- Jianying Zhou
, Sridhar Adepu
, Cristina Alcaraz
, Lejla Batina
, Emiliano Casalicchio
, Sudipta Chattopadhyay
, Chenglu Jin
, Jingqiang Lin
, Eleonora Losiouk
, Suryadipta Majumdar
, Weizhi Meng
, Stjepan Picek
, Jun Shao, Chunhua Su
, Cong Wang
, Yury Zhauniarovich
, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7 [contents] - Guoliang Dong, Jingyi Wang, Jun Sun, Sudipta Chattopadhyay, Xinyu Wang, Ting Dai, Jie Shi, Jin Song Dong:
Repairing Adversarial Texts through Perturbation. CoRR abs/2201.02504 (2022) - Trupil Limbasiya, Ko Zheng Teng, Sudipta Chattopadhyay, Jianying Zhou:
A Systematic Survey of Attack Detection and Prevention in Connected and Autonomous Vehicles. CoRR abs/2203.14965 (2022) - Yee Ching Tok
, Sudipta Chattopadhyay:
Identifying Threats, Cybercrime and Digital Forensic Opportunities in Smart City Infrastructure via Threat Modeling. CoRR abs/2210.14692 (2022) - 2021
- Eyasu Getahun Chekole
, Martín Ochoa, Sudipta Chattopadhyay:
SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems. Int. J. Crit. Infrastructure Prot. 33: 100431 (2021) - Yifan Jia, Jingyi Wang, Christopher M. Poskitt
, Sudipta Chattopadhyay, Jun Sun, Yuqi Chen:
Adversarial attacks and mitigation for anomaly detectors of cyber-physical systems. Int. J. Crit. Infrastructure Prot. 34: 100452 (2021) - Chundong Wang, Yee Ching Tok
, Rohini Poolat
, Sudipta Chattopadhyay, Mohan Rajesh Elara:
How to secure autonomous mobile robots? An approach with fuzzing, detection and mitigation. J. Syst. Archit. 112: 101838 (2021) - Sakshi Udeshi
, Sudipta Chattopadhyay
:
Grammar Based Directed Testing of Machine Learning Systems. IEEE Trans. Software Eng. 47(11): 2487-2503 (2021) - Guanhua Wang
, Sudipta Chattopadhyay
, Ivan Gotovchits
, Tulika Mitra
, Abhik Roychoudhury
:
oo7: Low-Overhead Defense Against Spectre Attacks via Program Analysis. IEEE Trans. Software Eng. 47(11): 2504-2519 (2021) - Jianying Zhou
, Chuadhry Mujeeb Ahmed
, Lejla Batina
, Sudipta Chattopadhyay
, Olga Gadyatskaya
, Chenglu Jin
, Jingqiang Lin, Eleonora Losiouk
, Bo Luo, Suryadipta Majumdar
, Mihalis Maniatakos
, Daisuke Mashima
, Weizhi Meng
, Stjepan Picek
, Masaki Shimaoka
, Chunhua Su
, Cong Wang
:
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. Lecture Notes in Computer Science 12809, Springer 2021, ISBN 978-3-030-81644-5 [contents] - Yifan Jia, Jingyi Wang, Christopher M. Poskitt
, Sudipta Chattopadhyay, Jun Sun, Yuqi Chen:
Adversarial Attacks and Mitigation for Anomaly Detectors of Cyber-Physical Systems. CoRR abs/2105.10707 (2021) - Sai Sathiesh Rajan, Sakshi Udeshi, Sudipta Chattopadhyay:
AequeVox: Automated Fairness Testing of Speech Recognition Systems. CoRR abs/2110.09843 (2021) - 2020
- Eyasu Getahun Chekole
, Sudipta Chattopadhyay, Martín Ochoa, Huaqun Guo
, Unnikrishnan Cheramangalath
:
CIMA: Compiler-Enforced Resilience Against Memory Safety Attacks in Cyber-Physical Systems. Comput. Secur. 94: 101832 (2020) - Yee Ching Tok
, Chundong Wang, Sudipta Chattopadhyay:
Stitcher: Correlating digital forensic evidence on internet-of-things devices. Digit. Investig. 35: 301071 (2020) - Prabhat Kumar Panda
, Sudipta Chattopadhyay:
An improved authentication and security scheme for LTE/LTE-A networks. J. Ambient Intell. Humaniz. Comput. 11(5): 2163-2185 (2020) - Prabhat Kumar Panda
, Sudipta Chattopadhyay:
A secure mutual authentication protocol for IoT environment. J. Reliab. Intell. Environ. 6(2): 79-94 (2020) - Adrian Horga, Sudipta Chattopadhyay, Petru Eles, Zebo Peng
:
Genetic algorithm based estimation of non-functional properties for GPGPU programs. J. Syst. Archit. 103: 101697 (2020) - Tiyash Basu, Kartik Aggarwal, Chundong Wang
, Sudipta Chattopadhyay:
An exploration of effective fuzzing for side-channel cache leakage. Softw. Test. Verification Reliab. 30(1) (2020) - Chundong Wang
, Sudipta Chattopadhyay, Gunavaran Brihadiswarn:
Crab-tree: A Crash Recoverable B+-tree Variant for Persistent Memory with ARMv8 Architecture. ACM Trans. Embed. Comput. Syst. 19(5): 35:1-35:26 (2020) - Xingbin Jiang, Michele Lora
, Sudipta Chattopadhyay:
An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices. ACM Trans. Internet Techn. 20(2): 16:1-16:24 (2020) - Guanhua Wang
, Sudipta Chattopadhyay, Arnab Kumar Biswas
, Tulika Mitra, Abhik Roychoudhury
:
KLEESpectre: Detecting Information Leakage through Speculative Cache Attacks via Symbolic Execution. ACM Trans. Softw. Eng. Methodol. 29(3): 14:1-14:31 (2020) - Sudipta Ghosh
, Bhabani Prasad Chattopadhyay, Ram Mohan Roy, Jayanta Mukhopadhyay, Manjunatha Mahadevappa:
Detection and localization of Coronary Arterial Lesion with the Aid of Impedance Cardiography and Artificial Neural Network. BIBE 2020: 667-674 - Poulomi Pal
, Sudipta Ghosh
, Bhabani Prasad Chattopadhyay, Kalyan Kumar Saha, Manjunatha Mahadevappa:
Screening of Ischemic Heart Disease based on PPG Signals using Machine Learning Techniques. EMBC 2020: 5980-5983 - Xingbin Jiang, Michele Lora, Sudipta Chattopadhyay:
Efficient and Trusted Detection of Rootkit in IoT Devices via Offline Profiling and Online Monitoring. ACM Great Lakes Symposium on VLSI 2020: 433-438 - Chundong Wang, Sudipta Chattopadhyay:
Isle-Tree: A B+-Tree with Intra-Cache Line Sorted Leaves for Non-volatile Memory. ICCD 2020: 573-580 - Teck Ping Khoo, Jun Sun, Sudipta Chattopadhyay:
Learning Fault Models of Cyber Physical Systems. ICFEM 2020: 147-162 - Sakshi Udeshi
, Xingbin Jiang, Sudipta Chattopadhyay:
Callisto: Entropy-based Test Generation and Data Quality Assessment for Machine Learning Systems. ICST 2020: 448-453 - Matheus E. Garbelini, Chundong Wang, Sudipta Chattopadhyay, Sumei Sun, Ernest Kurniawan:
SweynTooth: Unleashing Mayhem over Bluetooth Low Energy. USENIX Annual Technical Conference 2020: 911-925 - Eric Rothstein Morris, Jun Sun, Sudipta Chattopadhyay:
Systematic Classification of Attackers via Bounded Model Checking. VMCAI 2020: 226-247 - Ezekiel O. Soremekun
, Sakshi Udeshi, Sudipta Chattopadhyay, Andreas Zeller:
Exposing Backdoors in Robust Machine Learning Models. CoRR abs/2003.00865 (2020)