Secured and Privacy-Preserving GPU-Based Machine Learning Inference in Trusted Execution Environment: A Comprehensive Survey by Chaudhuri A., Shukla S. , Bhattacharya S. , Mukhopadhyay D. COMSNETS 2025 207-216 (2025)
Secured and Privacy-Preserving GPU-Based Machine Learning Inference in Trusted Execution Environment: A Comprehensive Survey by Chaudhuri A., Shukla S., Bhattacharya S., Mukhopadhyay D. International Conference on Communication Systems and Networks, COMSNETS 207-216 (2025)
There s Always Another Counter : Detecting Micro-Architectural Attacks in a Probabilistically Interleaved Malicious/Benign Setting by Mandal U., Kalundia R., Mishra N., Shukla S., Bhattacharya S., Mukhopadhyay D. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 15351 LNCS 201-220 (2025)
NETLAM: An Automated LLM Framework to Generate and Evaluate Stealthy Hardware Trojans by Sarkar T. S., Arya K. , Chowdhury S. , Mandal U. , Shukla S. , Bhattacharya S. , Mukhopadhyay D. ACNS 2025 - (2025)
Physically Unclonable Fingerprints for Authentication by Baban N.S., Zhou J., Bhattacharya S., Chatterjee U., Bhattacharjee S., Vijayavenkataraman S., Song Y.-A., Mukhopadhyay D., Chakrabarty K., Karri R. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 14587 LNCS 235-239 (2024)
Cache Wars: A Comparative Study of UMWAIT, UMONITOR, and Prime-Probe Attacks by Mandal U., Bhattacharya S., Mukhopadhyay D. Proceedings of the 2024 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024 86-89 (2024)
µLAM: A LLM-Powered Assistant for Real-Time Micro-architectural Attack Detection and Mitigation by Mandal U., Shukla S. , Rastogi A. , Bhattacharya S. , Mukhopadhyay D. ICCAD '24: Proceedings of the 43rd IEEE/ACM International Conference on Computer-Aided Design 1681-1689 (2024)
A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using Rowhammer by Mondal P., Kundu S. , Bhattacharya S. , Karmakar A. , Verbauwhede I. Applied Cryptography and Network Security 271-300 (2024)
Journal
Breaking KASLR on mobile devices without any use of cache memory by Seddigh M., Esfahani M. , Bhattacharya S. , Aref M. R., Soleimany H. Journal of Cryptographic Engineering 14 281-294 (2024)