Curious case of rowhammer: flipping secret exponent bits using timing analysis S Bhattacharya, D Mukhopadhyay International Conference on Cryptographic Hardware and Embedded Systems, 602-624, 2016 | 86 | 2016 |
Performance counters to rescue: A machine learning based safeguard against micro-architectural side-channel-attacks M Alam, S Bhattacharya, D Mukhopadhyay, S Bhattacharya Cryptology ePrint Archive, 2017 | 61 | 2017 |
Who watches the watchmen?: Utilizing performance monitors for compromising keys of RSA on Intel platforms S Bhattacharya, D Mukhopadhyay International Workshop on Cryptographic Hardware and Embedded Systems, 248-266, 2015 | 60 | 2015 |
Rapper: Ransomware prevention via performance counters M Alam, S Sinha, S Bhattacharya, S Dutta, D Mukhopadhyay, ... arXiv preprint arXiv:2004.01712, 2020 | 43 | 2020 |
Timing channels in cryptography: a micro-architectural perspective C Rebeiro, D Mukhopadhyay, S Bhattacharya Springer, 2014 | 30 | 2014 |
Hardware prefetchers leak: A revisit of SVF for cache-timing attacks S Bhattacharya, C Rebeiro, D Mukhopadhyay 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture …, 2012 | 19 | 2012 |
RATAFIA: ransomware analysis using time and frequency informed autoencoders M Alam, S Bhattacharya, S Dutta, S Sinha, D Mukhopadhyay, ... 2019 IEEE International Symposium on Hardware Oriented Security and Trust …, 2019 | 16 | 2019 |
Rapid detection of Rowhammer attacks using dynamic skewed hash tree S Vig, S Bhattacharya, D Mukhopadhyay, SK Lam Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018 | 13 | 2018 |
Formal fault analysis of branch predictors: attacking countermeasures of asymmetric key ciphers S Bhattacharya, D Mukhopadhyay Journal of Cryptographic Engineering 7 (4), 299-310, 2017 | 12 | 2017 |
Template attack on blinded scalar multiplication with asynchronous perf-ioctl calls S Bhattacharya, C Maurice, S Bhasin, D Mukhopadhyay Cryptology ePrint Archive, 2017 | 11 | 2017 |
SmashClean: A hardware level mitigation to stack smashing attacks in OpenRISC M Alam, DB Roy, S Bhattacharya, V Govindan, RS Chakraborty, ... 2016 ACM/IEEE International Conference on Formal Methods and Models for …, 2016 | 11 | 2016 |
An introduction to timing attacks C Rebeiro, D Mukhopadhyay, S Bhattacharya Timing channels in cryptography, 1-11, 2015 | 11 | 2015 |
Advanced fault attacks in software: Exploiting the RowHammer bug S Bhattacharya, D Mukhopadhyay Fault Tolerant Architectures for Cryptography and Hardware Security, 111-135, 2018 | 9 | 2018 |
Fault attack revealing secret keys of exponentiation algorithms from branch prediction misses S Bhattacharya, D Mukhopadhyay Cryptology ePrint Archive, 2014 | 7 | 2014 |
Unraveling timewarp: What all the fuzz is about? S Bhattacharya, C Rebeiro, D Mukhopadhyay Proceedings of the 2nd International Workshop on Hardware and Architectural …, 2013 | 7 | 2013 |
Branch prediction attack on blinded scalar multiplication S Bhattacharya, C Maurice, S Bhasin, D Mukhopadhyay IEEE Transactions on Computers 69 (5), 633-648, 2019 | 6 | 2019 |
Utilizing performance counters for compromising public key ciphers S Bhattacharya, D Mukhopadhyay ACM Transactions on Privacy and Security (TOPS) 21 (1), 1-31, 2018 | 6 | 2018 |
Template attack on SPA and FA resistant implementation of montgomery ladder A Chakraborty, S Bhattacharya, TH Dixit, C Rebeiro, D Mukhopadhyay IET Information Security 10 (5), 245-251, 2016 | 6 | 2016 |
A formal security analysis of even-odd sequential prefetching in profiled cache-timing attacks S Bhattacharya, C Rebeiro, D Mukhopadhyay Proceedings of the Hardware and Architectural Support for Security and …, 2016 | 6 | 2016 |
From threats subverting cloud security to a secure trust paradigm S Bhattacharya, CRS Kumar 2017 International Conference on Inventive Communication and Computational …, 2017 | 4 | 2017 |