Sarani Bhattacharya
Sarani Bhattacharya
Post Doctoral Research Fellow, COSIC, KU Leuven
Verified email at esat.kuleuven.be
Title
Cited by
Cited by
Year
Curious case of rowhammer: flipping secret exponent bits using timing analysis
S Bhattacharya, D Mukhopadhyay
International Conference on Cryptographic Hardware and Embedded Systems, 602-624, 2016
712016
Who watches the watchmen?: Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms
S Bhattacharya, D Mukhopadhyay
International Workshop on Cryptographic Hardware and Embedded Systems, 248-266, 2015
532015
Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks.
M Alam, S Bhattacharya, D Mukhopadhyay, S Bhattacharya
IACR Cryptol. ePrint Arch. 2017, 564, 2017
402017
Rapper: Ransomware prevention via performance counters
M Alam, S Sinha, S Bhattacharya, S Dutta, D Mukhopadhyay, ...
arXiv preprint arXiv:2004.01712, 2020
272020
Timing channels in cryptography: a micro-architectural perspective
C Rebeiro, D Mukhopadhyay, S Bhattacharya
Springer, 2014
252014
Hardware prefetchers leak: A revisit of SVF for cache-timing attacks
S Bhattacharya, C Rebeiro, D Mukhopadhyay
2012 45th Annual IEEE/ACM International Symposium on Microarchitecture …, 2012
192012
Formal fault analysis of branch predictors: attacking countermeasures of asymmetric key ciphers
S Bhattacharya, D Mukhopadhyay
Journal of Cryptographic Engineering 7 (4), 299-310, 2017
112017
Template Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls.
S Bhattacharya, C Maurice, S Bhasin, D Mukhopadhyay
IACR Cryptol. ePrint Arch. 2017, 968, 2017
112017
Rapid detection of Rowhammer attacks using dynamic skewed hash tree
S Vig, S Bhattacharya, D Mukhopadhyay, SK Lam
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
92018
Advanced fault attacks in software: Exploiting the RowHammer bug
S Bhattacharya, D Mukhopadhyay
Fault Tolerant Architectures for Cryptography and Hardware Security, 111-135, 2018
82018
SmashClean: A hardware level mitigation to stack smashing attacks in OpenRISC
M Alam, DB Roy, S Bhattacharya, V Govindan, RS Chakraborty, ...
2016 ACM/IEEE International Conference on Formal Methods and Models for …, 2016
82016
An introduction to timing attacks
C Rebeiro, D Mukhopadhyay, S Bhattacharya
Timing channels in cryptography, 1-11, 2015
82015
RATAFIA: ransomware analysis using time and frequency informed autoencoders
M Alam, S Bhattacharya, S Dutta, S Sinha, D Mukhopadhyay, ...
2019 IEEE International Symposium on Hardware Oriented Security and Trust …, 2019
72019
Unraveling timewarp: What all the fuzz is about?
S Bhattacharya, C Rebeiro, D Mukhopadhyay
Proceedings of the 2nd International Workshop on Hardware and Architectural …, 2013
62013
Utilizing performance counters for compromising public key ciphers
S Bhattacharya, D Mukhopadhyay
ACM Transactions on Privacy and Security (TOPS) 21 (1), 1-31, 2018
52018
A formal security analysis of even-odd sequential prefetching in profiled cache-timing attacks
S Bhattacharya, C Rebeiro, D Mukhopadhyay
Proceedings of the Hardware and Architectural Support for Security and …, 2016
52016
Search for a new scalar resonance decaying to a pair of Z bosons in proton-proton collisions at root s= 13 TeV
AM Sirunyan, A Tumasyan, W Adam, F Ambrogi, E Asilar, T Bergauer, ...
Journal of High Energy Physics, 2018
42018
From threats subverting cloud security to a secure trust paradigm
S Bhattacharya, CRS Kumar
2017 International Conference on Inventive Communication and Computational …, 2017
42017
Template attack on SPA and FA resistant implementation of montgomery ladder
A Chakraborty, S Bhattacharya, TH Dixit, C Rebeiro, D Mukhopadhyay
IET Information Security 10 (5), 245-251, 2016
42016
Fault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses.
S Bhattacharya, D Mukhopadhyay
IACR Cryptol. ePrint Arch. 2014, 790, 2014
42014
The system can't perform the operation now. Try again later.
Articles 1–20