Urbi Chatterjee

Orcid: 0000-0002-4631-2208

According to our database1, Urbi Chatterjee authored at least 42 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Vig-WaR: Vigilantly Watching Ransomware for Robust Trapping and Containment.
Proceedings of the 37th International Conference on VLSI Design and 23rd International Conference on Embedded Systems, 2024

2023
VADF: Versatile Approximate Data Formats for Energy-Efficient Computing.
ACM Trans. Embed. Comput. Syst., October, 2023

Birds of the Same Feather Flock Together: A Dual-Mode Circuit Candidate for Strong PUF-TRNG Functionalities.
IEEE Trans. Computers, June, 2023

B2T: The Third Logical Value of a Bit.
IACR Cryptol. ePrint Arch., 2023

DARK-Adders: Digital Hardware Trojan Attack on Block-based Approximate Adders.
Proceedings of the 36th International Conference on VLSI Design and 2023 22nd International Conference on Embedded Systems, 2023

Biochip-PUF: Physically Unclonable Function for Microfluidic Biochips.
Proceedings of the IEEE International Test Conference, 2023

Aiding to Multimedia Accelerators: A Hardware Design for Efficient Rounding of Binary Floating Point Numbers.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

2022
Physically Related Functions: Exploiting Related Inputs of PUFs for Authenticated-Key Exchange.
IEEE Trans. Inf. Forensics Secur., 2022

Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart Meters.
IEEE Trans. Dependable Secur. Comput., 2022

PAKAMAC: A PUF-based Keyless Automotive Entry System with Mutual Authentication.
J. Hardw. Syst. Secur., 2022

VMEO: Vector Modeling Errors and Operands for Approximate adders.
IACR Cryptol. ePrint Arch., 2022

Sorting Attacks Resilient Authentication Protocol for CMOS Image Sensor Based PUF.
IACR Cryptol. ePrint Arch., 2022

Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2022

Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2022

Is the Whole lesser than its Parts? Breaking an Aggregation based Privacy aware Metering Algorithm.
Proceedings of the 25th Euromicro Conference on Digital System Design, 2022

DIP Learning on CAS-Lock: Using Distinguishing Input Patterns for Attacking Logic Locking.
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022

kTRACKER: Passively Tracking KRACK using ML Model.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

Time's a Thief of Memory - Breaking Multi-tenant Isolation in TrustZones Through Timing Based Bidirectional Covert Channels.
Proceedings of the Smart Card Research and Advanced Applications, 2022

2021
3PAA: A Private PUF Protocol for Anonymous Authentication.
IEEE Trans. Inf. Forensics Secur., 2021

Open Sesame: A Novel Non-SAT-Attack against CAS-Lock.
IACR Cryptol. ePrint Arch., 2021

A Tale of Twin Primitives: Single-chip Solution for PUFs and TRNGs.
IACR Cryptol. ePrint Arch., 2021

Physically Related Functions: A New Paradigm for Light-weight Key-Exchange.
IACR Cryptol. ePrint Arch., 2021

On the Validity of Spoofing Attack Against Safe is the New Smart.
IACR Cryptol. ePrint Arch., 2021

CheckShake: Passively Detecting Anomaly in Wi-Fi Security Handshake using Gradient Boosting based Ensemble Learning.
IACR Cryptol. ePrint Arch., 2021

Network Data Remanence Side Channel Attack on SPREAD, H-SPREAD and Reverse AODV.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2021

SACReD: An Attack Framework on SAC Resistant Delay-PUFs leveraging Bias and Reliability Factors.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

Revisiting UAV Authentication Schemes: Practical Attacks on Aviation Infrastructure.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2021

Auto-PUFChain: An Automated Interaction Tool for PUFs and Blockchain in Electronic Supply Chain.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2021

Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchain.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
Machine Learning Assisted PUF Calibration for Trustworthy Proof of Sensor Data in IoT.
ACM Trans. Design Autom. Electr. Syst., 2020

Stupify: A Hardware Countermeasure of KRACKs in WPA2 using Physically Unclonable Functions.
Proceedings of the Companion of The 2020 Web Conference 2020, 2020

2019
Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database.
IEEE Trans. Dependable Secur. Comput., 2019

Revisiting the Security of LPN Based RFID Authentication Protocol and Potential Exploits in Hardware Implementations.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019

United We Stand: A Threshold Signature Scheme for Identifying Outliers in PLCs.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

2018
PUFSSL: An OpenSSL Extension for PUF based Authentication.
Proceedings of the 23rd IEEE International Conference on Digital Signal Processing, 2018

Trustworthy proofs for sensor data using FPGA based physically unclonable functions.
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018

POSTER: Authenticated Key-Exchange Protocol for Heterogeneous CPS.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
A PUF-Based Secure Communication Protocol for IoT.
ACM Trans. Embed. Comput. Syst., 2017

PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs.
IACR Cryptol. ePrint Arch., 2017

2016
Theory and Application of Delay Constraints in Arbiter PUF.
ACM Trans. Embed. Comput. Syst., 2016

Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse.
IACR Cryptol. ePrint Arch., 2016

Memristor Based Arbiter PUF: Cryptanalysis Threat and Its Mitigation.
Proceedings of the 29th International Conference on VLSI Design and 15th International Conference on Embedded Systems, 2016


  Loading...