How secure are printed circuit boards against trojan attacks? S Ghosh, A Basak, S Bhunia IEEE Design & Test 32 (2), 7-16, 2014 | 87 | 2014 |
Security assurance for system-on-chip designs with untrusted IPs A Basak, S Bhunia, T Tkacik, S Ray IEEE Transactions on Information Forensics and Security 12 (7), 1515-1528, 2017 | 79 | 2017 |
Speculative interference attacks: Breaking invisible speculation schemes M Behnia, P Sahu, R Paccagnella, J Yu, ZN Zhao, X Zou, T Unterluggauer, ... Proceedings of the 26th ACM International Conference on Architectural …, 2021 | 69 | 2021 |
A flexible architecture for systematic implementation of SoC security policies A Basak, S Bhunia, S Ray 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 536-543, 2015 | 62 | 2015 |
IIPS: Infrastructure IP for secure SoC design X Wang, Y Zheng, A Basak, S Bhunia IEEE Transactions on Computers 64 (8), 2226-2238, 2014 | 62 | 2014 |
CACI: Dynamic current analysis towards robust recycled chip identification Y Zheng, A Basak, S Bhunia Proceedings of the 51st Annual Design Automation Conference, 1-6, 2014 | 49 | 2014 |
Exploiting design-for-debug for flexible SoC security architecture A Basak, S Bhunia, S Ray Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016 | 42 | 2016 |
Hardware trojan attacks in embedded memory T Hoque, X Wang, A Basak, R Karam, S Bhunia 2018 IEEE 36th VLSI Test Symposium (VTS), 1-6, 2018 | 41 | 2018 |
System-on-chip security architecture and CAD framework for hardware patch APD Nath, S Ray, A Basak, S Bhunia 2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC), 733-738, 2018 | 41 | 2018 |
Correctness and security at odds: post-silicon validation of modern SoC designs S Ray, J Yang, A Basak, S Bhunia Proceedings of the 52nd Annual Design Automation Conference, 1-6, 2015 | 36 | 2015 |
Side channel attack prevention by maintaining architectural state consistency K Grewal, R Sahita, D Durham, E Aktas, S Deutsch, A Basak US Patent 11,216,556, 2022 | 33 | 2022 |
KiMS: Kids' Health Monitoring System at day-care centers using wearable sensors and vocabulary-based acoustic signal processing A Basak, S Narasimhan, S Bhunia 2011 IEEE 13th International Conference on e-Health Networking, Applications …, 2011 | 27 | 2011 |
Patching the internet of things S Ray, A Basak, S Bhunia IEEE Spectrum 54 (11), 30-35, 2017 | 23 | 2017 |
Apparatus and method for secure memory access using trust domains V Shanbhogue, R Sahita, R Sankaran, S Chhabra, A Basak, ... US Patent 10,761,996, 2020 | 22 | 2020 |
Active defense against counterfeiting attacks through robust antifuse-based on-chip locks A Basak, Y Zheng, S Bhunia 2014 IEEE 32nd VLSI Test Symposium (VTS), 1-6, 2014 | 19 | 2014 |
A wearable ultrasonic assembly for point-of-care autonomous diagnostics of malignant growth A Basak, V Ranganathan, S Bhunia 2013 IEEE Point-of-Care Healthcare Technologies (PHT), 128-131, 2013 | 17 | 2013 |
Defense against counterfeiting using antifuses S Bhunia, A Basak, Y Zheng US Patent 9,685,958, 2017 | 14 | 2017 |
Reconfigurable ECC for adaptive protection of memory A Basak, S Paul, J Park, J Park, S Bhunia 2013 IEEE 56th International Midwest Symposium on Circuits and Systems …, 2013 | 14 | 2013 |
The power play: Security-energy trade-offs in the IoT regime S Ray, T Hoque, A Basak, S Bhunia 2016 IEEE 34th International Conference on Computer Design (ICCD), 690-693, 2016 | 13 | 2016 |
Hardware based technique to prevent critical fine-grained cache side-channel attacks A Basak, A Kanuparthi, NN Kodalapura, JM Fung US Patent 11,144,468, 2021 | 12 | 2021 |