Follow
Christian Krieg
Christian Krieg
Electrical Engineering, TU Wien
Verified email at tuwien.ac.at - Homepage
Title
Cited by
Cited by
Year
Malicious LUT: A stealthy FPGA Trojan injected and triggered by the design flow
C Krieg, C Wolf, A Jantsch
2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 2016
692016
Applied formal methods for hardware Trojan detection
M Rathmair, F Schupfer, C Krieg
2014 IEEE International Symposium on Circuits and Systems (ISCAS), 169-172, 2014
552014
Hardware Malware
C Krieg, A Dabrowski, H Hobel, E Weippl
Morgan & Claypool Publishers, 2013
27*2013
Hardware malware
C Krieg, A Dabrowski, H Hobel, K Krombholz, ER Weippl
Morgan & Claypool, 2013
232013
A process for the detection of design-level hardware Trojans using verification methods
C Krieg, M Rathmair, F Schupfer
2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 …, 2014
172014
Toggle MUX: How X-optimism can lead to malicious hardware
C Krieg, C Wolf, A Jantsch, T Zseby
Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017
142017
Towards a unified penetration testing taxonomy
A Hudic, L Zechner, S Islam, C Krieg, ER Weippl, S Winkler, R Hable
2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012
142012
Historical Overview
C Krieg, A Dabrowski, H Hobel, K Krombholz, E Weippl
Hardware Malware, 65-81, 1997
71997
Reflections on Trusting TrustHUB
C Krieg
2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD), 1-9, 2023
12023
Pattern-based hardware Trojan characterization for design security assessment
C Krieg
Technische Universität Wien, 2019
12019
CHEF: A Configurable Hardware Trojan Evaluation Framework
C Krieg, D Neubacher
Proceedings of the WESS'15: Workshop on Embedded Systems Security, 1-6, 2015
12015
Malware in Hardware Infrastructure Components
C Krieg, E Weippl
SBA Research, Favoritenstrasse 16, 1040, 2013
12013
Method for validating a hardware system
C Krieg
US Patent 11,645,439, 2023
2023
Towards Power Characterization of FPGA Architectures To Enable Open-Source Power Estimation Using Micro-Benchmarks
S Riesenberger, C Krieg
arXiv preprint arXiv:2304.05326, 2023
2023
Method for automatic detection of a functional primitive in a model of a hardware system
C Krieg, A Jantsch, M Mosbeck
US Patent 11,321,512, 2022
2022
Python Wraps Yosys for Rapid Open-Source EDA Application Development
B Tutzer, C Krieg, C Wolf, A Jantsch
Proceedings of the First Workshop on Open-Source Design Automation (OSDA …, 2019
2019
Using Measurement Data in Network Security Education
T Zseby, F Iglesias, R Annessi, C Krieg, D Frkat, V Bernhard
2017
Toggle MUX
C Krieg, C Wolf, A Jantsch, T Zseby
Proceedings of the 54th Annual Design Automation Conference 2017, 2017
2017
SHAPE-HT--Secure Hardware by Automatic Property Extraction to Detect Design-Level Hardware Trojans
C Krieg
2016
Malicious LUT
C Krieg, C Wolf, A Jantsch
Proceedings of the 35th International Conference on Computer-Aided Design, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20