How secure are printed circuit boards against trojan attacks? S Ghosh, A Basak, S Bhunia IEEE Design & Test 32 (2), 7-16, 2014 | 95 | 2014 |
Security assurance for system-on-chip designs with untrusted IPs A Basak, S Bhunia, T Tkacik, S Ray IEEE Transactions on Information Forensics and Security 12 (7), 1515-1528, 2017 | 86 | 2017 |
Speculative interference attacks: Breaking invisible speculation schemes M Behnia, P Sahu, R Paccagnella, J Yu, ZN Zhao, X Zou, T Unterluggauer, ... Proceedings of the 26th ACM International Conference on Architectural …, 2021 | 85 | 2021 |
A flexible architecture for systematic implementation of SoC security policies A Basak, S Bhunia, S Ray 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 536-543, 2015 | 73 | 2015 |
IIPS: Infrastructure IP for secure SoC design X Wang, Y Zheng, A Basak, S Bhunia IEEE Transactions on Computers 64 (8), 2226-2238, 2014 | 72 | 2014 |
CACI: Dynamic current analysis towards robust recycled chip identification Y Zheng, A Basak, S Bhunia Proceedings of the 51st Annual Design Automation Conference, 1-6, 2014 | 50 | 2014 |
System-on-chip security architecture and CAD framework for hardware patch APD Nath, S Ray, A Basak, S Bhunia 2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC), 733-738, 2018 | 49 | 2018 |
Exploiting design-for-debug for flexible SoC security architecture A Basak, S Bhunia, S Ray Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016 | 45 | 2016 |
Hardware trojan attacks in embedded memory T Hoque, X Wang, A Basak, R Karam, S Bhunia 2018 IEEE 36th VLSI Test Symposium (VTS), 1-6, 2018 | 41 | 2018 |
Correctness and security at odds: post-silicon validation of modern SoC designs S Ray, J Yang, A Basak, S Bhunia Proceedings of the 52nd Annual Design Automation Conference, 1-6, 2015 | 37 | 2015 |
KiMS: Kids' Health Monitoring System at day-care centers using wearable sensors and vocabulary-based acoustic signal processing A Basak, S Narasimhan, S Bhunia 2011 IEEE 13th International Conference on e-Health Networking, Applications …, 2011 | 27 | 2011 |
Patching the internet of things S Ray, A Basak, S Bhunia IEEE Spectrum 54 (11), 30-35, 2017 | 25 | 2017 |
Active defense against counterfeiting attacks through robust antifuse-based on-chip locks A Basak, Y Zheng, S Bhunia 2014 IEEE 32nd VLSI Test Symposium (VTS), 1-6, 2014 | 19 | 2014 |
A wearable ultrasonic assembly for point-of-care autonomous diagnostics of malignant growth A Basak, V Ranganathan, S Bhunia 2013 IEEE Point-of-Care Healthcare Technologies (PHT), 128-131, 2013 | 18 | 2013 |
Apparatuses, methods, and systems for verification of input-output memory management unit to device attachment V Shanbhogue, R Sankaran, A Basak, P Pappachan, UY Kakaiya, ... US Patent 11,599,621, 2023 | 17 | 2023 |
Reconfigurable ECC for adaptive protection of memory A Basak, S Paul, J Park, J Park, S Bhunia 2013 IEEE 56th International Midwest Symposium on Circuits and Systems …, 2013 | 15 | 2013 |
Technologies for secure device configuration and management R Lal, PM Pappachan, L Kida, K Zmudzinski, S Chhabra, A Basak, ... US Patent 11,416,415, 2022 | 14 | 2022 |
Defense against counterfeiting using antifuses S Bhunia, A Basak, Y Zheng US Patent 9,685,958, 2017 | 14 | 2017 |
Hardware based technique to prevent critical fine-grained cache side-channel attacks A Basak, A Kanuparthi, NN Kodalapura, JM Fung US Patent 11,144,468, 2021 | 12 | 2021 |
The power play: Security-energy trade-offs in the IoT regime S Ray, T Hoque, A Basak, S Bhunia 2016 IEEE 34th International Conference on Computer Design (ICCD), 690-693, 2016 | 12 | 2016 |