Follow
Patanjali SLPSK
Patanjali SLPSK
Other namesPatanjali Sristi Lakshmiprasanna Sriramakumara
Verified email at ufl.edu - Homepage
Title
Cited by
Cited by
Year
Brutus: Refuting the Security Claims of the Cache Timing Randomization Countermeasure Proposed in CEASER
R Bodduna, V Ganesan, P Slpsk, K Veezhinathan, C Rebeiro
IEEE Computer Architecture Letters 19 (1), 9-12, 2020
432020
Karna: A gate-sizing based security aware EDA flow for improved power side-channel attack protection
P Slpsk, PK Vairam, C Rebeiro, V Kamakoti
2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 2019
352019
The Implications of Shared Data Synchronization Techniques on {Multi-Core} Energy {Efficiency}
A Gautham, K Korgaonkar, P Slpsk, S Balachandran, K Veezhinathan
2012 Workshop on Power-Aware Computing and Systems (HotPower 12), 2012
342012
SOLOMON: An automated framework for detecting fault attack vulnerabilities in hardware
M Srivastava, P Slpsk, I Roy, C Rebeiro, A Hazra, S Bhunia
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 310-313, 2020
152020
Trust issues in microelectronics: The concerns and the countermeasures
T Hoque, P Slpsk, S Bhunia
IEEE Consumer Electronics Magazine 9 (6), 72-83, 2020
132020
On database-free authentication of microelectronic components
F Zhang, SD Paul, P Slpsk, AR Trivedi, S Bhunia
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 29 (1), 149-161, 2020
82020
White mirror: Leaking sensitive information from interactive Netflix movies using encrypted traffic analysis
G Mitra, PK Vairam, P Slpsk, N Chandrachoodan, K V
Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, 122-124, 2019
82019
Gandalf: A fine-grained hardware–software co-design for preventing memory attacks
G Krishnakumar, P SLPSK, PK Vairam, C Rebeiro, K Veezhinathan
IEEE Embedded Systems Letters 10 (3), 83-86, 2018
82018
Trusted electronic systems with untrusted cots
S Yang, P Chakraborty, P SLPSK, S Bhunia
2021 22nd International Symposium on Quality Electronic Design (ISQED), 198-203, 2021
72021
Mltimer: Leakage power minimization in digital circuits using machine learning and adaptive lazy timing analysis
S Patanjali, M Patnaik, S Potluri, V Kamakoti
Journal of Low Power Electronics 14 (2), 285-301, 2018
62018
Trust issues in cots: The challenges and emerging solution
T Hoque, P SLPSK, S Bhunia
Proceedings of the 2020 on Great Lakes Symposium on VLSI, 211-216, 2020
52020
Treehouse: A secure asset management infrastructure for protecting 3dic designs
P SLPSK, S Ray, S Bhunia
IEEE Transactions on Computers, 2023
42023
Drone-based administration of remotely located instruments and gadgets
PSLS Swarup Bhunia, Prabuddha Chakraborty, Reiner Dizon, Parker Difuntorum ...
US Patent US20220083987A1, 2022
4*2022
Signed: A challenge-response based interrogation scheme for simultaneous watermarking and trojan detection
A Nair, P SLPSK, C Rebeiro, S Bhunia
arXiv preprint arXiv:2010.05209, 2020
42020
Melpuf: Memory in logic puf
C Vega, P SLPSK, SD Paul, S Bhunia
arXiv preprint arXiv:2012.03162, 2020
42020
Tvf: A metric for quantifying vulnerability against hardware trojan attacks
J Cruz, P Slpsk, P Gaikwad, S Bhunia
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2023
32023
Rihann: Remote iot hardware authentication with intrinsic identifiers
SD Paul, F Zhang, P SLPSK, AR Trivedi, S Bhunia
IEEE Internet of Things Journal 9 (24), 24615-24627, 2022
32022
Depending on HTTP/2 for privacy? Good luck!
G Mitra, PK Vairam, P Slpsk, N Chandrachoodan, V Kamakoti
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
32020
SIGNED: A challenge-response scheme for electronic hardware watermarking
P SLPSK, AA Nair, C Rebeiro, S Bhunia
IEEE Transactions on Computers, 2022
22022
Avatar: Reinforcing fault attack countermeasures in EDA with fault transformations
PB Roy, P Slpsk, C Rebeiro
2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC), 417-422, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20