Hardware Trojan: Threats and emerging solutions RS Chakraborty, S Narasimhan, S Bhunia 2009 IEEE International high level design validation and test workshop, 166-171, 2009 | 598 | 2009 |
MERO: A Statistical Approach for Hardware Trojan Detection RS Chakraborty, F Wolff, S Paul, C Papachristou, S Bhunia International Workshop on Cryptographic Hardware and Embedded Systems, 396-410, 2009 | 588 | 2009 |
HARPOON: An obfuscation-based SoC design methodology for hardware protection RS Chakraborty, S Bhunia IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2009 | 587 | 2009 |
Towards Trojan-free trusted ICs: Problem analysis and detection scheme F Wolff, C Papachristou, S Bhunia, RS Chakraborty Proceedings of the conference on Design, automation and test in Europe, 1362 …, 2008 | 450 | 2008 |
Hardware Trojan detection by multiple-parameter side-channel analysis S Narasimhan, D Du, RS Chakraborty, S Paul, FG Wolff, CA Papachristou, ... IEEE Transactions on computers 62 (11), 2183-2195, 2012 | 278 | 2012 |
Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database U Chatterjee, V Govindan, R Sadhukhan, D Mukhopadhyay, ... IEEE transactions on dependable and secure computing 16 (3), 424-437, 2018 | 256 | 2018 |
Security against hardware Trojan through a novel application of design obfuscation RS Chakraborty, S Bhunia Proceedings of the 2009 International Conference on Computer-Aided Design …, 2009 | 253 | 2009 |
A PUF-based secure communication protocol for IoT U Chatterjee, RS Chakraborty, D Mukhopadhyay ACM Transactions on Embedded Computing Systems (TECS) 16 (3), 1-25, 2017 | 210 | 2017 |
Hardware protection and authentication through netlist level obfuscation RS Chakraborty, S Bhunia 2008 IEEE/ACM International Conference on Computer-Aided Design, 674-677, 2008 | 197 | 2008 |
Hardware Trojan insertion by direct modification of FPGA configuration bitstream RS Chakraborty, I Saha, A Palchaudhuri, GK Naik IEEE Design & Test 30 (2), 45-54, 2013 | 191 | 2013 |
Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach S Narasimhan, D Du, RS Chakraborty, S Paul, F Wolff, C Papachristou, ... 2010 IEEE international symposium on hardware-oriented security and trust …, 2010 | 181 | 2010 |
TeSR: A robust temporal self-referencing approach for hardware Trojan detection S Narasimhan, X Wang, D Du, RS Chakraborty, S Bhunia 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 71-74, 2011 | 168 | 2011 |
A multiplexer-based arbiter PUF composition with enhanced reliability and security DP Sahoo, D Mukhopadhyay, RS Chakraborty, PH Nguyen IEEE Transactions on Computers 67 (3), 403-417, 2017 | 158 | 2017 |
Self-referencing: A scalable side-channel approach for hardware Trojan detection D Du, S Narasimhan, RS Chakraborty, S Bhunia Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International …, 2010 | 150 | 2010 |
RTL hardware IP protection using key-based control and data flow obfuscation RS Chakraborty, S Bhunia 2010 23rd International Conference on VLSI Design, 405-410, 2010 | 149 | 2010 |
On-demand transparency for improving hardware Trojan detectability RS Chakraborty, S Paul, S Bhunia 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, 48-50, 2008 | 146 | 2008 |
Improved test pattern generation for hardware trojan detection using genetic algorithm and boolean satisfiability S Saha, RS Chakraborty, SS Nuthakki, Anshul, D Mukhopadhyay Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015 | 130 | 2015 |
Vim-scan: A low overhead scan design approach for protection of secret key in scan-based secure chips S Paul, RS Chakraborty, S Bhunia 25th IEEE VLSI Test Symposium (VTS'07), 455-460, 2007 | 130 | 2007 |
Deep learning based model building attacks on arbiter PUF compositions P Santikellur, A Bhattacharyay, RS Chakraborty Cryptology ePrint Archive, 2019 | 127 | 2019 |
Security against hardware Trojan attacks using key-based design obfuscation RS Chakraborty, S Bhunia Journal of Electronic Testing 27, 767-785, 2011 | 107 | 2011 |