default search action
Abhrajit Sengupta
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Xingyu Meng, Abhrajit Sengupta, Kanad Basu:
A Needle in the Haystack: Inspecting Circuit Layout to Identify Hardware Trojans. ISQED 2024: 1-8 - 2023
- [c14]Lilas Alrahis, Likhitha Mankali, Satwik Patnaik, Abhrajit Sengupta, Johann Knechtel, Ozgur Sinanoglu:
UN-SPLIT: Attacking Split Manufacturing Using Link Prediction in Graph Neural Networks. SPACE 2023: 197-213 - [i8]Xingyu Meng, Abhrajit Sengupta, Kanad Basu:
A Needle in the Haystack: Inspecting Circuit Layout to Identify Hardware Trojans. IACR Cryptol. ePrint Arch. 2023: 610 (2023) - 2022
- [j6]Abhrajit Sengupta, Mohammed Nabeel, Mohammed Ashraf, Johann Knechtel, Ozgur Sinanoglu:
A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL. Cryptogr. 6(2): 22 (2022) - [j5]Lilas Alrahis, Abhrajit Sengupta, Johann Knechtel, Satwik Patnaik, Hani H. Saleh, Baker Mohammad, Mahmoud Al-Qutayri, Ozgur Sinanoglu:
GNN-RE: Graph Neural Networks for Reverse Engineering of Gate-Level Netlists. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(8): 2435-2448 (2022) - 2021
- [j4]Abhrajit Sengupta, Nimisha Limaye, Ozgur Sinanoglu:
Breaking CAS-Lock and Its Variants by Exploiting Structural Traces. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 418-440 (2021) - [i7]Abhrajit Sengupta, Nimisha Limaye, Ozgur Sinanoglu:
Breaking CAS-Lock and Its Variants by Exploiting Structural Traces. IACR Cryptol. ePrint Arch. 2021: 581 (2021) - 2020
- [j3]Abhrajit Sengupta, Bodhisatwa Mazumdar, Muhammad Yasin, Ozgur Sinanoglu:
Logic Locking With Provable Security Against Power Analysis Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(4): 766-778 (2020) - [j2]Abhrajit Sengupta, Mohammed Nabeel, Nimisha Limaye, Mohammed Ashraf, Ozgur Sinanoglu:
Truly Stripping Functionality for Logic Locking: A Fault-Based Perspective. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(12): 4439-4452 (2020) - [i6]Benjamin Tan, Ramesh Karri, Nimisha Limaye, Abhrajit Sengupta, Ozgur Sinanoglu, Md. Moshiur Rahman, Swarup Bhunia, Danielle Duvalsaint, Ronald D. Blanton, Amin Rezaei, Yuanqi Shen, Hai Zhou, Leon Li, Alex Orailoglu, Zhaokun Han, Austin Benedetti, Luciano Brignone, Muhammad Yasin, Jeyavijayan Rajendran, Michael Zuzak, Ankur Srivastava, Ujjwal Guin, Chandan Karfa, Kanad Basu, Vivek V. Menon, Matthew French, Peilin Song, Franco Stellari, Gi-Joon Nam, Peter Gadfort, Alric Althoff, Joseph Tostenrude, Saverio Fazzari, Eric Breckenfeld, Kenneth Plaks:
Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking. CoRR abs/2006.06806 (2020) - [i5]Haocheng Li, Satwik Patnaik, Abhrajit Sengupta, Haoyu Yang, Johann Knechtel, Bei Yu, Evangeline F. Y. Young, Ozgur Sinanoglu:
Attacking Split Manufacturing from a Deep Learning Perspective. CoRR abs/2007.03989 (2020)
2010 – 2019
- 2019
- [c13]Haocheng Li, Satwik Patnaik, Abhrajit Sengupta, Haoyu Yang, Johann Knechtel, Bei Yu, Evangeline F. Y. Young, Ozgur Sinanoglu:
Attacking Split Manufacturing from a Deep Learning Perspective. DAC 2019: 135 - [c12]Abhrajit Sengupta, Mohammed Nabeel, Johann Knechtel, Ozgur Sinanoglu:
A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL. DATE 2019: 414-419 - [c11]Nimisha Limaye, Abhrajit Sengupta, Mohammed Nabeel, Ozgur Sinanoglu:
Is Robust Design-for-Security Robust Enough? Attack on Locked Circuits with Restricted Scan Chain Access. ICCAD 2019: 1-8 - [c10]Giovanni Di Crescenzo, Abhrajit Sengupta, Ozgur Sinanoglu, Muhammad Yasin:
Logic Locking of Boolean Circuits: Provable Hardware-Based Obfuscation from a Tamper-Proof Memory. SECITC 2019: 172-192 - [i4]Abhrajit Sengupta, Mohammed Thari Nabeel, Johann Knechtel, Ozgur Sinanoglu:
A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL. CoRR abs/1903.02913 (2019) - [i3]Nimisha Limaye, Abhrajit Sengupta, Mohammed Nabeel, Ozgur Sinanoglu:
Is Robust Design-for-Security Robust Enough? Attack on Locked Circuits with Restricted Scan Chain Access. CoRR abs/1906.07806 (2019) - [i2]Abhrajit Sengupta, Ozgur Sinanoglu:
CAS-Unlock: Unlocking CAS-Lock without Access to a Reverse-Engineered Netlist. IACR Cryptol. ePrint Arch. 2019: 1443 (2019) - 2018
- [c9]Monir Zaman, Abhrajit Sengupta, Danqing Liu, Ozgur Sinanoglu, Yiorgos Makris, Jeyavijayan (JV) Rajendran:
Towards provably-secure performance locking. DATE 2018: 1592-1597 - [c8]Abhrajit Sengupta, Mohammed Thari Nabeel, Mohammed Ashraf, Ozgur Sinanoglu:
Customized locking of IP blocks on a multi-million-gate SoC. ICCAD 2018: 59 - [c7]Abhrajit Sengupta, Mohammed Thari Nabeel, Muhammad Yasin, Ozgur Sinanoglu:
ATPG-based cost-effective, secure logic locking. VTS 2018: 1-6 - 2017
- [j1]Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury:
Preventing fault attacks using fault randomisation with a case study on AES. Int. J. Appl. Cryptogr. 3(3): 225-235 (2017) - [c6]Muhammad Yasin, Abhrajit Sengupta, Mohammed Thari Nabeel, Mohammed Ashraf, Jeyavijayan Rajendran, Ozgur Sinanoglu:
Provably-Secure Logic Locking: From Theory To Practice. CCS 2017: 1601-1618 - [c5]Muhammad Yasin, Abhrajit Sengupta, Benjamin Carrión Schäfer, Yiorgos Makris, Ozgur Sinanoglu, Jeyavijayan Rajendran:
What to Lock?: Functional and Parametric Locking. ACM Great Lakes Symposium on VLSI 2017: 351-356 - [c4]Abhrajit Sengupta, Satwik Patnaik, Johann Knechtel, Mohammed Ashraf, Siddharth Garg, Ozgur Sinanoglu:
Rethinking split manufacturing: An information-theoretic approach with secure layout techniques. ICCAD 2017: 329-326 - [i1]Abhrajit Sengupta, Satwik Patnaik, Johann Knechtel, Mohammed Ashraf, Siddharth Garg, Ozgur Sinanoglu:
Rethinking Split Manufacturing: An Information-Theoretic Approach with Secure Layout Techniques. CoRR abs/1710.02026 (2017) - 2015
- [c3]Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury:
Preventing Fault Attacks Using Fault Randomization with a Case Study on AES. ACISP 2015: 343-355 - 2014
- [c2]Shamit Ghosh, Abhrajit Sengupta, Dhiman Saha, Dipanwita Roy Chowdhury:
A Scalable Method for Constructing Non-linear Cellular Automata with Period 2 n - 1. ACRI 2014: 65-74 - [c1]Abhrajit Sengupta, Dhiman Saha, Shamit Ghosh, Deval Mehta, Dipanwita Roy Chowdhury:
AEC: A Practical Scheme for Authentication with Error Correction. SPACE 2014: 155-170
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint