publ-security.bib

@comment{{This file has been generated by bib2bib 1.99}}
@comment{{Command line: bib2bib -q -ob publ-security.bib --remove keywords -c 'key : "\bsecurity\b"' /home/jantsch/Website/jantsch.se/AxelJantsch/publist.bib}}
@comment{{This file has been generated by bib2bib 1.99}}
@comment{{Command line: bib2bib -q -oc /home/jantsch/Website/jantsch.se/AxelJantsch/citefile -c '(( author : "Jantsch" or ( editor : "Jantsch" and $type : "book" ))
	    and ( not ( $key : "presentation" ))
	    and ( not ( $type : "techreport" ))
	    and ( not ( $type : "misc" ))
	    and ( not ( annotate : "not reviewed" ))
	    and ( not ( note : "Under submission" )))
	    or $key = "hauer:2021a"
	    '}}
@inproceedings{maragkou:2025a,
  author = {Maragkou, Sofia and Grammatikakis, Miltos and
                  Papatheodorou, Nikos and Jantsch, Axel},
  booktitle = {2025 IEEE 15th Annual Computing and Communication
                  Workshop and Conference (CCWC)},
  title = {Secure Authentication in the Presence of Malicious
                  Messages and Packet Reorders: Study on CAN Bus},
  year = 2025,
  pages = {00952-00959},
  key = {security},
  doi = {10.1109/CCWC62904.2025.10903953},
  url = {http://jantsch.se/AxelJantsch/papers/2025/SofiaMaragkou-CCWC.pdf}
}
@article{sohail:2024a,
  author = {Sohail, Muhammad Noman and Anjum, Adeel and Saeed,
                  Iftikhar Ahmed and Syed, Madiha Haider and Jantsch,
                  Axel and Rehman, Semeen},
  journal = {IEEE Access},
  title = {Optimizing Industrial {IoT} Data Security through
                  Blockchain-Enabled Incentive-Driven Game Theoretic
                  Approach for Data Sharing},
  year = 2024,
  pages = {1-1},
  key = {security},
  doi = {10.1109/ACCESS.2024.3382571},
  url = {http://jantsch.se/AxelJantsch/papers/2024/MuhammadNomanSoleil-IEEEAccess.pdf}
}
@article{maragkou:2025b,
  author = {Sofia Maragkou and Lukas Rappel and Hendrik Dettmer
                  and Thilo Sauter and Axel Jantsch},
  title = { The pains of hardware security: An assessment model
                  of real-world hardware security attacks},
  journal = {IEEE Open Journal of the Industrial Electronics Society },
  year = 2025,
  key = {security,survey},
  url = {http://jantsch.se/AxelJantsch/papers/2025/SofiaMaragkou-IES.pdf},
  doi = {10.1109/OJIES.2025.3561675}
}
@inproceedings{tutzer:2019a,
  author = { Benedikt Tutzer and Christian Krieg and Clifford
                  Wolf and Axel Jantsch},
  title = {Python Wraps {Yosys} for Rapid Open-Source {EDA}
                  Application Development},
  booktitle = { DATE Workshop on Open-Source Design Automation for
                  FPGAs - OSDA },
  year = 2019,
  month = {March},
  address = {Florence},
  key = {security},
  url = {BenediktTutzer-OSDA.pdf}
}
@inproceedings{abbassi:2019a,
  author = {Imran Hafeez Abbassi and Faiq Khalid and Semeen
                  Rehman and Awais Mehmood Kamboh and Axel Jantsch and
                  Siddharth Garg and Muhammad Shafique},
  title = { {TrojanZero}: Switching Activity-Aware Design of
                  Undetectable Hardware Trojans with Zero Power and
                  Area Footprint},
  booktitle = {Proceedings of the Design and Test Europe Conference
                  (DATE)},
  year = 2019,
  month = {March},
  key = {security},
  address = {Florence, Italy},
  url = {https://arxiv.org/pdf/1812.02770.pdf}
}
@inproceedings{krieg:2016a,
  title = {Malicious {LUT}: A Stealthy {FPGA} Trojan Injected
                  and Triggered by the Design Flow},
  author = {Chrsitian Krieg and Clifford Wolf and Axel Jantsch},
  booktitle = {Proceedings of the International Conference on
                  Computer Aided Design (ICCAD)},
  year = 2016,
  key = {security},
  address = {Austin, Texas},
  month = {November},
  note = { {\bf Best Paper Award} },
  url = {http://jantsch.se/AxelJantsch/papers/2016/ChristianKrieg-ICCAD.pdf}
}
@inproceedings{krieg:2017a,
  title = {Toggle {MUX}: How {X}-Optimism Can Lead to Malicious
                  Hardware},
  author = {Christian Krieg and Clifford Wolf and Axel Jantsch
                  and Tanja Zseby},
  booktitle = {Proceedins of the Design Automation Conference
                  (DAC)},
  year = 2017,
  key = {security},
  address = {Austin, Texas, USA},
  month = {June},
  doi = {http://dx.doi.org/10.1145/3061639.3062328},
  url = {http://jantsch.se/AxelJantsch/papers/2017/ChristianKrieg-DAC.pdf}
}