doi = {http://dx.doi.org/10.1145/3061639.3062328},
url = {http://jantsch.se/AxelJantsch/papers/2017/ChristianKrieg-DAC.pdf}
}