Seguir
Rajat Subhra Chakraborty
Rajat Subhra Chakraborty
Professor, Dept. of Computer Science and Engineering, IIT Kharagpur, India - 721302
Dirección de correo verificada de cse.iitkgp.ac.in - Página principal
Título
Citado por
Citado por
Año
HARPOON: An obfuscation-based SoC design methodology for hardware protection
RS Chakraborty, S Bhunia
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2009
6272009
Hardware Trojan: Threats and emerging solutions
RS Chakraborty, S Narasimhan, S Bhunia
2009 IEEE International high level design validation and test workshop, 166-171, 2009
6202009
MERO: A Statistical Approach for Hardware Trojan Detection
RS Chakraborty, F Wolff, S Paul, C Papachristou, S Bhunia
International Workshop on Cryptographic Hardware and Embedded Systems, 396-410, 2009
6102009
Towards Trojan-free trusted ICs: Problem analysis and detection scheme
F Wolff, C Papachristou, S Bhunia, RS Chakraborty
Proceedings of the conference on Design, automation and test in Europe, 1362 …, 2008
4532008
Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database
U Chatterjee, V Govindan, R Sadhukhan, D Mukhopadhyay, ...
IEEE transactions on dependable and secure computing 16 (3), 424-437, 2018
2942018
Hardware Trojan detection by multiple-parameter side-channel analysis
S Narasimhan, D Du, RS Chakraborty, S Paul, FG Wolff, CA Papachristou, ...
IEEE Transactions on computers 62 (11), 2183-2195, 2012
2882012
Security against hardware Trojan through a novel application of design obfuscation
RS Chakraborty, S Bhunia
Proceedings of the 2009 International Conference on Computer-Aided Design …, 2009
2582009
A PUF-based secure communication protocol for IoT
U Chatterjee, RS Chakraborty, D Mukhopadhyay
ACM Transactions on Embedded Computing Systems (TECS) 16 (3), 1-25, 2017
2332017
Hardware protection and authentication through netlist level obfuscation
RS Chakraborty, S Bhunia
2008 IEEE/ACM International Conference on Computer-Aided Design, 674-677, 2008
2092008
Hardware Trojan insertion by direct modification of FPGA configuration bitstream
RS Chakraborty, I Saha, A Palchaudhuri, GK Naik
IEEE Design & Test 30 (2), 45-54, 2013
1992013
A multiplexer-based arbiter PUF composition with enhanced reliability and security
DP Sahoo, D Mukhopadhyay, RS Chakraborty, PH Nguyen
IEEE Transactions on Computers 67 (3), 403-417, 2017
1842017
Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach
S Narasimhan, D Du, RS Chakraborty, S Paul, F Wolff, C Papachristou, ...
2010 IEEE international symposium on hardware-oriented security and trust …, 2010
1842010
TeSR: A robust temporal self-referencing approach for hardware Trojan detection
S Narasimhan, X Wang, D Du, RS Chakraborty, S Bhunia
2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 71-74, 2011
1542011
RTL hardware IP protection using key-based control and data flow obfuscation
RS Chakraborty, S Bhunia
2010 23rd International Conference on VLSI Design, 405-410, 2010
1542010
Self-referencing: A scalable side-channel approach for hardware Trojan detection
D Du, S Narasimhan, RS Chakraborty, S Bhunia
Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International …, 2010
1542010
On-demand transparency for improving hardware Trojan detectability
RS Chakraborty, S Paul, S Bhunia
2008 IEEE International Workshop on Hardware-Oriented Security and Trust, 48-50, 2008
1492008
Deep learning based model building attacks on arbiter PUF compositions
P Santikellur, A Bhattacharyay, RS Chakraborty
Cryptology ePrint Archive, 2019
1462019
Improved test pattern generation for hardware trojan detection using genetic algorithm and boolean satisfiability
S Saha, RS Chakraborty, SS Nuthakki, Anshul, D Mukhopadhyay
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
1332015
Vim-scan: A low overhead scan design approach for protection of secret key in scan-based secure chips
S Paul, RS Chakraborty, S Bhunia
25th IEEE VLSI Test Symposium (VTS'07), 455-460, 2007
1322007
Security against hardware Trojan attacks using key-based design obfuscation
RS Chakraborty, S Bhunia
Journal of Electronic Testing 27, 767-785, 2011
1052011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20