Patanjali SLPSK

Orcid: 0000-0003-0754-2219

According to our database1, Patanjali SLPSK authored at least 21 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
IOLock: An Input/Output Locking Scheme for Protection Against Reverse Engineering Attacks.
IEEE Trans. Very Large Scale Integr. Syst., February, 2024

2023
TREEHOUSE: A Secure Asset Management Infrastructure for Protecting 3DIC Designs.
IEEE Trans. Computers, August, 2023

SIGNED: A Challenge-Response Scheme for Electronic Hardware Watermarking.
IEEE Trans. Computers, June, 2023

TVF: A Metric for Quantifying Vulnerability Against Hardware Trojan Attacks.
IEEE Trans. Very Large Scale Integr. Syst., 2023

2022
RIHANN: Remote IoT Hardware Authentication With Intrinsic Identifiers.
IEEE Internet Things J., 2022

Avatar: Reinforcing Fault Attack Countermeasures in EDA with Fault Transformations.
Proceedings of the 27th Asia and South Pacific Design Automation Conference, 2022

2021
On Database-Free Authentication of Microelectronic Components.
IEEE Trans. Very Large Scale Integr. Syst., 2021

Trusted Electronic Systems with Untrusted COTS.
Proceedings of the 22nd International Symposium on Quality Electronic Design, 2021

2020
MeLPUF: Memory in Logic PUF.
CoRR, 2020

SIGNED: A Challenge-Response Based Interrogation Scheme for Simultaneous Watermarking and Trojan Detection.
CoRR, 2020

Trust Issues in Microelectronics: The Concerns and the Countermeasures.
IEEE Consumer Electron. Mag., 2020

Brutus: Refuting the Security Claims of the Cache Timing Randomization Countermeasure Proposed in CEASER.
IEEE Comput. Archit. Lett., 2020

Trust Issues in COTS: The Challenges and Emerging Solution.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

Depending on HTTP/2 for Privacy? Good Luck!
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

SOLOMON: An Automated Framework for Detecting Fault Attack Vulnerabilities in Hardware.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

2019
White Mirror: Leaking Sensitive Information from Interactive Netflix Movies using Encrypted Traffic Analysis.
Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, 2019

Karna: A Gate-Sizing based Security Aware EDA Flow for Improved Power Side-Channel Attack Protection.
Proceedings of the International Conference on Computer-Aided Design, 2019

2018
MLTimer: Leakage Power Minimization in Digital Circuits Using Machine Learning and Adaptive Lazy Timing Analysis.
J. Low Power Electron., 2018

GANDALF: A Fine-Grained Hardware-Software Co-Design for Preventing Memory Attacks.
IEEE Embed. Syst. Lett., 2018

2017
GANDALF: A fine-grained hardware-software co-design for preventing memory attacks.
CoRR, 2017

2012
The Implications of Shared Data Synchronization Techniques on Multi-Core Energy Efficiency.
Proceedings of the 2012 Workshop on Power-Aware Computing Systems, HotPower'12, 2012


  Loading...