Urbi Chatterjee
Orcid: 0000-0002-4631-2208
According to our database1,
Urbi Chatterjee
authored at least 44 papers
between 2016 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 37th International Conference on VLSI Design and 23rd International Conference on Embedded Systems, 2024
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
2023
ACM Trans. Embed. Comput. Syst., October, 2023
Birds of the Same Feather Flock Together: A Dual-Mode Circuit Candidate for Strong PUF-TRNG Functionalities.
IEEE Trans. Computers, June, 2023
CheckShake: Passively Detecting Anomaly in Wi-Fi Security Handshake Using Gradient Boosting Based Ensemble Learning.
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the 36th International Conference on VLSI Design and 2023 22nd International Conference on Embedded Systems, 2023
Proceedings of the IEEE International Test Conference, 2023
Aiding to Multimedia Accelerators: A Hardware Design for Efficient Rounding of Binary Floating Point Numbers.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023
2022
Physically Related Functions: Exploiting Related Inputs of PUFs for Authenticated-Key Exchange.
IEEE Trans. Inf. Forensics Secur., 2022
Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart Meters.
IEEE Trans. Dependable Secur. Comput., 2022
J. Hardw. Syst. Secur., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2022
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2022
Is the Whole lesser than its Parts? Breaking an Aggregation based Privacy aware Metering Algorithm.
Proceedings of the 25th Euromicro Conference on Digital System Design, 2022
DIP Learning on CAS-Lock: Using Distinguishing Input Patterns for Attacking Logic Locking.
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Time's a Thief of Memory - Breaking Multi-tenant Isolation in TrustZones Through Timing Based Bidirectional Covert Channels.
Proceedings of the Smart Card Research and Advanced Applications, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2021
SACReD: An Attack Framework on SAC Resistant Delay-PUFs leveraging Bias and Reliability Factors.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2021
Auto-PUFChain: An Automated Interaction Tool for PUFs and Blockchain in Electronic Supply Chain.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2021
Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchain.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021
2020
Machine Learning Assisted PUF Calibration for Trustworthy Proof of Sensor Data in IoT.
ACM Trans. Design Autom. Electr. Syst., 2020
Stupify: A Hardware Countermeasure of KRACKs in WPA2 using Physically Unclonable Functions.
Proceedings of the Companion of The 2020 Web Conference 2020, 2020
2019
Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database.
IEEE Trans. Dependable Secur. Comput., 2019
Revisiting the Security of LPN Based RFID Authentication Protocol and Potential Exploits in Hardware Implementations.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
2018
Proceedings of the 23rd IEEE International Conference on Digital Signal Processing, 2018
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
ACM Trans. Embed. Comput. Syst., 2017
PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs.
IACR Cryptol. ePrint Arch., 2017
2016
ACM Trans. Embed. Comput. Syst., 2016
Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 29th International Conference on VLSI Design and 15th International Conference on Embedded Systems, 2016