Follow
Sarani Bhattacharya
Title
Cited by
Cited by
Year
Curious case of rowhammer: flipping secret exponent bits using timing analysis
S Bhattacharya, D Mukhopadhyay
Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016
1312016
Performance counters to rescue: A machine learning based safeguard against micro-architectural side-channel-attacks
M Alam, S Bhattacharya, D Mukhopadhyay, S Bhattacharya
Cryptology ePrint Archive, 2017
912017
Rapper: Ransomware prevention via performance counters
M Alam, S Sinha, S Bhattacharya, S Dutta, D Mukhopadhyay, ...
arXiv preprint arXiv:2004.01712, 2020
842020
Who watches the watchmen?: Utilizing performance monitors for compromising keys of RSA on Intel platforms
S Bhattacharya, D Mukhopadhyay
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
812015
RATAFIA: Ransomware analysis using time and frequency informed autoencoders
M Alam, S Bhattacharya, S Dutta, S Sinha, D Mukhopadhyay, ...
2019 IEEE International Symposium on Hardware Oriented Security and Trust …, 2019
422019
Rapid detection of Rowhammer attacks using dynamic skewed hash tree
S Vig, S Bhattacharya, D Mukhopadhyay, SK Lam
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
352018
Timing channels in cryptography: a micro-architectural perspective
C Rebeiro, D Mukhopadhyay, S Bhattacharya
Springer, 2014
342014
Advanced fault attacks in software: Exploiting the RowHammer bug
S Bhattacharya, D Mukhopadhyay
Fault Tolerant Architectures for Cryptography and Hardware Security, 111-135, 2018
282018
Hardware prefetchers leak: A revisit of SVF for cache-timing attacks
S Bhattacharya, C Rebeiro, D Mukhopadhyay
2012 45th Annual IEEE/ACM International Symposium on Microarchitecture …, 2012
262012
Victims Can Be Saviors: A Machine Learning--based Detection for Micro-Architectural Side-Channel Attacks
M Alam, S Bhattacharya, D Mukhopadhyay
ACM Journal on Emerging Technologies in Computing Systems (JETC) 17 (2), 1-31, 2021
172021
Template attack on blinded scalar multiplication with asynchronous perf-ioctl calls
S Bhattacharya, C Maurice, S Bhasin, D Mukhopadhyay
Cryptology ePrint Archive, 2017
172017
Branch prediction attack on blinded scalar multiplication
S Bhattacharya, C Maurice, S Bhasin, D Mukhopadhyay
IEEE Transactions on Computers 69 (5), 633-648, 2019
152019
Explframe: exploiting page frame cache for fault analysis of block ciphers
A Chakraborty, S Bhattacharya, S Saha, D Mukhopadhyay
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2020
132020
An introduction to timing attacks
C Rebeiro, D Mukhopadhyay, S Bhattacharya, C Rebeiro, ...
Timing Channels in Cryptography: A Micro-Architectural Perspective, 1-11, 2015
132015
Formal fault analysis of branch predictors: attacking countermeasures of asymmetric key ciphers
S Bhattacharya, D Mukhopadhyay
Journal of Cryptographic Engineering 7, 299-310, 2017
122017
SmashClean: A hardware level mitigation to stack smashing attacks in OpenRISC
M Alam, DB Roy, S Bhattacharya, V Govindan, RS Chakraborty, ...
2016 ACM/IEEE International Conference on Formal Methods and Models for …, 2016
122016
Utilizing performance counters for compromising public key ciphers
S Bhattacharya, D Mukhopadhyay
ACM Transactions on Privacy and Security (TOPS) 21 (1), 1-31, 2018
112018
A formal security analysis of even-odd sequential prefetching in profiled cache-timing attacks
S Bhattacharya, C Rebeiro, D Mukhopadhyay
Proceedings of the Hardware and Architectural Support for Security and …, 2016
102016
Template attack on SPA and FA resistant implementation of montgomery ladder
A Chakraborty, S Bhattacharya, TH Dixit, C Rebeiro, D Mukhopadhyay
IET information security 10 (5), 245-251, 2016
92016
Are randomized caches truly random? Formal analysis of randomized-partitioned caches
A Chakraborty, S Bhattacharya, S Saha, D Mukhopadhyay
2023 IEEE International Symposium on High-Performance Computer Architecture …, 2023
82023
The system can't perform the operation now. Try again later.
Articles 1–20