default search action
Patanjali SLPSK
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Christopher Vega, Patanjali SLPSK, Swarup Bhunia:
IOLock: An Input/Output Locking Scheme for Protection Against Reverse Engineering Attacks. IEEE Trans. Very Large Scale Integr. Syst. 32(2): 347-360 (2024) - 2023
- [j9]Patanjali SLPSK, Abhishek Anil Nair, Chester Rebeiro, Swarup Bhunia:
SIGNED: A Challenge-Response Scheme for Electronic Hardware Watermarking. IEEE Trans. Computers 72(6): 1763-1777 (2023) - [j8]Patanjali SLPSK, Sandip Ray, Swarup Bhunia:
TREEHOUSE: A Secure Asset Management Infrastructure for Protecting 3DIC Designs. IEEE Trans. Computers 72(8): 2306-2320 (2023) - [j7]Jonathan Cruz, Patanjali SLPSK, Pravin Gaikwad, Swarup Bhunia:
TVF: A Metric for Quantifying Vulnerability Against Hardware Trojan Attacks. IEEE Trans. Very Large Scale Integr. Syst. 31(7): 969-979 (2023) - 2022
- [j6]Shubhra Deb Paul, Fengchao Zhang, Patanjali SLPSK, Amit Ranjan Trivedi, Swarup Bhunia:
RIHANN: Remote IoT Hardware Authentication With Intrinsic Identifiers. IEEE Internet Things J. 9(24): 24615-24627 (2022) - [c8]Prithwish Basu Roy, Patanjali SLPSK, Chester Rebeiro:
Avatar: Reinforcing Fault Attack Countermeasures in EDA with Fault Transformations. ASP-DAC 2022: 417-422 - 2021
- [j5]Fengchao Zhang, Shubhra Deb Paul, Patanjali SLPSK, Amit Ranjan Trivedi, Swarup Bhunia:
On Database-Free Authentication of Microelectronic Components. IEEE Trans. Very Large Scale Integr. Syst. 29(1): 149-161 (2021) - [c7]Shuo Yang, Prabuddha Chakraborty, Patanjali SLPSK, Swarup Bhunia:
Trusted Electronic Systems with Untrusted COTS. ISQED 2021: 198-203 - 2020
- [j4]Rahul Bodduna, Vinod Ganesan, Patanjali SLPSK, Kamakoti Veezhinathan, Chester Rebeiro:
Brutus: Refuting the Security Claims of the Cache Timing Randomization Countermeasure Proposed in CEASER. IEEE Comput. Archit. Lett. 19(1): 9-12 (2020) - [j3]Tamzidul Hoque, Patanjali SLPSK, Swarup Bhunia:
Trust Issues in Microelectronics: The Concerns and the Countermeasures. IEEE Consumer Electron. Mag. 9(6): 72-83 (2020) - [c6]Milind Srivastava, Patanjali SLPSK, Indrani Roy, Chester Rebeiro, Aritra Hazra, Swarup Bhunia:
SOLOMON: An Automated Framework for Detecting Fault Attack Vulnerabilities in Hardware. DATE 2020: 310-313 - [c5]Gargi Mitra, Prasanna Karthik Vairam, Patanjali SLPSK, Nitin Chandrachoodan, Kamakoti Veezhinathan:
Depending on HTTP/2 for Privacy? Good Luck! DSN 2020: 278-285 - [c4]Tamzidul Hoque, Patanjali SLPSK, Swarup Bhunia:
Trust Issues in COTS: The Challenges and Emerging Solution. ACM Great Lakes Symposium on VLSI 2020: 211-216 - [i4]Abhishek Nair, Patanjali SLPSK, Chester Rebeiro, Swarup Bhunia:
SIGNED: A Challenge-Response Based Interrogation Scheme for Simultaneous Watermarking and Trojan Detection. CoRR abs/2010.05209 (2020) - [i3]Christopher Vega, Patanjali SLPSK, Shubhra Deb Paul, Swarup Bhunia:
MeLPUF: Memory in Logic PUF. CoRR abs/2012.03162 (2020)
2010 – 2019
- 2019
- [c3]Patanjali SLPSK, Prasanna Karthik Vairam, Chester Rebeiro, V. Kamakoti:
Karna: A Gate-Sizing based Security Aware EDA Flow for Improved Power Side-Channel Attack Protection. ICCAD 2019: 1-8 - [c2]Gargi Mitra, Prasanna Karthik Vairam, Patanjali SLPSK, Nitin Chandrachoodan, Kamakoti Veezhinathan:
White Mirror: Leaking Sensitive Information from Interactive Netflix Movies using Encrypted Traffic Analysis. SIGCOMM Posters and Demos 2019: 122-124 - [i2]Gargi Mitra, Prasanna Karthik Vairam, Patanjali SLPSK, Nitin Chandrachoodan, Kamakoti Veezhinathan:
White Mirror: Leaking Sensitive Information from Interactive Netflix Movies using Encrypted Traffic Analysis. CoRR abs/1903.06475 (2019) - 2018
- [j2]Gnanambikai Krishnakumar, Patanjali SLPSK, Prasanna Karthik Vairam, Chester Rebeiro, Kamakoti Veezhinathan:
GANDALF: A Fine-Grained Hardware-Software Co-Design for Preventing Memory Attacks. IEEE Embed. Syst. Lett. 10(3): 83-86 (2018) - [j1]Patanjali SLPSK, Milan Patnaik, Seetal Potluri, V. Kamakoti:
MLTimer: Leakage Power Minimization in Digital Circuits Using Machine Learning and Adaptive Lazy Timing Analysis. J. Low Power Electron. 14(2): 285-301 (2018) - 2017
- [i1]Gnanambikai Krishnakumar, Patanjali SLPSK, Prasanna Karthik Vairam, Chester Rebeiro:
GANDALF: A fine-grained hardware-software co-design for preventing memory attacks. CoRR abs/1702.07223 (2017) - 2012
- [c1]Ashok Gautham, Kunal Korgaonkar, Patanjali SLPSK, Shankar Balachandran, Kamakoti Veezhinathan:
The Implications of Shared Data Synchronization Techniques on Multi-Core Energy Efficiency. HotPower 2012
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint