Gebruikersprofielen voor Abhishek Basak
Abhishek BasakResearch Scientist, Intel Labs, Intel Corporation Geverifieerd e-mailadres voor intel.com Geciteerd door 1016 |
Speculative interference attacks: Breaking invisible speculation schemes
Recent security vulnerabilities that target speculative execution (eg, Spectre) present a
significant challenge for processor design. These highly publicized vulnerabilities use …
significant challenge for processor design. These highly publicized vulnerabilities use …
Security assurance for system-on-chip designs with untrusted IPs
Modern system-on-chip (SoC) designs involve integration of a large number of intellectual
property (IP) blocks, many of which are acquired from untrusted third-party vendors. An IP …
property (IP) blocks, many of which are acquired from untrusted third-party vendors. An IP …
How secure are printed circuit boards against trojan attacks?
Hardware Trojan attacks at the integrated circuit (IC) level have been studied extensively in
recent times. Researchers have analyzed the impact of these attacks and explored possible …
recent times. Researchers have analyzed the impact of these attacks and explored possible …
A flexible architecture for systematic implementation of SoC security policies
Modern SoC designs incorporate several security policies to protect sensitive assets from
unauthorized access. The policies affect multiple design blocks, and may involve subtle …
unauthorized access. The policies affect multiple design blocks, and may involve subtle …
IIPS: Infrastructure IP for secure SoC design
Security is becoming an increasingly important parameter in current system-on-chip (SoC)
design due to diverse hardware security attacks that can affect manufacturers, system …
design due to diverse hardware security attacks that can affect manufacturers, system …
System-on-chip security architecture and CAD framework for hardware patch
System-on-Chip (SoC) security architectures targeted towards diverse applications including
Internet of Things (IoT) and automotive systems enforce two critical design requirements: in-…
Internet of Things (IoT) and automotive systems enforce two critical design requirements: in-…
Attractor behaviour in ELKO cosmology
A Basak, JR Bhatt, S Shankaranarayanan… - Journal of Cosmology …, 2013 - iopscience.iop.org
We study the dynamics of ELKO in the context of accelerated phase of our universe. To
avoid the fine tuning problem associated with the initial conditions, it is required that the …
avoid the fine tuning problem associated with the initial conditions, it is required that the …
Hardware trojan attacks in embedded memory
Embedded memory, typically implemented with Static Random Access Memory (SRAM)
technology, is an integral part of modern processors and System-on-Chips (SoCs). The …
technology, is an integral part of modern processors and System-on-Chips (SoCs). The …
Exploiting design-for-debug for flexible SoC security architecture
Systematic implementation of System-on-Chip (SoC) security policies typically involves
smart wrappers extracting local security critical events of interest from Intellectual Property (IP) …
smart wrappers extracting local security critical events of interest from Intellectual Property (IP) …
CACI: Dynamic current analysis towards robust recycled chip identification
Rising incidences of counterfeit chips in the supply chain have posed a serious threat to the
semiconductor industry. Recycling of used chips constitutes a major form of counterfeiting …
semiconductor industry. Recycling of used chips constitutes a major form of counterfeiting …