Curious case of rowhammer: flipping secret exponent bits using timing analysis S Bhattacharya, D Mukhopadhyay Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016 | 131 | 2016 |
Performance counters to rescue: A machine learning based safeguard against micro-architectural side-channel-attacks M Alam, S Bhattacharya, D Mukhopadhyay, S Bhattacharya Cryptology ePrint Archive, 2017 | 91 | 2017 |
Rapper: Ransomware prevention via performance counters M Alam, S Sinha, S Bhattacharya, S Dutta, D Mukhopadhyay, ... arXiv preprint arXiv:2004.01712, 2020 | 84 | 2020 |
Who watches the watchmen?: Utilizing performance monitors for compromising keys of RSA on Intel platforms S Bhattacharya, D Mukhopadhyay Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015 | 81 | 2015 |
RATAFIA: Ransomware analysis using time and frequency informed autoencoders M Alam, S Bhattacharya, S Dutta, S Sinha, D Mukhopadhyay, ... 2019 IEEE International Symposium on Hardware Oriented Security and Trust …, 2019 | 42 | 2019 |
Rapid detection of Rowhammer attacks using dynamic skewed hash tree S Vig, S Bhattacharya, D Mukhopadhyay, SK Lam Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018 | 35 | 2018 |
Timing channels in cryptography: a micro-architectural perspective C Rebeiro, D Mukhopadhyay, S Bhattacharya Springer, 2014 | 34 | 2014 |
Advanced fault attacks in software: Exploiting the RowHammer bug S Bhattacharya, D Mukhopadhyay Fault Tolerant Architectures for Cryptography and Hardware Security, 111-135, 2018 | 28 | 2018 |
Hardware prefetchers leak: A revisit of SVF for cache-timing attacks S Bhattacharya, C Rebeiro, D Mukhopadhyay 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture …, 2012 | 26 | 2012 |
Victims Can Be Saviors: A Machine Learning--based Detection for Micro-Architectural Side-Channel Attacks M Alam, S Bhattacharya, D Mukhopadhyay ACM Journal on Emerging Technologies in Computing Systems (JETC) 17 (2), 1-31, 2021 | 17 | 2021 |
Template attack on blinded scalar multiplication with asynchronous perf-ioctl calls S Bhattacharya, C Maurice, S Bhasin, D Mukhopadhyay Cryptology ePrint Archive, 2017 | 17 | 2017 |
Branch prediction attack on blinded scalar multiplication S Bhattacharya, C Maurice, S Bhasin, D Mukhopadhyay IEEE Transactions on Computers 69 (5), 633-648, 2019 | 15 | 2019 |
Explframe: exploiting page frame cache for fault analysis of block ciphers A Chakraborty, S Bhattacharya, S Saha, D Mukhopadhyay 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2020 | 13 | 2020 |
An introduction to timing attacks C Rebeiro, D Mukhopadhyay, S Bhattacharya, C Rebeiro, ... Timing Channels in Cryptography: A Micro-Architectural Perspective, 1-11, 2015 | 13 | 2015 |
Formal fault analysis of branch predictors: attacking countermeasures of asymmetric key ciphers S Bhattacharya, D Mukhopadhyay Journal of Cryptographic Engineering 7, 299-310, 2017 | 12 | 2017 |
SmashClean: A hardware level mitigation to stack smashing attacks in OpenRISC M Alam, DB Roy, S Bhattacharya, V Govindan, RS Chakraborty, ... 2016 ACM/IEEE International Conference on Formal Methods and Models for …, 2016 | 12 | 2016 |
Utilizing performance counters for compromising public key ciphers S Bhattacharya, D Mukhopadhyay ACM Transactions on Privacy and Security (TOPS) 21 (1), 1-31, 2018 | 11 | 2018 |
A formal security analysis of even-odd sequential prefetching in profiled cache-timing attacks S Bhattacharya, C Rebeiro, D Mukhopadhyay Proceedings of the Hardware and Architectural Support for Security and …, 2016 | 10 | 2016 |
Template attack on SPA and FA resistant implementation of montgomery ladder A Chakraborty, S Bhattacharya, TH Dixit, C Rebeiro, D Mukhopadhyay IET information security 10 (5), 245-251, 2016 | 9 | 2016 |
Are randomized caches truly random? Formal analysis of randomized-partitioned caches A Chakraborty, S Bhattacharya, S Saha, D Mukhopadhyay 2023 IEEE International Symposium on High-Performance Computer Architecture …, 2023 | 8 | 2023 |