publ-security.bib
@comment{{This file has been generated by bib2bib 1.99}}
@comment{{Command line: bib2bib -q -ob publ-security.bib --remove keywords -c 'key : "\bsecurity\b"' /home/jantsch/Website/jantsch.se/AxelJantsch/publist.bib}}
@comment{{This file has been generated by bib2bib 1.99}}
@comment{{Command line: bib2bib -q -oc /home/jantsch/Website/jantsch.se/AxelJantsch/citefile -c '(( author : "Jantsch" or ( editor : "Jantsch" and $type : "book" ))
and ( not ( $key : "presentation" ))
and ( not ( $type : "techreport" ))
and ( not ( $type : "misc" ))
and ( not ( annotate : "not reviewed" ))
and ( not ( note : "Under submission" )))
or $key = "hauer:2021a"
'}}
@inproceedings{maragkou:2025a,
author = {Maragkou, Sofia and Grammatikakis, Miltos and
Papatheodorou, Nikos and Jantsch, Axel},
booktitle = {2025 IEEE 15th Annual Computing and Communication
Workshop and Conference (CCWC)},
title = {Secure Authentication in the Presence of Malicious
Messages and Packet Reorders: Study on CAN Bus},
year = 2025,
pages = {00952-00959},
key = {security},
doi = {10.1109/CCWC62904.2025.10903953},
url = {http://jantsch.se/AxelJantsch/papers/2025/SofiaMaragkou-CCWC.pdf}
}
@article{sohail:2024a,
author = {Sohail, Muhammad Noman and Anjum, Adeel and Saeed,
Iftikhar Ahmed and Syed, Madiha Haider and Jantsch,
Axel and Rehman, Semeen},
journal = {IEEE Access},
title = {Optimizing Industrial {IoT} Data Security through
Blockchain-Enabled Incentive-Driven Game Theoretic
Approach for Data Sharing},
year = 2024,
pages = {1-1},
key = {security},
doi = {10.1109/ACCESS.2024.3382571},
url = {http://jantsch.se/AxelJantsch/papers/2024/MuhammadNomanSoleil-IEEEAccess.pdf}
}
@article{maragkou:2025b,
author = {Sofia Maragkou and Lukas Rappel and Hendrik Dettmer
and Thilo Sauter and Axel Jantsch},
title = { The pains of hardware security: An assessment model
of real-world hardware security attacks},
journal = {IEEE Open Journal of the Industrial Electronics Society },
year = 2025,
key = {security,survey},
url = {http://jantsch.se/AxelJantsch/papers/2025/SofiaMaragkou-IES.pdf},
doi = {10.1109/OJIES.2025.3561675}
}
@inproceedings{tutzer:2019a,
author = { Benedikt Tutzer and Christian Krieg and Clifford
Wolf and Axel Jantsch},
title = {Python Wraps {Yosys} for Rapid Open-Source {EDA}
Application Development},
booktitle = { DATE Workshop on Open-Source Design Automation for
FPGAs - OSDA },
year = 2019,
month = {March},
address = {Florence},
key = {security},
url = {BenediktTutzer-OSDA.pdf}
}
@inproceedings{abbassi:2019a,
author = {Imran Hafeez Abbassi and Faiq Khalid and Semeen
Rehman and Awais Mehmood Kamboh and Axel Jantsch and
Siddharth Garg and Muhammad Shafique},
title = { {TrojanZero}: Switching Activity-Aware Design of
Undetectable Hardware Trojans with Zero Power and
Area Footprint},
booktitle = {Proceedings of the Design and Test Europe Conference
(DATE)},
year = 2019,
month = {March},
key = {security},
address = {Florence, Italy},
url = {https://arxiv.org/pdf/1812.02770.pdf}
}
@inproceedings{krieg:2016a,
title = {Malicious {LUT}: A Stealthy {FPGA} Trojan Injected
and Triggered by the Design Flow},
author = {Chrsitian Krieg and Clifford Wolf and Axel Jantsch},
booktitle = {Proceedings of the International Conference on
Computer Aided Design (ICCAD)},
year = 2016,
key = {security},
address = {Austin, Texas},
month = {November},
note = { {\bf Best Paper Award} },
url = {http://jantsch.se/AxelJantsch/papers/2016/ChristianKrieg-ICCAD.pdf}
}
@inproceedings{krieg:2017a,
title = {Toggle {MUX}: How {X}-Optimism Can Lead to Malicious
Hardware},
author = {Christian Krieg and Clifford Wolf and Axel Jantsch
and Tanja Zseby},
booktitle = {Proceedins of the Design Automation Conference
(DAC)},
year = 2017,
key = {security},
address = {Austin, Texas, USA},
month = {June},
doi = {http://dx.doi.org/10.1145/3061639.3062328},
url = {http://jantsch.se/AxelJantsch/papers/2017/ChristianKrieg-DAC.pdf}
}