default search action
Urbi Chatterjee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Oswa M. Amro, Vishesh Mishra, Rohit Negi, Urbi Chatterjee:
CPU-Doctor: when a device's heart-beat can be an acoustic side-channel disassembler. J. Cryptogr. Eng. 14(3): 441-462 (2024) - [c25]Navajit Singh Baban, Jiarui Zhou, Sarani Bhattacharya, Urbi Chatterjee, Sukanta Bhattacharjee, Sanjairaj Vijayavenkataraman, Yong-Ak Song, Debdeep Mukhopadhyay, Krishnendu Chakrabarty, Ramesh Karri:
Physically Unclonable Fingerprints for Authentication. ACNS Workshops (2) 2024: 235-239 - [c24]Neelofar Hassan, Urbi Chatterjee:
Machine Learning Attacks on Challenge-Response Obfuscations in Strong PUFs. HOST 2024: 361-372 - [c23]Akash Panzade, Deepak Kumar, Mahendra Rathor, Urbi Chatterjee:
Vig-WaR: Vigilantly Watching Ransomware for Robust Trapping and Containment. VLSID 2024: 449-454 - 2023
- [j11]Kuheli Pratihar, Urbi Chatterjee, Manaar Alam, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Birds of the Same Feather Flock Together: A Dual-Mode Circuit Candidate for Strong PUF-TRNG Functionalities. IEEE Trans. Computers 72(6): 1636-1651 (2023) - [j10]Anand Agrawal, Urbi Chatterjee, Rajib Ranjan Maiti:
CheckShake: Passively Detecting Anomaly in Wi-Fi Security Handshake Using Gradient Boosting Based Ensemble Learning. IEEE Trans. Dependable Secur. Comput. 20(6): 4868-4880 (2023) - [j9]Vishesh Mishra, Sparsh Mittal, Neelofar Hassan, Rekha Singhal, Urbi Chatterjee:
VADF: Versatile Approximate Data Formats for Energy-Efficient Computing. ACM Trans. Embed. Comput. Syst. 22(5s): 111:1-111:21 (2023) - [c22]Mahendra Rathor, Vishesh Mishra, Urbi Chatterjee:
Aiding to Multimedia Accelerators: A Hardware Design for Efficient Rounding of Binary Floating Point Numbers. DATE 2023: 1-6 - [c21]Navajit Singh Baban, Ajymurat Orozaliev, Yong-Ak Song, Urbi Chatterjee, Sankalp Bose, Sukanta Bhattacharjee, Ramesh Karri, Krishnendu Chakrabarty:
Biochip-PUF: Physically Unclonable Function for Microfluidic Biochips. ITC 2023: 166-175 - [c20]Vishesh Mishra, Neelofar Hassan, Akshay Mehta, Urbi Chatterjee:
DARK-Adders: Digital Hardware Trojan Attack on Block-based Approximate Adders. VLSID 2023: 371-376 - [i11]Dipesh, Vishesh Mishra, Urbi Chatterjee:
B2T: The Third Logical Value of a Bit. IACR Cryptol. ePrint Arch. 2023: 1871 (2023) - 2022
- [j8]Swapnil Gade, Urbi Chatterjee, Debdeep Mukhopadhyay:
PAKAMAC: A PUF-based Keyless Automotive Entry System with Mutual Authentication. J. Hardw. Syst. Secur. 6(3-4): 67-78 (2022) - [j7]Harishma Boyapally, Paulson Mathew, Sikhar Patranabis, Urbi Chatterjee, Umang Agarwal, Manu Maheshwari, Soumyajit Dey, Debdeep Mukhopadhyay:
Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart Meters. IEEE Trans. Dependable Secur. Comput. 19(1): 663-680 (2022) - [j6]Durba Chatterjee, Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Aritra Hazra, Debdeep Mukhopadhyay:
Physically Related Functions: Exploiting Related Inputs of PUFs for Authenticated-Key Exchange. IEEE Trans. Inf. Forensics Secur. 17: 3847-3862 (2022) - [c19]Nimish Mishra, Anirban Chakraborty, Urbi Chatterjee, Debdeep Mukhopadhyay:
Time's a Thief of Memory - Breaking Multi-tenant Isolation in TrustZones Through Timing Based Bidirectional Covert Channels. CARDIS 2022: 3-24 - [c18]Anand Agrawal, Urbi Chatterjee, Rajib Ranjan Maiti:
kTRACKER: Passively Tracking KRACK using ML Model. CODASPY 2022: 364-366 - [c17]Akashdeep Saha, Urbi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
DIP Learning on CAS-Lock: Using Distinguishing Input Patterns for Attacking Logic Locking. DATE 2022: 688-693 - [c16]Soumyadyuti Ghosh, Urbi Chatterjee, Soumyajit Dey, Debdeep Mukhopadhyay:
Is the Whole lesser than its Parts? Breaking an Aggregation based Privacy aware Metering Algorithm. DSD 2022: 921-929 - [c15]Abhishek Revskar, Mahendra Rathor, Urbi Chatterjee:
Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log. SPACE 2022: 185-203 - [c14]Manthan Kojage, Neelofar Hassan, Urbi Chatterjee:
Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs. SPACE 2022: 204-224 - [i10]Vishesh Mishra, Urbi Chatterjee:
VMEO: Vector Modeling Errors and Operands for Approximate adders. IACR Cryptol. ePrint Arch. 2022: 1120 (2022) - [i9]Chandan Kumar, Mahendra Rathor, Urbi Chatterjee:
Sorting Attacks Resilient Authentication Protocol for CMOS Image Sensor Based PUF. IACR Cryptol. ePrint Arch. 2022: 1402 (2022) - 2021
- [j5]Urbi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
3PAA: A Private PUF Protocol for Anonymous Authentication. IEEE Trans. Inf. Forensics Secur. 16: 756-769 (2021) - [c13]Soumyadyuti Ghosh, Urbi Chatterjee, Durba Chatterjee, Rumia Masburah, Debdeep Mukhopadhyay, Soumyajit Dey:
Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchain. ACNS Workshops 2021: 252-275 - [c12]Chandan Kumar Chaudhary, Urbi Chatterjee, Debdeep Mukhopadhyay:
Auto-PUFChain: An Automated Interaction Tool for PUFs and Blockchain in Electronic Supply Chain. AsianHOST 2021: 1-4 - [c11]Hirak Mondal, Urbi Chatterjee:
Revisiting UAV Authentication Schemes: Practical Attacks on Aviation Infrastructure. AsianHOST 2021: 1-6 - [c10]Durba Chatterjee, Urbi Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra:
SACReD: An Attack Framework on SAC Resistant Delay-PUFs leveraging Bias and Reliability Factors. DAC 2021: 85-90 - [c9]Pushpraj Naik, Urbi Chatterjee:
Network Data Remanence Side Channel Attack on SPREAD, H-SPREAD and Reverse AODV. SPACE 2021: 129-147 - [i8]Durba Chatterjee, Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay, Aritra Hazra:
Physically Related Functions: A New Paradigm for Light-weight Key-Exchange. IACR Cryptol. ePrint Arch. 2021: 389 (2021) - [i7]Harishma Boyapally, Urbi Chatterjee, Debdeep Mukhopadhyay:
On the Validity of Spoofing Attack Against Safe is the New Smart. IACR Cryptol. ePrint Arch. 2021: 395 (2021) - [i6]Akashdeep Saha, Urbi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Open Sesame: A Novel Non-SAT-Attack against CAS-Lock. IACR Cryptol. ePrint Arch. 2021: 791 (2021) - [i5]Kuheli Pratihar, Urbi Chatterjee, Manaar Alam, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
A Tale of Twin Primitives: Single-chip Solution for PUFs and TRNGs. IACR Cryptol. ePrint Arch. 2021: 1067 (2021) - [i4]Anand Agrawal, Urbi Chatterjee, Rajib Ranjan Maiti:
CheckShake: Passively Detecting Anomaly in Wi-Fi Security Handshake using Gradient Boosting based Ensemble Learning. IACR Cryptol. ePrint Arch. 2021: 1702 (2021) - 2020
- [j4]Urbi Chatterjee, Soumi Chatterjee, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Machine Learning Assisted PUF Calibration for Trustworthy Proof of Sensor Data in IoT. ACM Trans. Design Autom. Electr. Syst. 25(4): 32:1-32:21 (2020) - [c8]Urbi Chatterjee, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh M. Prabhu:
Stupify: A Hardware Countermeasure of KRACKs in WPA2 using Physically Unclonable Functions. WWW (Companion Volume) 2020: 217-221
2010 – 2019
- 2019
- [j3]Urbi Chatterjee, Vidya Govindan, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh M. Prabhu:
Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database. IEEE Trans. Dependable Secur. Comput. 16(3): 424-437 (2019) - [c7]Urbi Chatterjee, Pranesh Santikellur, Rajat Sadhukhan, Vidya Govindan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
United We Stand: A Threshold Signature Scheme for Identifying Outliers in PLCs. DAC 2019: 224 - [c6]Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Revisiting the Security of LPN Based RFID Authentication Protocol and Potential Exploits in Hardware Implementations. SPACE 2019: 214-230 - 2018
- [c5]Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay:
POSTER: Authenticated Key-Exchange Protocol for Heterogeneous CPS. AsiaCCS 2018: 849-851 - [c4]Urbi Chatterjee, Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Trustworthy proofs for sensor data using FPGA based physically unclonable functions. DATE 2018: 1504-1507 - [c3]Urbi Chatterjee, Rajat Sadhukhan, Vidya Govindan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Sweta Pati, Debashis Mahata, Mukesh M. Prabhu:
PUFSSL: An OpenSSL Extension for PUF based Authentication. DSP 2018: 1-5 - 2017
- [j2]Urbi Chatterjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
A PUF-Based Secure Communication Protocol for IoT. ACM Trans. Embed. Comput. Syst. 16(3): 67:1-67:25 (2017) - [c2]Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse. HOST 2017: 167 - [i3]Urbi Chatterjee, Vidya Govindan, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh M. Prabhu:
PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs. IACR Cryptol. ePrint Arch. 2017: 422 (2017) - 2016
- [j1]Urbi Chatterjee, Rajat Subhra Chakraborty, Hitesh Kapoor, Debdeep Mukhopadhyay:
Theory and Application of Delay Constraints in Arbiter PUF. ACM Trans. Embed. Comput. Syst. 15(1): 10:1-10:20 (2016) - [c1]Urbi Chatterjee, Rajat Subhra Chakraborty, Jimson Mathew, Dhiraj K. Pradhan:
Memristor Based Arbiter PUF: Cryptanalysis Threat and Its Mitigation. VLSID 2016: 535-540 - [i2]Urbi Chatterjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
A PUF-based Secure Communication Protocol for IoT. IACR Cryptol. ePrint Arch. 2016: 674 (2016) - [i1]Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse. IACR Cryptol. ePrint Arch. 2016: 1149 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint