default search action
Anirban Chakraborty 0003
Person information
- affiliation: Indian Institute of Technology Kharagpur, Department of Computer Science and Engineering, India
Other persons with the same name
- Anirban Chakraborty 0001 — Indian Institute of Science Bangalore, Department of Computational and Data Sciences, India (and 3 more)
- Anirban Chakraborty 0002 — University of Edinburgh, School of Informatics, UK (and 2 more)
- Anirban Chakraborty 0004 — University of Engineering & Management, Kolkata, India (and 1 more)
- Anirban Chakraborty 0005 — University of Texas Arlington, Department of Mechanical and Aerospace Engineering, TX, USA (and 1 more)
- Anirban Chakraborty 0006 — Banaras Hindu University, Varanasi, India
- Anirban Chakraborty 0007 — Lal Bahadur Shastri Institute of Management, Delhi, India
- Anirban Chakraborty 0008 — Texas A&M University, Department of Statistics, College Station, TX, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Nimish Mishra, Kuheli Pratihar, Satota Mandal, Anirban Chakraborty, Ulrich Rührmair, Debdeep Mukhopadhyay:
CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 501-526 (2024) - [c15]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
On the Security of Privacy-Preserving Machine Learning Against Model Stealing Attacks. CANS (2) 2024: 96-117 - [c14]Nimish Mishra, Rahul Arvind Mool, Anirban Chakraborty, Debdeep Mukhopadhyay:
Plug Your Volt: Protecting Intel Processors against Dynamic Voltage Frequency Scaling based Fault Attacks. DAC 2024: 282:1-282:6 - [c13]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
"Ask and Thou Shall Receive": Reaction-Based Full Key Recovery Attacks on FHE. ESORICS (4) 2024: 457-477 - [c12]Animesh Singh, Smita Das, Anirban Chakraborty, Rajat Sadhukhan, Ayantika Chatterjee, Debdeep Mukhopadhyay:
FHEDA: Efficient Circuit Synthesis with Reduced Bootstrapping for Torus FHE. EuroS&P 2024: 841-859 - [c11]Nimish Mishra, Tridib Lochan Dutta, Shubhi Shukla, Anirban Chakraborty, Debdeep Mukhopadhyay:
Too Hot to Handle: Novel Thermal Side-Channel in Power Attack-Protected Intel Processors. HOST 2024: 378-382 - [c10]Nimish Mishra, Anirban Chakraborty, Debdeep Mukhopadhyay:
Faults in Our Bus: Novel Bus Fault Attack to Break ARM TrustZone. NDSS 2024 - [c9]Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay:
Shesha : Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors. USENIX Security Symposium 2024 - [i14]Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay:
Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors. CoRR abs/2406.06034 (2024) - 2023
- [c8]Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopadhyay:
Are Randomized Caches Truly Random? Formal Analysis of Randomized-Partitioned Caches. HPCA 2023: 233-246 - [i13]Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopadhyay:
A short note on the paper 'Are Randomized Caches Really Random?'. CoRR abs/2304.00955 (2023) - [i12]Anirban Chakraborty, Nimish Mishra, Sayandeep Saha, Sarani Bhattacharya, Debdeep Mukhopadhyay:
On the Amplification of Cache Occupancy Attacks in Randomized Cache Architectures. CoRR abs/2310.05172 (2023) - [i11]Nimish Mishra, Kuheli Pratihar, Anirban Chakraborty, Debdeep Mukhopadhyay:
Modelling Delay-based Physically Unclonable Functions through Particle Swarm Optimization. IACR Cryptol. ePrint Arch. 2023: 287 (2023) - [i10]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
vr2FHE- Securing FHE from Reaction-based Key Recovery Attacks. IACR Cryptol. ePrint Arch. 2023: 561 (2023) - [i9]Animesh Singh, Smita Das, Anirban Chakraborty, Rajat Sadhukhan, Ayantika Chatterjee, Debdeep Mukhopadhyay:
FHEDA: Efficient Circuit Synthesis with Reduced Bootstrapping for Torus FHE. IACR Cryptol. ePrint Arch. 2023: 1310 (2023) - [i8]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Model Stealing Attacks On FHE-based Privacy-Preserving Machine Learning through Adversarial Examples. IACR Cryptol. ePrint Arch. 2023: 1665 (2023) - [i7]Nimish Mishra, Rahul Arvind Mool, Anirban Chakraborty, Debdeep Mukhopadhyay:
Plug Your Volt: Protecting Intel Processors against Dynamic Voltage Frequency Scaling based Fault Attacks. IACR Cryptol. ePrint Arch. 2023: 1679 (2023) - 2022
- [c7]Rajat Sadhukhan, Anirban Chakraborty, Debdeep Mukhopadhyay:
FUNDAE: Fault Template Attack on SUNDAE-GIFT AEAD Scheme. AsianHOST 2022: 1-6 - [c6]Nimish Mishra, Anirban Chakraborty, Urbi Chatterjee, Debdeep Mukhopadhyay:
Time's a Thief of Memory - Breaking Multi-tenant Isolation in TrustZones Through Timing Based Bidirectional Covert Channels. CARDIS 2022: 3-24 - [c5]Anirban Chakraborty, Nikhilesh Singh, Sarani Bhattacharya, Chester Rebeiro, Debdeep Mukhopadhyay:
Timed speculative attacks exploiting store-to-load forwarding bypassing cache-based countermeasures. DAC 2022: 553-558 - [c4]Rajat Sadhukhan, Anirban Chakraborty, Nilanjan Datta, Sikhar Patranabis, Debdeep Mukhopadhyay:
Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers. SPACE 2022: 28-49 - [i6]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Error Leakage using Timing Channel in FHE Ciphertexts from TFHE Library. IACR Cryptol. ePrint Arch. 2022: 685 (2022) - [i5]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors. IACR Cryptol. ePrint Arch. 2022: 1563 (2022) - [i4]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Demystifying the comments made on "A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors". IACR Cryptol. ePrint Arch. 2022: 1741 (2022) - 2021
- [j3]Anirban Chakraborty, Manaar Alam, Vishal Dey, Anupam Chattopadhyay, Debdeep Mukhopadhyay:
A survey on adversarial attacks and defences. CAAI Trans. Intell. Technol. 6(1): 25-45 (2021) - [j2]Anirban Chakraborty, Sarani Bhattacharya, Manaar Alam, Sikhar Patranabis, Debdeep Mukhopadhyay:
RASSLE: Return Address Stack based Side-channel LEakage. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(2): 275-303 (2021) - [c3]Anirban Chakraborty, Manaar Alam, Debdeep Mukhopadhyay:
A Good Anvil Fears No Hammer: Automated Rowhammer Detection Using Unsupervised Deep Learning. ACNS Workshops 2021: 59-77 - 2020
- [c2]Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopadhyay:
ExplFrame: Exploiting Page Frame Cache for Fault Analysis of Block Ciphers. DATE 2020: 1303-1306 - [i3]Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopadhyay:
Rowhammer Induced Intermittent Fault Attack on ECC-hardened memory. IACR Cryptol. ePrint Arch. 2020: 380 (2020)
2010 – 2019
- 2019
- [j1]Sikhar Patranabis, Debapriya Basu Roy, Anirban Chakraborty, Naveen Nagar, Astikey Singh, Debdeep Mukhopadhyay, Santosh Ghosh:
Lightweight Design-for-Security Strategies for Combined Countermeasures Against Side Channel and Fault Analysis in IoT Applications. J. Hardw. Syst. Secur. 3(2): 103-131 (2019) - [c1]Anirban Chakraborty, Manaar Alam, Debdeep Mukhopadhyay:
Deep Learning Based Diagnostics for Rowhammer Protection of DRAM Chips. ATS 2019: 86-91 - [i2]Anirban Chakraborty, Sarani Bhattacharya, Debdeep Mukhopadhyay:
Using Memory Allocation Schemes in Linux to Exploit DRAM Vulnerability: with Rowhammer as a Case Study. CoRR abs/1905.12974 (2019) - 2018
- [i1]Anirban Chakraborty, Manaar Alam, Vishal Dey, Anupam Chattopadhyay, Debdeep Mukhopadhyay:
Adversarial Attacks and Defences: A Survey. CoRR abs/1810.00069 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint