Rajat Subhra Chakraborty

Orcid: 0000-0003-3588-163X

According to our database1, Rajat Subhra Chakraborty authored at least 139 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Latent RAGE: Randomness Assessment Using Generative Entropy Models.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., November, 2024

Enhancing SRAM-Based PUF Reliability Through Machine Learning-Aided Calibration Techniques.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., November, 2024

Practical and Efficient PUF-Based Protocol for Authentication and Key Agreement in IoT.
IEEE Embed. Syst. Lett., June, 2024

CAPUF: Design of a configurable circular arbiter PUF with enhanced security and hardware efficiency.
Integr., March, 2024

HLS-IRT: Hardware Trojan Insertion through Modification of Intermediate Representation During High-Level Synthesis.
ACM Trans. Design Autom. Electr. Syst., 2024

Evaluating Large Language Models for Automatic Register Transfer Logic Generation via High-Level Synthesis.
CoRR, 2024

Breaching the Gap: Modelling SRAM-PUFs via Side-Channel Signatures.
Proceedings of the Great Lakes Symposium on VLSI 2024, 2024

2023
A Novel Physical Unclonable Function Based on Hybrid Current Mirror.
J. Hardw. Syst. Secur., December, 2023

Attacks on Recent DNN IP Protection Techniques and Their Mitigation.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., November, 2023

Image splicing detection with principal component analysis generated low-dimensional homogeneous feature set based on local binary pattern and support vector machine.
Multim. Tools Appl., July, 2023

Birds of the Same Feather Flock Together: A Dual-Mode Circuit Candidate for Strong PUF-TRNG Functionalities.
IEEE Trans. Computers, June, 2023

An image forensic technique based on JPEG ghosts.
Multim. Tools Appl., April, 2023

Deep Learning for Computational Problems in Hardware Security - Modeling Attacks on Strong Physically Unclonable Function Circuits
Studies in Computational Intelligence 1052, Springer, ISBN: 978-981-19-4016-3, 2023

Diode-Triode Current Mirror Inverter PUF: A Novel Mixed-Signal Low Power Analog PUF.
Proceedings of the 66th IEEE International Midwest Symposium on Circuits and Systems, 2023

Theoretical Enumeration of Deployable Single-Output Strong PUF Instances Based on Uniformity and Uniqueness Constraints.
Proceedings of the Information Systems Security - 19th International Conference, 2023

2022
Implementation, Characterization and Application of Path Changing Switch based Arbiter PUF on FPGA as a lightweight Security Primitive for IoT.
ACM Trans. Design Autom. Electr. Syst., 2022

Correlation Integral-Based Intrinsic Dimension: A Deep-Learning-Assisted Empirical Metric to Estimate the Robustness of Physically Unclonable Functions to Modeling Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention.
J. Cryptogr. Eng., 2022

Novel Hardware Trojan Attack on Activation Parameters of FPGA-Based DNN Accelerators.
IEEE Embed. Syst. Lett., 2022

DIP Learning on CAS-Lock: Using Distinguishing Input Patterns for Attacking Logic Locking.
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022

Linear and Non-Linear Filter-based Counter-Forensics Against Image Splicing Detection.
Proceedings of the Computer Vision and Image Processing - 7th International Conference, 2022

Revisiting Logic Obfuscation Using Cellular Automata.
Proceedings of First Asian Symposium on Cellular Automata Technology, 2022

Hardware IP Protection Using Register Transfer Level Locking and Obfuscation of Control and Data Flow.
Behavioral Synthesis for Hardware Security, 2022

2021
A Conditionally Chaotic Physically Unclonable Function Design Framework with High Reliability.
ACM Trans. Design Autom. Electr. Syst., 2021

3PAA: A Private PUF Protocol for Anonymous Authentication.
IEEE Trans. Inf. Forensics Secur., 2021

A Computationally Efficient Tensor Regression Network-Based Modeling Attack on XOR Arbiter PUF and Its Variants.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021

ORACALL: An Oracle-Based Attack on Cellular Automata Guided Logic Locking.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021

Binary decision diagram-based synthesis technique for improved mapping of Boolean functions inside memristive crossbar-slices.
IET Comput. Digit. Tech., 2021

Open Sesame: A Novel Non-SAT-Attack against CAS-Lock.
IACR Cryptol. ePrint Arch., 2021

A Tale of Twin Primitives: Single-chip Solution for PUFs and TRNGs.
IACR Cryptol. ePrint Arch., 2021

Design and Analysis of Logic Locking Techniques.
Proceedings of the 29th IFIP/IEEE International Conference on Very Large Scale Integration, 2021

APUF-BNN: An Automated Framework for Efficient Combinational Logic Based Implementation of Arbiter PUF through Binarized Neural Network.
Proceedings of the GLSVLSI '21: Great Lakes Symposium on VLSI 2021, 2021

2020
Machine Learning Assisted PUF Calibration for Trustworthy Proof of Sensor Data in IoT.
ACM Trans. Design Autom. Electr. Syst., 2020

Toward Optimal Prediction Error Expansion-Based Reversible Image Watermarking.
IEEE Trans. Circuits Syst. Video Technol., 2020

Probabilistic Hardware Trojan Attacks on Multiple Layers of Reconfigurable Network Infrastructure.
J. Hardw. Syst. Secur., 2020

Hardware Obfuscation and Logic Locking: A Tutorial Introduction.
IEEE Des. Test, 2020

Stupify: A Hardware Countermeasure of KRACKs in WPA2 using Physically Unclonable Functions.
Proceedings of the Companion of The 2020 Web Conference 2020, 2020

SoK: Physical and Logic Testing Techniques for Hardware Trojan Detection.
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security Workshop, 2020

Malware Classification Through Attention Residual Network based Visualization.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2020

2019
Recycled and Remarked Counterfeit Integrated Circuit Detection by Image-Processing-Based Package Texture and Indent Analysis.
IEEE Trans. Ind. Informatics, 2019

Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database.
IEEE Trans. Dependable Secur. Comput., 2019

A Robust Residual Dense Neural Network For Countering Antiforensic Attack on Median Filtered Images.
IEEE Signal Process. Lett., 2019

Automated Defective Pin Detection for Recycled Microelectronics Identification.
J. Hardw. Syst. Secur., 2019

Deep Learning based Model Building Attacks on Arbiter PUF Compositions.
IACR Cryptol. ePrint Arch., 2019

ProTro: A Probabilistic Counter Based Hardware Trojan Attack on FPGA Based MACSec Enabled Ethernet Switch.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019

Revisiting the Security of LPN Based RFID Authentication Protocol and Potential Exploits in Hardware Implementations.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019

Cyclic Beneš Network Based Logic Encryption for Mitigating SAT-Based Attacks.
Proceedings of the 37th IEEE International Conference on Computer Design, 2019

United We Stand: A Threshold Signature Scheme for Identifying Outliers in PLCs.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

Classification of Computer Generated and Natural Images based on Efficient Deep Convolutional Recurrent Attention Model.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019

Machine Learning Assisted Accurate Estimation of Usage Duration and Manufacturer for Recycled and Counterfeit Flash Memory Detection.
Proceedings of the 28th IEEE Asian Test Symposium, 2019

A Computationally Efficient Tensor Regression Network based Modeling Attack on XOR APUF.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2019

Design of a Chaotic Oscillator based Model Building Attack Resistant Arbiter PUF.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2019

Fault-Tolerant Implementations of Physically Unclonable Functions on FPGA.
Proceedings of the Security and Fault Tolerance in Internet of Things, 2019

2018
A Multiplexer-Based Arbiter PUF Composition with Enhanced Reliability and Security.
IEEE Trans. Computers, 2018

A Hardware Trojan Attack on FPGA-Based Cryptographic Key Generation: Impact and Detection.
J. Hardw. Syst. Secur., 2018

Customized Instructions for Protection Against Memory Integrity Attacks.
IEEE Embed. Syst. Lett., 2018

PUFSSL: An OpenSSL Extension for PUF based Authentication.
Proceedings of the 23rd IEEE International Conference on Digital Signal Processing, 2018

DFARPA: Differential fault attack resistant physical design automation.
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018

Trustworthy proofs for sensor data using FPGA based physically unclonable functions.
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018

Discrete Cosine Transform Residual Feature Based Filtering Forgery and Splicing Detection in JPEG Images.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018

2017
Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test.
ACM Trans. Design Autom. Electr. Syst., 2017

A Flexible Online Checking Technique to Enhance Hardware Trojan Horse Detectability by Reliability Analysis.
IEEE Trans. Emerg. Top. Comput., 2017

Guest Editorial: Special Issue on "Secure and Fault-Tolerant Embedded Computing".
ACM Trans. Embed. Comput. Syst., 2017

A PUF-Based Secure Communication Protocol for IoT.
ACM Trans. Embed. Comput. Syst., 2017

An Improved DCM-Based Tunable True Random Number Generator for Xilinx FPGA.
IEEE Trans. Circuits Syst. II Express Briefs, 2017

Binary Decision Diagram Assisted Modeling of FPGA-Based Physically Unclonable Function by Genetic Programming.
IEEE Trans. Computers, 2017

Remote dynamic partial reconfiguration: A threat to Internet-of-Things and embedded security applications.
Microprocess. Microsystems, 2017

PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs.
IACR Cryptol. ePrint Arch., 2017

Automated JPEG forgery detection with correlation based localization.
Proceedings of the 2017 IEEE International Conference on Multimedia & Expo Workshops, 2017

Copy move forgery detection with similar but genuine objects.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

Side Channel Evaluation of PUF-Based Pseudorandom Permutation.
Proceedings of the Euromicro Conference on Digital System Design, 2017

Counterfeit IC Detection By Image Texture Analysis.
Proceedings of the Euromicro Conference on Digital System Design, 2017

Camera Source Identification Using Discrete Cosine Transform Residue Features and Ensemble Classifier.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

2016
A Technique to Evaluate Upper Bounds on Performance of Pixel-prediction Based Reversible Watermarking Algorithms.
J. Signal Process. Syst., 2016

Theory and Application of Delay Constraints in Arbiter PUF.
ACM Trans. Embed. Comput. Syst., 2016

Side-Channel Watchdog: Run-Time Evaluation of Side-Channel Vulnerability in FPGA-Based Crypto-systems.
IACR Cryptol. ePrint Arch., 2016

Fault Tolerant Implementations of Delay-based Physically Unclonable Functions on FPGA.
IACR Cryptol. ePrint Arch., 2016

Architectural Bias: a Novel Statistical Metric to Evaluate Arbiter PUF Variants.
IACR Cryptol. ePrint Arch., 2016

Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse.
IACR Cryptol. ePrint Arch., 2016

Memristor Based Arbiter PUF: Cryptanalysis Threat and Its Mitigation.
Proceedings of the 29th International Conference on VLSI Design and 15th International Conference on Embedded Systems, 2016

SmashClean: A hardware level mitigation to stack smashing attacks in OpenRISC.
Proceedings of the 2016 ACM/IEEE International Conference on Formal Methods and Models for System Design, 2016

Optimal Distortion Estimation for Prediction Error Expansion Based Reversible Watermarking.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Testability Based Metric for Hardware Trojan Vulnerability Assessment.
Proceedings of the 2016 Euromicro Conference on Digital System Design, 2016

Remote Dynamic Clock Reconfiguration Based Attacks on Internet of Things Applications.
Proceedings of the 2016 Euromicro Conference on Digital System Design, 2016

2015
A PUF-Enabled Secure Architecture for FPGA-Based IoT Applications.
IEEE Trans. Multi Scale Comput. Syst., 2015

A Novel Memristor-Based Hardware Security Primitive.
ACM Trans. Embed. Comput. Syst., 2015

A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015

A novel memristor based physically unclonable function.
Integr., 2015

Improved Test Pattern Generation for Hardware Trojan Detection using Genetic Algorithm and Boolean Satisfiability.
IACR Cryptol. ePrint Arch., 2015

Tutorial T7: Physically Unclonable Function: A Promising Security Primitive for Internet of Things.
Proceedings of the 28th International Conference on VLSI Design, 2015

Reversible Color Image Watermarking in the YCoCg-R Color Space.
Proceedings of the Information Systems Security - 11th International Conference, 2015

A Novel Attack on a FPGA based True Random Number Generator.
Proceedings of the 10th Workshop on Embedded Systems Security, 2015

Towards Ideal Arbiter PUF Design on Xilinx FPGA: A Practitioner's Perspective.
Proceedings of the 2015 Euromicro Conference on Digital System Design, 2015

Automated Design of High Performance Integer Arithmetic Cores on FPGA.
Proceedings of the 2015 Euromicro Conference on Digital System Design, 2015

Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015

A Fabric Component Based Approach to the Architecture and Design Automation of High-Performance Integer Arithmetic Circuits on FPGA.
Proceedings of the Computational Intelligence in Digital and Network Designs and Applications, 2015

2014
Reversible Digital Watermarking: Theory and Practices
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02342-2, 2014

Cryptanalysis of Composite PUFs (Extended abstract-invited talk).
Proceedings of the 18th International Symposium on VLSI Design and Test, 2014

Composite PUF: A new design paradigm for Physically Unclonable Functions on FPGA.
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014

Fault attack on AES via hardware Trojan insertion by dynamic partial reconfiguration of FPGA over ethernet.
Proceedings of the 9th Workshop on Embedded Systems Security, 2014

Highly Compact Automated Implementation of Linear CA on FPGAs.
Proceedings of the Cellular Automata, 2014

Hardware Security - Design, Threats, and Safeguards.
CRC Press, ISBN: 978-1-439-89583-2, 2014

2013
A generalized tamper localization approach for reversible watermarking algorithms.
ACM Trans. Multim. Comput. Commun. Appl., 2013

Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis.
IEEE Trans. Computers, 2013

Histogram-bin-shifting-based reversible watermarking for colour images.
IET Image Process., 2013

Hardware Trojan Insertion by Direct Modification of FPGA Configuration Bitstream.
IEEE Des. Test, 2013

Partial bitstream protection for low-cost FPGAs with physical unclonable function, obfuscation, and dynamic partial self reconfiguration.
Comput. Electr. Eng., 2013

Design of low area-overhead ring oscillator PUF with large challenge space.
Proceedings of the 2012 International Conference on Reconfigurable Computing and FPGAs, 2013

Model building attacks on Physically Unclonable Functions using genetic programming.
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013

2012
Hardware IP Protection During Evaluation Using Embedded Sequential Trojan.
IEEE Des. Test Comput., 2012

Effect of Malicious Hardware Logic on Circuit Reliability.
Proceedings of the Progress in VLSI Design and Test - 16th International Symposium, 2012

Lossless secret image sharing based on generalized: LSB replacement.
Proceedings of the Research in Applied Computation Symposium, 2012

Fuzzy Inference Rule Based Reversible Watermarking for Digital Images.
Proceedings of the Information Systems Security, 8th International Conference, 2012

2011
Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation.
J. Electron. Test., 2011

Embedded Software Security through Key-Based Control Flow Obfuscation.
Proceedings of the Security Aspects in Information Technology, 2011

Reversible Watermarking Using Priority Embedding through Repeated Application of Integer Wavelet Transform.
Proceedings of the Security Aspects in Information Technology, 2011

Reversible Image Watermarking through Coordinate Logic Operation Based Prediction.
Proceedings of the Information Systems Security - 7th International Conference, 2011

TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection.
Proceedings of the HOST 2011, 2011

Multi-level attacks: An emerging security concern for cryptographic hardware.
Proceedings of the Design, Automation and Test in Europe, 2011

Testability of Cryptographic Hardware and Detection of Hardware Trojans.
Proceedings of the 20th IEEE Asian Test Symposium, 2011

2010
RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation.
Proceedings of the VLSI Design 2010: 23rd International Conference on VLSI Design, 2010

Multiple-Parameter Side-Channel Analysis: A Non-invasive Hardware Trojan Detection Approach.
Proceedings of the HOST 2010, 2010

Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

System level self-healing for parametric yield and reliability improvement under power bound.
Proceedings of the 2010 NASA/ESA Conference on Adaptive Hardware and Systems, 2010

2009
HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2009

A study of asynchronous design methodology for robust CMOS-nano hybrid system design.
ACM J. Emerg. Technol. Comput. Syst., 2009

Low-power hybrid complementary metaloxide- semiconductor-nano-electro-mechanical systems field programmable gate array: circuit level analysis and defect-aware mapping.
IET Comput. Digit. Tech., 2009

Security against hardware Trojan through a novel application of design obfuscation.
Proceedings of the 2009 International Conference on Computer-Aided Design, 2009

Security Through Obscurity: An Approach for Protecting Register Transfer Level Hardware IP.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009

Hardware Trojan: Threats and emerging solutions.
Proceedings of the IEEE International High Level Design Validation and Test Workshop, 2009

MERO: A Statistical Approach for Hardware Trojan Detection.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

2008
Analysis and Robust Design of Diode-Resistor Based Nanoscale Crossbar PLA Circuits.
Proceedings of the 21st International Conference on VLSI Design (VLSI Design 2008), 2008

Micropipeline-Based Asynchronous Design Methodology for Robust System Design Using Nanoscale Crossbar.
Proceedings of the 9th International Symposium on Quality of Electronic Design (ISQED 2008), 2008

Hardware protection and authentication through netlist level obfuscation.
Proceedings of the 2008 International Conference on Computer-Aided Design, 2008

On-Demand Transparency for Improving Hardware Trojan Detectability.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008

Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme.
Proceedings of the Design, Automation and Test in Europe, 2008

2007
Hybridization of CMOS With CNT-Based Nano-Electromechanical Switch for Low Leakage and Robust Circuit Design.
IEEE Trans. Circuits Syst. I Regul. Pap., 2007

VIm-Scan: A Low Overhead Scan Design Approach for Protection of Secret Key in Scan-Based Secure Chips.
Proceedings of the 25th IEEE VLSI Test Symposium (VTS 2007), 2007

Defect-Aware Configurable Computing in Nanoscale Crossbar for Improved Yield.
Proceedings of the 13th IEEE International On-Line Testing Symposium (IOLTS 2007), 2007


  Loading...