Malicious LUT: A stealthy FPGA Trojan injected and triggered by the design flow C Krieg, C Wolf, A Jantsch 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 2016 | 69 | 2016 |
Applied formal methods for hardware Trojan detection M Rathmair, F Schupfer, C Krieg 2014 IEEE International Symposium on Circuits and Systems (ISCAS), 169-172, 2014 | 55 | 2014 |
Hardware Malware C Krieg, A Dabrowski, H Hobel, E Weippl Morgan & Claypool Publishers, 2013 | 27* | 2013 |
Hardware malware C Krieg, A Dabrowski, H Hobel, K Krombholz, ER Weippl Morgan & Claypool, 2013 | 23 | 2013 |
A process for the detection of design-level hardware Trojans using verification methods C Krieg, M Rathmair, F Schupfer 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 …, 2014 | 17 | 2014 |
Toggle MUX: How X-optimism can lead to malicious hardware C Krieg, C Wolf, A Jantsch, T Zseby Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017 | 14 | 2017 |
Towards a unified penetration testing taxonomy A Hudic, L Zechner, S Islam, C Krieg, ER Weippl, S Winkler, R Hable 2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012 | 14 | 2012 |
Historical Overview C Krieg, A Dabrowski, H Hobel, K Krombholz, E Weippl Hardware Malware, 65-81, 1997 | 7 | 1997 |
Reflections on Trusting TrustHUB C Krieg 2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD), 1-9, 2023 | 1 | 2023 |
Pattern-based hardware Trojan characterization for design security assessment C Krieg Technische Universität Wien, 2019 | 1 | 2019 |
CHEF: A Configurable Hardware Trojan Evaluation Framework C Krieg, D Neubacher Proceedings of the WESS'15: Workshop on Embedded Systems Security, 1-6, 2015 | 1 | 2015 |
Malware in Hardware Infrastructure Components C Krieg, E Weippl SBA Research, Favoritenstrasse 16, 1040, 2013 | 1 | 2013 |
Method for validating a hardware system C Krieg US Patent 11,645,439, 2023 | | 2023 |
Towards Power Characterization of FPGA Architectures To Enable Open-Source Power Estimation Using Micro-Benchmarks S Riesenberger, C Krieg arXiv preprint arXiv:2304.05326, 2023 | | 2023 |
Method for automatic detection of a functional primitive in a model of a hardware system C Krieg, A Jantsch, M Mosbeck US Patent 11,321,512, 2022 | | 2022 |
Python Wraps Yosys for Rapid Open-Source EDA Application Development B Tutzer, C Krieg, C Wolf, A Jantsch Proceedings of the First Workshop on Open-Source Design Automation (OSDA …, 2019 | | 2019 |
Using Measurement Data in Network Security Education T Zseby, F Iglesias, R Annessi, C Krieg, D Frkat, V Bernhard | | 2017 |
Toggle MUX C Krieg, C Wolf, A Jantsch, T Zseby Proceedings of the 54th Annual Design Automation Conference 2017, 2017 | | 2017 |
SHAPE-HT--Secure Hardware by Automatic Property Extraction to Detect Design-Level Hardware Trojans C Krieg | | 2016 |
Malicious LUT C Krieg, C Wolf, A Jantsch Proceedings of the 35th International Conference on Computer-Aided Design, 2016 | | 2016 |