default search action
Chester Rebeiro
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c41]Pallavi Borkar, Chen Chen, Mohamadreza Rostami, Nikhilesh Singh, Rahul Kande, Ahmad-Reza Sadeghi, Chester Rebeiro, Jeyavijayan Rajendran:
WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors. USENIX Security Symposium 2024 - [e3]Anupam Chattopadhyay, Shivam Bhasin, Stjepan Picek, Chester Rebeiro:
Progress in Cryptology - INDOCRYPT 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14459, Springer 2024, ISBN 978-3-031-56231-0 [contents] - [e2]Anupam Chattopadhyay, Shivam Bhasin, Stjepan Picek, Chester Rebeiro:
Progress in Cryptology - INDOCRYPT 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part II. Lecture Notes in Computer Science 14460, Springer 2024, ISBN 978-3-031-56234-1 [contents] - [i14]Pallavi Borkar, Chen Chen, Mohamadreza Rostami, Nikhilesh Singh, Rahul Kande, Ahmad-Reza Sadeghi, Chester Rebeiro, Jeyavijayan Rajendran:
WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors. CoRR abs/2402.03704 (2024) - 2023
- [j25]Patanjali SLPSK, Abhishek Anil Nair, Chester Rebeiro, Swarup Bhunia:
SIGNED: A Challenge-Response Scheme for Electronic Hardware Watermarking. IEEE Trans. Computers 72(6): 1763-1777 (2023) - [j24]Keerthi K., Chester Rebeiro:
FaultMeter: Quantitative Fault Attack Assessment of Block Cipher Software. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 212-240 (2023) - [j23]Nikhilesh Singh, Karthikeyan Renganathan, Chester Rebeiro, Jithin Jose, Ralph Mader:
Kryptonite: Worst-Case Program Interference Estimation on Multi-Core Embedded Systems. ACM Trans. Embed. Comput. Syst. 22(5s): 149:1-149:23 (2023) - [c40]Keerthi K., Chester Rebeiro:
Secure Compiler Framework to Design Fault Attack Resistant Software. DSN-S 2023: 206-208 - [c39]Sandip Saha, Sareena Karapoola, Chester Rebeiro, V. Kamakoti:
YODA: Covert Communication Channel over Public DNS Resolvers. DSN 2023: 252-260 - [i13]Nikhilesh Singh, Vinod Ganesan, Chester Rebeiro:
A Survey of Security Concerns and Countermeasures in Modern Micro-architectures with Transient Execution. CoRR abs/2305.16251 (2023) - 2022
- [j22]Prasanna Karthik Vairam, Pratyush Kumar, Chester Rebeiro, V. Kamakoti:
FadingBF: A Bloom Filter With Consistent Guarantees for Online Applications. IEEE Trans. Computers 71(1): 40-52 (2022) - [c38]Prithwish Basu Roy, Patanjali SLPSK, Chester Rebeiro:
Avatar: Reinforcing Fault Attack Countermeasures in EDA with Fault Transformations. ASP-DAC 2022: 417-422 - [c37]A. V. Lakshmy, Chester Rebeiro, Swarup Bhunia:
FORTIFY: Analytical Pre-Silicon Side-Channel Characterization of Digital Designs. ASP-DAC 2022: 660-665 - [c36]Sareena Karapoola, Nikhilesh Singh, Chester Rebeiro, V. Kamakoti:
RaDaR: A Real-Word Dataset for AI powered Run-time Detection of Cyber-Attacks. CIKM 2022: 3222-3232 - [c35]Anirban Chakraborty, Nikhilesh Singh, Sarani Bhattacharya, Chester Rebeiro, Debdeep Mukhopadhyay:
Timed speculative attacks exploiting store-to-load forwarding bypassing cache-based countermeasures. DAC 2022: 553-558 - [c34]Kavya Govindarajan, Dhinakaran Vinayagamurthy, Praveen Jayachandran, Chester Rebeiro:
Privacy-Preserving Decentralized Exchange Marketplaces. ICBC 2022: 1-9 - [c33]Sareena Karapoola, Nikhilesh Singh, Chester Rebeiro, Kamakoti Veezhinathan:
JUGAAD: Comprehensive Malware Behavior-as-a-Service. CSET @ USENIX Security Symposium 2022: 39-48 - [i12]Sareena Karapoola, Nikhilesh Singh, Chester Rebeiro, Kamakoti V:
SUNDEW: An Ensemble of Predictors for Case-Sensitive Detection of Malware. CoRR abs/2211.06153 (2022) - 2021
- [j21]Chester Rebeiro, Debdeep Mukhopadhyay:
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers. J. Cryptol. 34(3): 21 (2021) - [j20]Sugandha Tiwari, Neel Gala, Chester Rebeiro, V. Kamakoti:
PERI: A Configurable Posit Enabled RISC-V Core. ACM Trans. Archit. Code Optim. 18(3): 25:1-25:26 (2021) - [j19]Indrani Roy, Chester Rebeiro, Aritra Hazra, Swarup Bhunia:
FaultDroid: An Algorithmic Approach for Fault-Induced Information Leakage Analysis. ACM Trans. Design Autom. Electr. Syst. 26(1): 2:1-2:27 (2021) - [i11]Nikhilesh Singh, Chester Rebeiro:
LEASH: Enhancing Micro-architectural Attack Detection with a Reactive Process Scheduler. CoRR abs/2109.03998 (2021) - [i10]Kavya Govindarajan, Dhinakaran Vinayagamurthy, Praveen Jayachandran, Chester Rebeiro:
Privacy-Preserving Decentralized Exchange Marketplaces. CoRR abs/2111.15259 (2021) - 2020
- [j18]Rahul Bodduna, Vinod Ganesan, Patanjali SLPSK, Kamakoti Veezhinathan, Chester Rebeiro:
Brutus: Refuting the Security Claims of the Cache Timing Randomization Countermeasure Proposed in CEASER. IEEE Comput. Archit. Lett. 19(1): 9-12 (2020) - [j17]Milan Patnaik, G. Prabhu, Chester Rebeiro, Vashek Matyas, Kamakoti Veezhinathan:
ProBLeSS: A Proactive Blockchain Based Spectrum Sharing Protocol Against SSDF Attacks in Cognitive Radio IoBT Networks. IEEE Netw. Lett. 2(2): 67-70 (2020) - [j16]Indrani Roy, Chester Rebeiro, Aritra Hazra, Swarup Bhunia:
SAFARI: Automatic Synthesis of Fault-Attack Resistant Block Cipher Implementations. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(4): 752-765 (2020) - [j15]Keerthi K., Indrani Roy, Chester Rebeiro, Aritra Hazra, Swarup Bhunia:
FEDS: Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 272-299 (2020) - [j14]Gnanambikai Krishnakumar, Kommuru Alekhya Reddy, Chester Rebeiro:
ALEXIA: A Processor with Lightweight Extensions for Memory Safety. ACM Trans. Embed. Comput. Syst. 18(6): 122:1-122:27 (2020) - [c32]Milind Srivastava, Patanjali SLPSK, Indrani Roy, Chester Rebeiro, Aritra Hazra, Swarup Bhunia:
SOLOMON: An Automated Framework for Detecting Fault Attack Vulnerabilities in Hardware. DATE 2020: 310-313 - [c31]Muhammad Arsath K. F, Vinod Ganesan, Rahul Bodduna, Chester Rebeiro:
PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance. HOST 2020: 23-34 - [i9]Mayank Mundhra, Chester Rebeiro:
SISSLE in consensus-based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use. CoRR abs/2008.01742 (2020) - [i8]Abhishek Nair, Patanjali SLPSK, Chester Rebeiro, Swarup Bhunia:
SIGNED: A Challenge-Response Based Interrogation Scheme for Simultaneous Watermarking and Trojan Detection. CoRR abs/2010.05209 (2020)
2010 – 2019
- 2019
- [j13]Aditya Pradeep, Vishal Mohanty, Adarsh M. Subramaniam, Chester Rebeiro:
Revisiting AES SBox Composite Field Implementations for FPGAs. IEEE Embed. Syst. Lett. 11(3): 85-88 (2019) - [j12]Manaar Alam, Sarani Bhattacharya, Sayan Sinha, Chester Rebeiro, Debdeep Mukhopadhyay:
IPA: an Instruction Profiling-Based Micro-architectural Side-Channel Attack on Block Ciphers. J. Hardw. Syst. Secur. 3(1): 26-44 (2019) - [j11]Himanshi Jain, D. Anthony Balaraju, Chester Rebeiro:
Spy Cartel: Parallelizing Evict+Time-Based Cache Attacks on Last-Level Caches. J. Hardw. Syst. Secur. 3(2): 147-163 (2019) - [c30]Sareena Karapoola, Chester Rebeiro, Unnati Parekh, Kamakoti Veezhinathan:
Towards Identifying Early Indicators of a Malware Infection. AsiaCCS 2019: 679-681 - [c29]Patanjali SLPSK, Prasanna Karthik Vairam, Chester Rebeiro, V. Kamakoti:
Karna: A Gate-Sizing based Security Aware EDA Flow for Improved Power Side-Channel Attack Protection. ICCAD 2019: 1-8 - [c28]Prasanna Karthik Vairam, Gargi Mitra, Vignesh Manoharan, Chester Rebeiro, Byrav Ramamurthy, Kamakoti Veezhinathan:
Towards Measuring Quality of Service in Untrusted Multi-Vendor Service Function Chains: Balancing Security and Resource Consumption. INFOCOM 2019: 163-171 - [c27]Sourav Das, R. Harikrishnan Unnithan, Arjun Menon, Chester Rebeiro, Kamakoti Veezhinathan:
SHAKTI-MS: a RISC-V processor for memory safety in C. LCTES 2019: 19-32 - [c26]Gnanambikai Krishnakumar, Chester Rebeiro:
MSMPX: Microarchitectural Extensions for Meltdown Safe Memory Protection. SoCC 2019: 432-437 - [c25]Jithin Pavithran, Milan Patnaik, Chester Rebeiro:
D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation. WOOT @ USENIX Security Symposium 2019 - [p1]Keerthi K., Indrani Roy, Aritra Hazra, Chester Rebeiro:
Formal Verification for Security in IoT Devices. Security and Fault Tolerance in Internet of Things 2019: 179-200 - [i7]Sugandha Tiwari, Neel Gala, Chester Rebeiro, V. Kamakoti:
PERI: A Posit Enabled RISC-V Core. CoRR abs/1908.01466 (2019) - [i6]Muhammad Arsath K. F, Vinod Ganesan, Rahul Bodduna, Chester Rebeiro:
PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance. CoRR abs/1911.08813 (2019) - 2018
- [j10]Prasanna Karthik Vairam, Gargi Mitra, Chester Rebeiro, Byrav Ramamurthy, Kamakoti Veezhinathan:
ApproxBC: Blockchain Design Alternatives for Approximation-Tolerant Resource-Constrained Applications. IEEE Commun. Stand. Mag. 2(3): 45-51 (2018) - [j9]Gnanambikai Krishnakumar, Patanjali SLPSK, Prasanna Karthik Vairam, Chester Rebeiro, Kamakoti Veezhinathan:
GANDALF: A Fine-Grained Hardware-Software Co-Design for Preventing Memory Attacks. IEEE Embed. Syst. Lett. 10(3): 83-86 (2018) - [j8]Keerthi K., Chester Rebeiro, Aritra Hazra:
An Algorithmic Approach to Formally Verify an ECC Library. ACM Trans. Design Autom. Electr. Syst. 23(5): 63:1-63:26 (2018) - [e1]Anupam Chattopadhyay, Chester Rebeiro, Yuval Yarom:
Security, Privacy, and Applied Cryptography Engineering - 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings. Lecture Notes in Computer Science 11348, Springer 2018, ISBN 978-3-030-05071-9 [contents] - 2017
- [c24]Punit Khanna, Chester Rebeiro, Aritra Hazra:
XFC: A Framework for eXploitable Fault Characterization in Block Ciphers. DAC 2017: 8:1-8:6 - [c23]Arjun Menon, Subadra Murugan, Chester Rebeiro, Neel Gala, Kamakoti Veezhinathan:
Shakti-T: A RISC-V Processor with Light Weight Security Extensions. HASP@ISCA 2017: 2:1-2:8 - [i5]Gnanambikai Krishnakumar, Patanjali SLPSK, Prasanna Karthik Vairam, Chester Rebeiro:
GANDALF: A fine-grained hardware-software co-design for preventing memory attacks. CoRR abs/1702.07223 (2017) - [i4]Suvradip Chakraborty, Chester Rebeiro, Debdeep Mukhopadhyay, C. Pandu Rangan:
Leakage-Resilient Tweakable Encryption from One-Way Functions. IACR Cryptol. ePrint Arch. 2017: 462 (2017) - 2016
- [j7]Abhishek Chakraborty, Sarani Bhattacharya, Tanu Hari Dixit, Chester Rebeiro, Debdeep Mukhopadhyay:
Template attack on SPA and FA resistant implementation of Montgomery ladder. IET Inf. Secur. 10(5): 245-251 (2016) - [c22]Sarani Bhattacharya, Chester Rebeiro, Debdeep Mukhopadhyay:
A Formal Security Analysis of Even-Odd Sequential Prefetching in Profiled Cache-Timing Attacks. HASP@ISCA 2016: 6:1-6:8 - [c21]Debapriya Basu Roy, Shubham Agrawal, Chester Rebeiro, Debdeep Mukhopadhyay:
Accelerating OpenSSL's ECC with low cost reconfigurable hardware. ISIC 2016: 1-4 - 2015
- [j6]Chester Rebeiro, Debdeep Mukhopadhyay:
Micro-Architectural Analysis of Time-Driven Cache Attacks: Quest for the Ideal Implementation. IEEE Trans. Computers 64(3): 778-790 (2015) - [i3]Chester Rebeiro, Debdeep Mukhopadhyay:
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers. IACR Cryptol. ePrint Arch. 2015: 1191 (2015) - 2014
- [c20]Suvadeep Hajra, Chester Rebeiro, Shivam Bhasin, Gaurav Bajaj, Sahil Sharma, Sylvain Guilley, Debdeep Mukhopadhyay:
DRECON: DPA Resistant Encryption by Construction. AFRICACRYPT 2014: 420-439 - 2013
- [j5]Chester Rebeiro, Phuong Ha Nguyen, Debdeep Mukhopadhyay, Axel Poschmann:
Formalizing the Effect of Feistel Cipher Structures on Differential Cache Attacks. IEEE Trans. Inf. Forensics Secur. 8(8): 1274-1279 (2013) - [j4]Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay:
Theoretical Modeling of Elliptic Curve Scalar Multiplier on LUT-Based FPGAs for Area and Speed. IEEE Trans. Very Large Scale Integr. Syst. 21(5): 901-909 (2013) - [c19]Souvik Kolay, Sagar Khurana, Anupam Sadhukhan, Chester Rebeiro, Debdeep Mukhopadhyay:
PERMS: A Bit Permutation Instruction for Accelerating Software Cryptography. DSD 2013: 963-968 - [c18]Sagar Khurana, Souvik Kolay, Chester Rebeiro, Debdeep Mukhopadhyay:
Lightweight cipher implementations on embedded processors. DTIS 2013: 82-87 - [c17]Sarani Bhattacharya, Chester Rebeiro, Debdeep Mukhopadhyay:
Unraveling timewarp: what all the fuzz is about? HASP@ISCA 2013: 8 - 2012
- [j3]Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay:
Generalized high speed Itoh-Tsujii multiplicative inversion architecture for FPGAs. Integr. 45(3): 307-315 (2012) - [j2]Chester Rebeiro, Debdeep Mukhopadhyay:
Boosting Profiled Cache Timing Attacks With A Priori Analysis. IEEE Trans. Inf. Forensics Secur. 7(6): 1900-1905 (2012) - [c16]Chester Rebeiro, Sujoy Sinha Roy, Debdeep Mukhopadhyay:
Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAs. CHES 2012: 494-511 - [c15]Phuong Ha Nguyen, Chester Rebeiro, Debdeep Mukhopadhyay, Huaxiong Wang:
Improved Differential Cache Attacks on SMS4. Inscrypt 2012: 29-45 - [c14]Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay:
A Parallel Architecture for Koblitz Curve Scalar Multiplications on FPGA Platforms. DSD 2012: 553-559 - [c13]Sarani Bhattacharya, Chester Rebeiro, Debdeep Mukhopadhyay:
Hardware Prefetchers Leak: A Revisit of SVF for Cache-Timing Attacks. MICRO Workshops 2012: 17-23 - 2011
- [j1]Chester Rebeiro, Sujoy Sinha Roy, Sankara Reddy, Debdeep Mukhopadhyay:
Revisiting the Itoh-Tsujii Inversion Algorithm for FPGA Platforms. IEEE Trans. Very Large Scale Integr. Syst. 19(8): 1508-1512 (2011) - [c12]Chester Rebeiro, Debdeep Mukhopadhyay:
Cryptanalysis of CLEFIA Using Differential Methods with Cache Trace Patterns. CT-RSA 2011: 89-103 - [c11]Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay:
Theoretical modeling of the Itoh-Tsujii Inversion algorithm for enhanced performance on k-LUT based FPGAs. DATE 2011: 1231-1236 - [c10]Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay:
Accelerating Itoh-Tsujii multiplicative inversion algorithm for FPGAs. ACM Great Lakes Symposium on VLSI 2011: 67-72 - [c9]Chester Rebeiro, Rishabh Poddar, Amit Datta, Debdeep Mukhopadhyay:
An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines. INDOCRYPT 2011: 58-75 - [c8]Rishabh Poddar, Amit Datta, Chester Rebeiro:
A Cache Trace Attack on CAMELLIA. InfoSecHiComNet 2011: 144-156 - [i2]Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga:
Scalar Multiplication on Koblitz Curves using tau2-NAF. IACR Cryptol. ePrint Arch. 2011: 318 (2011) - 2010
- [c7]Chester Rebeiro, Mainack Mondal, Debdeep Mukhopadhyay:
Pinpointing Cache Timing Attacks on AES. VLSI Design 2010: 306-311 - [i1]Chester Rebeiro, Debdeep Mukhopadhyay:
Differential Cache Trace Attack Against CLEFIA. IACR Cryptol. ePrint Arch. 2010: 12 (2010)
2000 – 2009
- 2009
- [c6]Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga:
Cache Timing Attacks on Clefia. INDOCRYPT 2009: 104-118 - 2008
- [c5]Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury, Chester Rebeiro:
Theory of Composing Non-linear Machines with Predictable Cyclic Structures. ACRI 2008: 210-219 - [c4]Chester Rebeiro, Debdeep Mukhopadhyay:
High Speed Compact Elliptic Curve Cryptoprocessor for FPGA Platforms. INDOCRYPT 2008: 376-388 - [c3]Chester Rebeiro, Debdeep Mukhopadhyay:
Power Attack Resistant Efficient FPGA Architecture for Karatsuba Multiplier. VLSI Design 2008: 706-711 - 2006
- [c2]Chester Rebeiro, A. David Selvakumar, A. S. L. Devi:
Bitslice Implementation of AES. CANS 2006: 203-212 - 2005
- [c1]A. David Selvakumar, Chester Rebeiro, R. Pitchiah:
SCADA with Fault Tolerant CORBA on Fault Tolerant LANE ATM. IPDPS 2005
Coauthor Index
aka: Kamakoti Veezhinathan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint