Brutus: Refuting the Security Claims of the Cache Timing Randomization Countermeasure Proposed in CEASER R Bodduna, V Ganesan, P Slpsk, K Veezhinathan, C Rebeiro IEEE Computer Architecture Letters 19 (1), 9-12, 2020 | 43 | 2020 |
Karna: A gate-sizing based security aware EDA flow for improved power side-channel attack protection P Slpsk, PK Vairam, C Rebeiro, V Kamakoti 2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 2019 | 39 | 2019 |
The Implications of Shared Data Synchronization Techniques on {Multi-Core} Energy {Efficiency} A Gautham, K Korgaonkar, P Slpsk, S Balachandran, K Veezhinathan 2012 Workshop on Power-Aware Computing and Systems (HotPower 12), 2012 | 34 | 2012 |
Trust issues in microelectronics: The concerns and the countermeasures T Hoque, P Slpsk, S Bhunia IEEE Consumer Electronics Magazine 9 (6), 72-83, 2020 | 15 | 2020 |
SOLOMON: An automated framework for detecting fault attack vulnerabilities in hardware M Srivastava, P Slpsk, I Roy, C Rebeiro, A Hazra, S Bhunia 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 310-313, 2020 | 15 | 2020 |
Trusted electronic systems with untrusted cots S Yang, P Chakraborty, P SLPSK, S Bhunia 2021 22nd International Symposium on Quality Electronic Design (ISQED), 198-203, 2021 | 9 | 2021 |
On database-free authentication of microelectronic components F Zhang, SD Paul, P Slpsk, AR Trivedi, S Bhunia IEEE Transactions on Very Large Scale Integration (VLSI) Systems 29 (1), 149-161, 2020 | 9 | 2020 |
White mirror: Leaking sensitive information from interactive Netflix movies using encrypted traffic analysis G Mitra, PK Vairam, P Slpsk, N Chandrachoodan, K V Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, 122-124, 2019 | 8 | 2019 |
Gandalf: A fine-grained hardware–software co-design for preventing memory attacks G Krishnakumar, P SLPSK, PK Vairam, C Rebeiro, K Veezhinathan IEEE Embedded Systems Letters 10 (3), 83-86, 2018 | 8 | 2018 |
TREEHOUSE: A Secure Asset Management Infrastructure for Protecting 3DIC Designs P SLPSK, S Ray, S Bhunia IEEE Transactions on Computers 72 (8), 2306-2320, 2023 | 7 | 2023 |
Trust issues in cots: The challenges and emerging solution T Hoque, P SLPSK, S Bhunia Proceedings of the 2020 on Great Lakes Symposium on VLSI, 211-216, 2020 | 7 | 2020 |
Mltimer: Leakage power minimization in digital circuits using machine learning and adaptive lazy timing analysis S Patanjali, M Patnaik, S Potluri, V Kamakoti Journal of Low Power Electronics 14 (2), 285-301, 2018 | 7 | 2018 |
Drone-based administration of remotely located instruments and gadgets PSLS Swarup Bhunia, Prabuddha Chakraborty, Reiner Dizon, Parker Difuntorum ... US Patent US20220083987A1, 2022 | 5* | 2022 |
Melpuf: Memory in logic puf C Vega, P SLPSK, SD Paul, S Bhunia arXiv preprint arXiv:2012.03162, 2020 | 5 | 2020 |
Signed: A challenge-response based interrogation scheme for simultaneous watermarking and trojan detection A Nair, P SLPSK, C Rebeiro, S Bhunia arXiv preprint arXiv:2010.05209, 2020 | 4 | 2020 |
Tvf: A metric for quantifying vulnerability against hardware trojan attacks J Cruz, P Slpsk, P Gaikwad, S Bhunia IEEE Transactions on Very Large Scale Integration (VLSI) Systems 31 (7), 969-979, 2023 | 3 | 2023 |
SIGNED: A challenge-response scheme for electronic hardware watermarking P SLPSK, AA Nair, C Rebeiro, S Bhunia IEEE Transactions on Computers 72 (6), 1763-1777, 2022 | 3 | 2022 |
Rihann: Remote iot hardware authentication with intrinsic identifiers SD Paul, F Zhang, P SLPSK, AR Trivedi, S Bhunia IEEE Internet of Things Journal 9 (24), 24615-24627, 2022 | 3 | 2022 |
Depending on HTTP/2 for privacy? Good luck! G Mitra, PK Vairam, P Slpsk, N Chandrachoodan, V Kamakoti 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020 | 3 | 2020 |
Avatar: Reinforcing fault attack countermeasures in EDA with fault transformations PB Roy, P Slpsk, C Rebeiro 2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC), 417-422, 2022 | 2 | 2022 |