Exploring Micro-architectural Side-Channel Leakages through Statistical Testing
Bhattacharya, Sarani, Verbauwhede, Ingrid
Published in 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE) (01.02.2021)
Published in 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE) (01.02.2021)
Get full text
Conference Proceeding
Branch Prediction Attack on Blinded Scalar Multiplication
Bhattacharya, Sarani, Maurice, Clementine, Bhasin, Shivam, Mukhopadhyay, Debdeep
Published in IEEE transactions on computers (01.05.2020)
Published in IEEE transactions on computers (01.05.2020)
Get full text
Journal Article
Are Randomized Caches Truly Random? Formal Analysis of Randomized-Partitioned Caches
Chakraborty, Anirban, Bhattacharya, Sarani, Saha, Sayandeep, Mukhopadhyay, Debdeep
Published in 2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA) (01.02.2023)
Published in 2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA) (01.02.2023)
Get full text
Conference Proceeding
Whispering MLaaS: Exploiting Timing Channels to Compromise User Privacy in Deep Neural Networks
Shukla, Shubhi, Alam, Manaar, Bhattacharya, Sarani, Mitra, Pabitra, Mukhopadhyay, Debdeep
Published in IACR transactions on cryptographic hardware and embedded systems (06.03.2023)
Published in IACR transactions on cryptographic hardware and embedded systems (06.03.2023)
Get full text
Journal Article
Whispering MLaaS
Shubhi Shukla, Manaar Alam, Sarani Bhattacharya, Pabitra Mitra, Debdeep Mukhopadhyay
Published in IACR transactions on cryptographic hardware and embedded systems (01.03.2023)
Published in IACR transactions on cryptographic hardware and embedded systems (01.03.2023)
Get full text
Journal Article
Online Detection and Reactive Countermeasure for Leakage from BPU Using TVLA
Bhattacharya, Sarani, Bhasin, Shivam, Mukhopadhyay, Debdeep
Published in 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID) (01.01.2018)
Published in 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID) (01.01.2018)
Get full text
Conference Proceeding
Customized Instructions for Protection Against Memory Integrity Attacks
Basu Roy, Debapriya, Alam, Manaar, Bhattacharya, Sarani, Govindan, Vidya, Regazzoni, Francesco, Chakraborty, Rajat Subhra, Mukhopadhyay, Debdeep
Published in IEEE embedded systems letters (01.09.2018)
Published in IEEE embedded systems letters (01.09.2018)
Get full text
Journal Article
Template attack on SPA and FA resistant implementation of Montgomery ladder
Chakraborty, Abhishek, Bhattacharya, Sarani, Dixit, Tanu Hari, Rebeiro, Chester, Mukhopadhyay, Debdeep
Published in IET information security (01.09.2016)
Published in IET information security (01.09.2016)
Get full text
Journal Article
A practical key-recovery attack on LWE-based key-encapsulation mechanism schemes using Rowhammer
Mondal, Puja, Kundu, Suparna, Bhattacharya, Sarani, Karmakar, Angshuman, Verbauwhede, Ingrid
Year of Publication 14.11.2023
Year of Publication 14.11.2023
Get full text
Journal Article
On the Amplification of Cache Occupancy Attacks in Randomized Cache Architectures
Chakraborty, Anirban, Mishra, Nimish, Saha, Sayandeep, Bhattacharya, Sarani, Mukhopadhyay, Debdeep
Year of Publication 08.10.2023
Year of Publication 08.10.2023
Get full text
Journal Article
A short note on the paper `Are Randomized Caches Really Random?
Chakraborty, Anirban, Bhattacharya, Sarani, Saha, Sayandeep, Mukhopadhyay, Debdeep
Year of Publication 03.04.2023
Year of Publication 03.04.2023
Get full text
Journal Article