default search action
Abhishek Chakraborty 0001
Person information
- affiliation: University of Maryland, USA
- affiliation (former): Indian Institute of Technology Kharagpur, India
Other persons with the same name
- Abhishek Chakraborty — disambiguation page
- Abhishek Chakraborty 0002 — Indian Institute of Space Science and Technology, Thiruvananthapuram, India
- Abhishek Chakraborty 0003 — XLRI Xavier School of Management, Jamshedpur, India (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c17]Tishya Sarma Sarkar, Shuvodip Maitra, Abhishek Chakraborty, Akashdeep Saha, Joydeep Chowdhury, Debdeep Mukhopadhyay:
X-Factor: Deep Learning-based PCB Counterfeit Detection using X-Ray CT Techniques for Hardware Assurance. CF (Companion) 2024 - [c16]Nikhil Chawla, Chen Liu, Abhishek Chakraborty, Igor Chervatyuk, Thais Moreira Hamasaki, Ke Sun, Henrique Kawakami:
Uncovering Software-Based Power Side-Channel Attacks on Apple M1/M2 Systems. DAC 2024: 305:1-305:6 - 2023
- [i14]Nikhil Chawla, Chen Liu, Abhishek Chakraborty, Igor Chervatyuk, Ke Sun, Thais Moreira Hamasaki, Henrique Kawakami:
The Power of Telemetry: Uncovering Software-Based Side-Channel Attacks on Apple M1/M2 Systems. CoRR abs/2306.16391 (2023) - 2022
- [c15]Chen Liu, Abhishek Chakraborty, Nikhil Chawla, Neer Roggel:
Frequency Throttling Side-Channel Attack. CCS 2022: 1977-1991 - [i13]Chen Liu, Abhishek Chakraborty, Nikhil Chawla, Neer Roggel:
Frequency Throttling Side-Channel Attack. CoRR abs/2206.07012 (2022) - [i12]Abhishek Chakraborty, Daniel Xing, Yuntao Liu, Ankur Srivastava:
DynaMarks: Defending Against Deep Learning Model Extraction Using Dynamic Watermarking. CoRR abs/2207.13321 (2022) - 2021
- [b1]Abhishek Chakraborty:
Design Techniques for Enhancing Hardware-Oriented Security Using Obfuscation. University of Maryland, College Park, MD, USA, 2021 - [j7]Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava:
Robust and Attack Resilient Logic Locking with a High Application-Level Impact. ACM J. Emerg. Technol. Comput. Syst. 17(3): 37:1-37:22 (2021) - [j6]Abhishek Chakraborty, Yuntao Liu, Ankur Srivastava:
Evaluating the Security of Delay-Locked Circuits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(4): 608-619 (2021) - [i11]Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava:
Robust and Attack Resilient Logic Locking with a High Application-Level Impact. CoRR abs/2101.02577 (2021) - 2020
- [j5]Abhishek Chakraborty, Nithyashankari Gummidipoondi Jayasankaran, Yuntao Liu, Jeyavijayan Rajendran, Ozgur Sinanoglu, Ankur Srivastava, Yang Xie, Muhammad Yasin, Michael Zuzak:
Keynote: A Disquisition on Logic Locking. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(10): 1952-1972 (2020) - [c14]Abhishek Chakraborty, Ankit Mondal, Ankur Srivastava:
Hardware-Assisted Intellectual Property Protection of Deep Learning Models. DAC 2020: 1-6 - [c13]Yuntao Liu, Ankit Mondal, Abhishek Chakraborty, Michael Zuzak, Nina Jacobsen, Daniel Xing, Ankur Srivastava:
A Survey on Neural Trojans. ISQED 2020: 33-39 - [c12]Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava:
Strong Anti-SAT: Secure and Effective Logic Locking. ISQED 2020: 199-205 - [i10]Yuntao Liu, Ankit Mondal, Abhishek Chakraborty, Michael Zuzak, Nina Jacobsen, Daniel Xing, Ankur Srivastava:
A Survey on Neural Trojans. IACR Cryptol. ePrint Arch. 2020: 201 (2020) - [i9]Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava:
Strong Anti-SAT: Secure and Effective Logic Locking. IACR Cryptol. ePrint Arch. 2020: 202 (2020) - [i8]Abhishek Chakraborty, Ankit Mondal, Ankur Srivastava:
Hardware-Assisted Intellectual Property Protection of Deep Learning Models. IACR Cryptol. ePrint Arch. 2020: 1016 (2020)
2010 – 2019
- 2019
- [c11]Abhishek Chakraborty, Ankur Srivastava:
Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators. ISVLSI 2019: 547-552 - [i7]Abhishek Chakraborty, Ankur Srivastava:
Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators. IACR Cryptol. ePrint Arch. 2019: 1040 (2019) - 2018
- [c10]Abhishek Chakraborty, Yang Xie, Ankur Srivastava:
GPU obfuscation: attack and defense strategies. DAC 2018: 122:1-122:6 - [c9]Abhishek Chakraborty, Yuntao Liu, Ankur Srivastava:
TimingSAT: timing profile embedded SAT attack. ICCAD 2018: 6 - 2017
- [j4]Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay:
Fault Tolerant Infective Countermeasure for AES. J. Hardw. Syst. Secur. 1(1): 3-17 (2017) - [j3]Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay:
A Combined Power and Fault Analysis Attack on Protected Grain Family of Stream Ciphers. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 36(12): 1968-1977 (2017) - [j2]Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, Partha Pratim Chakrabarti:
Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-Like Block Ciphers. IEEE Trans. Inf. Forensics Secur. 12(5): 1092-1102 (2017) - [c8]Abhishek Chakraborty, Ankit Mondal, Ankur Srivastava:
Correlation power analysis attack against STT-MRAM based cyptosystems. HOST 2017: 171 - [c7]Abhishek Chakraborty, Yang Xie, Ankur Srivastava:
Template Attack Based Deobfuscation of Integrated Circuits. ICCD 2017: 41-44 - [i6]Abhishek Chakraborty, Ankit Mondal, Ankur Srivastava:
Correlation Power Analysis Attack against STT-MRAM Based Cyptosystems. IACR Cryptol. ePrint Arch. 2017: 413 (2017) - 2016
- [j1]Abhishek Chakraborty, Sarani Bhattacharya, Tanu Hari Dixit, Chester Rebeiro, Debdeep Mukhopadhyay:
Template attack on SPA and FA resistant implementation of Montgomery ladder. IET Inf. Secur. 10(5): 245-251 (2016) - [c6]Abhishek Chakraborty, Debdeep Mukhopadhyay:
A Practical Template Attack on MICKEY-128 2.0 Using PSO Generated IVs and LS-SVM. VLSID 2016: 529-534 - [i5]Abhishek Chakraborty, Debdeep Mukhopadhyay:
A Practical Template Attack on MICKEY-128 2.0 Using PSO Generated IVs and LS-SVM. IACR Cryptol. ePrint Arch. 2016: 26 (2016) - 2015
- [c5]Sikhar Patranabis, Abhishek Chakraborty, Phuong Ha Nguyen, Debdeep Mukhopadhyay:
A Biased Fault Attack on the Time Redundancy Countermeasure for AES. COSADE 2015: 189-203 - [c4]Prakash Dey, Abhishek Chakraborty, Avishek Adhikari, Debdeep Mukhopadhyay:
Improved practical differential fault analysis of grain-128. DATE 2015: 459-464 - [c3]Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay:
A practical DPA on Grain v1 using LS-SVM. HOST 2015: 44-47 - [c2]Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay:
Fault Tolerant Infective Countermeasure for AES. SPACE 2015: 190-209 - [i4]Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay:
Fault Tolerant Infective Countermeasure for AES. IACR Cryptol. ePrint Arch. 2015: 493 (2015) - [i3]Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay:
Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers. IACR Cryptol. ePrint Arch. 2015: 602 (2015) - [i2]Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay, P. P. Chakrabarti:
Using State Space Encoding To Counter Biased Fault Attacks on AES Countermeasures. IACR Cryptol. ePrint Arch. 2015: 806 (2015) - 2014
- [c1]Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay:
Fibonacci LFSR vs. Galois LFSR: Which is More Vulnerable to Power Attacks? SPACE 2014: 14-27 - [i1]Prakash Dey, Abhishek Chakraborty, Avishek Adhikari, Debdeep Mukhopadhyay:
Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions. IACR Cryptol. ePrint Arch. 2014: 654 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-04 21:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint