Gebruikersprofielen voor Abhishek Basak

Abhishek Basak

Research Scientist, Intel Labs, Intel Corporation
Geverifieerd e-mailadres voor intel.com
Geciteerd door 1016

Speculative interference attacks: Breaking invisible speculation schemes

…, F Liu, R Gabor, CW Fletcher, A Basak… - Proceedings of the 26th …, 2021 - dl.acm.org
Recent security vulnerabilities that target speculative execution (eg, Spectre) present a
significant challenge for processor design. These highly publicized vulnerabilities use …

Security assurance for system-on-chip designs with untrusted IPs

A Basak, S Bhunia, T Tkacik… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Modern system-on-chip (SoC) designs involve integration of a large number of intellectual
property (IP) blocks, many of which are acquired from untrusted third-party vendors. An IP …

How secure are printed circuit boards against trojan attacks?

S Ghosh, A Basak, S Bhunia - IEEE Design & Test, 2014 - ieeexplore.ieee.org
Hardware Trojan attacks at the integrated circuit (IC) level have been studied extensively in
recent times. Researchers have analyzed the impact of these attacks and explored possible …

A flexible architecture for systematic implementation of SoC security policies

A Basak, S Bhunia, S Ray - 2015 IEEE/ACM International …, 2015 - ieeexplore.ieee.org
Modern SoC designs incorporate several security policies to protect sensitive assets from
unauthorized access. The policies affect multiple design blocks, and may involve subtle …

IIPS: Infrastructure IP for secure SoC design

X Wang, Y Zheng, A Basak… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Security is becoming an increasingly important parameter in current system-on-chip (SoC)
design due to diverse hardware security attacks that can affect manufacturers, system …

System-on-chip security architecture and CAD framework for hardware patch

APD Nath, S Ray, A Basak… - 2018 23rd Asia and South …, 2018 - ieeexplore.ieee.org
System-on-Chip (SoC) security architectures targeted towards diverse applications including
Internet of Things (IoT) and automotive systems enforce two critical design requirements: in-…

Attractor behaviour in ELKO cosmology

A Basak, JR Bhatt, S Shankaranarayanan… - Journal of Cosmology …, 2013 - iopscience.iop.org
We study the dynamics of ELKO in the context of accelerated phase of our universe. To
avoid the fine tuning problem associated with the initial conditions, it is required that the …

Hardware trojan attacks in embedded memory

T Hoque, X Wang, A Basak, R Karam… - 2018 IEEE 36th VLSI …, 2018 - ieeexplore.ieee.org
Embedded memory, typically implemented with Static Random Access Memory (SRAM)
technology, is an integral part of modern processors and System-on-Chips (SoCs). The …

Exploiting design-for-debug for flexible SoC security architecture

A Basak, S Bhunia, S Ray - Proceedings of the 53rd Annual Design …, 2016 - dl.acm.org
Systematic implementation of System-on-Chip (SoC) security policies typically involves
smart wrappers extracting local security critical events of interest from Intellectual Property (IP) …

CACI: Dynamic current analysis towards robust recycled chip identification

Y Zheng, A Basak, S Bhunia - Proceedings of the 51st Annual Design …, 2014 - dl.acm.org
Rising incidences of counterfeit chips in the supply chain have posed a serious threat to the
semiconductor industry. Recycling of used chips constitutes a major form of counterfeiting …