


default search action
Armin Krieg
Person information
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [c14]Andrea Höller, Armin Krieg, Tobias Rauter, Johannes Iber, Christian Kreiner
:
QEMU-Based Fault Injection for a System-Level Analysis of Software Countermeasures Against Fault Attacks. DSD 2015: 530-533 - 2013
- [j4]Armin Krieg
, Johannes Grinschgl, Christian Steger, Reinhold Weiss, Holger Bock, Andreas Genser, Josef Haid:
Hardware accelerated smart-card software evaluation supported by information leakage and activity sensors. J. Inf. Secur. Appl. 18(2-3): 138-147 (2013) - [j3]Johannes Grinschgl, Armin Krieg
, Christian Steger
, Reinhold Weiss, Holger Bock, Josef Haid, Thomas Aichinger, Christiane Ulbricht:
Case study on multiple fault dependability and security evaluations. Microprocess. Microsystems 37(2): 218-227 (2013) - [j2]Armin Krieg
, Christopher Preschern, Johannes Grinschgl, Christian Steger, Christian Kreiner, Reinhold Weiss, Holger Bock, Josef Haid:
Power And Fault Emulation for Software Verification and System Stability Testing in Safety Critical Environments. IEEE Trans. Ind. Informatics 9(2): 1199-1206 (2013) - [c13]Andrea Höller, Christopher Preschern, Christian Steger, Christian Kreiner, Armin Krieg, Holger Bock, Josef Haid:
Automatized high-level evaluation of security properties for RTL hardware designs. WESS 2013: 6:1-6:8 - [c12]Norbert Druml, Manuel Menghin, Daniel Kroisleitner, Christian Steger, Reinhold Weiss, Armin Krieg, Holger Bock, Josef Haid:
Emulation-Based Fault Effect Analysis for Resource Constrained, Secure, and Dependable Systems. DSD 2013: 337-344 - 2012
- [j1]Armin Krieg
, Johannes Grinschgl, Christian Steger
, Reinhold Weiss, Holger Bock, Josef Haid:
POWER-MODES: POWer-EmulatoR- and MOdel-Based DEpendability and Security Evaluations. ACM Trans. Reconfigurable Technol. Syst. 5(4): 19:1-19:21 (2012) - [c11]Armin Krieg
, Johannes Grinschgl, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
Hardware-Accelerated Workload Characterization for Power Modeling and Fault Injection. Asian Test Symposium 2012: 149-154 - [c10]Armin Krieg
, Johannes Grinschgl, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
System side-channel leakage emulation for HW/SW security coverification of MPSoCs. DDECS 2012: 139-144 - [c9]Armin Krieg
, Johannes Grinschgl, Norbert Druml, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
PROCOMON: An Automatically Generated Predictive Control Signal Monitor. DSD 2012: 654-660 - [c8]Armin Krieg
, Johannes Grinschgl, Christian Steger, Reinhold Weiss, Andreas Genser, Holger Bock, Josef Haid:
Characterization and handling of low-cost micro-architectural signatures in MPSoCs. ETS 2012: 1-6 - [c7]Armin Krieg, Johannes Grinschgl, Holger Bock, Josef Haid:
Acceleration of fault attack emulation by consideration of fault propagation. FPT 2012: 239-242 - [c6]Johannes Grinschgl, Armin Krieg, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
Efficient fault emulation based on post-injection fault effect analysis (PIFEA). MWSCAS 2012: 526-529 - [c5]Johannes Grinschgl, Armin Krieg
, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
Efficient fault emulation using automatic pre-injection memory access analysis. SoCC 2012: 277-282 - 2011
- [c4]Johannes Grinschgl, Armin Krieg
, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
Modular Fault Injector for Multiple Fault Dependability and Security Evaluations. DSD 2011: 550-557 - [c3]Armin Krieg
, Christian Bachmann
, Johannes Grinschgl, Christian Steger, Reinhold Weiss, Josef Haid:
Accelerating early design phase differential power analysis using power emulation techniques. HOST 2011: 81-86 - [c2]Armin Krieg
, Johannes Grinschgl, Christian Steger, Reinhold Weiss, Josef Haid:
A side channel attack countermeasure using system-on-chip power profile scrambling. IOLTS 2011: 222-227 - [c1]Johannes Grinschgl, Armin Krieg
, Christian Steger, Reinhold Weiss, Holger Bock, Josef Haid:
Automatic saboteur placement for emulation-based multi-bit fault injection. ReCoSoC 2011: 1-8
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 22:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint