Hardware trojans in emerging non-volatile memories MNI Khan, K Nagarajan, S Ghosh 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 396-401, 2019 | 28 | 2019 |
ENTT: A family of emerging NVM-based trojan triggers K Nagarajan, MNI Khan, S Ghosh 2019 IEEE International Symposium on Hardware Oriented Security and Trust …, 2019 | 25 | 2019 |
HarTBleed: Using hardware Trojans for data leakage exploits A De, MNI Khan, K Nagarajan, S Ghosh IEEE Transactions on Very Large Scale Integration (VLSI) Systems 28 (4), 968-979, 2020 | 23 | 2020 |
SCARE: Side channel attack on in-memory computing for reverse engineering SS Ensan, K Nagarajan, MNI Khan, S Ghosh IEEE Transactions on Very Large Scale Integration (VLSI) Systems 29 (12 …, 2021 | 13 | 2021 |
SHINE: A novel SHA-3 implementation using ReRAM-based in-memory computing K Nagarajan, SS Ensan, MNI Khan, S Ghosh, A Chattopadhyay 2019 IEEE/ACM International Symposium on Low Power Electronics and Design …, 2019 | 11 | 2019 |
TrappeD: DRAM trojan designs for information leakage and fault injection attacks K Nagarajan, A De, MNI Khan, S Ghosh Microprocessor test and validation, 2019 | 8 | 2019 |
SecNVM: Power side-channel elimination using on-chip capacitors for highly secure emerging NVM K Nagarajan, FU Ahmed, MNI Khan, A De, MH Chowdhury, S Ghosh IEEE Transactions on Very Large Scale Integration (VLSI) Systems 29 (8 …, 2021 | 6 | 2021 |
Analysis of power-oriented fault injection attacks on spiking neural networks K Nagarajan, J Li, SS Ensan, MNI Khan, S Kannan, S Ghosh 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), 861-866, 2022 | 5 | 2022 |
Fault Injection Attacks in Spiking Neural Networks and Countermeasures K Nagarajan, J Li, SS Ensan, S Kannan, S Ghosh Frontiers in Nanotechnology, 97, 2022 | 5 | 2022 |
IMACE: In-memory acceleration of classic McEliece encoder K Nagarajan, SS Ensan, S Mandal, S Ghosh, A Chattopadhyay 2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 513-518, 2019 | 4 | 2019 |
SCANN: Side channel analysis of spiking neural networks K Nagarajan, R Roy, RO Topaloglu, S Kannan, S Ghosh Cryptography 7 (2), 17, 2023 | 3 | 2023 |
Recent advances in emerging technology-based security primitives, attacks and mitigation K Nagarajan, A De, SS Ensan, A Ash-Saki, MNI Khan, S Ghosh 2020 IEEE 63rd International Midwest Symposium on Circuits and Systems …, 2020 | 2 | 2020 |
Hands-on cybersecurity curriculum using a modular training kit A De, S Ghosh ASEE annual conference, 2020 | 2 | 2020 |
EXPLORING SECURITY CHALLENGES AND OPPORTUNITIES IN EMERGING MEMORY AND COMPUTING TECHNOLOGIES K Nagarajan The Pennsylvania State University, 2022 | | 2022 |
ENTT/ENTTR: A Family of Improved Emerging NVM-based Trojan Triggers and Resets K Nagarajan, MNI Khan, S Ghosh Frontiers in Nanotechnology, 22, 2022 | | 2022 |
Malicious Attacks Mitigation Performance and Security Analysis of Parameter-Obfuscated Analog Circuits...... V. Venugopal Rao and I. Savidis 2013 Secure XOR-CIM Engine: Compute … S Huang, H Jiang, X Peng, W Li, S Yu, SS Ensan, K Nagarajan, MNI Khan, ... | | 2021 |
2020 BEST PIC I PAPER WINNER-Hands-On Cybersecurity Curriculum Using a Modular Training Kit A De, MNI Khan, K Nagarajan, AA Saki, MM Alam, TS Wood, M Johnson, ... 2021 ASEE Virtual Annual Conference Content Access, 2021 | | 2021 |
Hands-on Cybersecurity Curriculum Using a Modular Training Kit MNI Khan, K Nagarajan, AA Saki, M Alam, TS Wood, M Johnson, ... 2020 ASEE Virtual Annual Conference Content Access, 2020 | | 2020 |
Reliable Circuits DAD-FF: Hardening Designs by Delay-Adjustable D-Flip-Flop for Soft-Error-Rate Reduction.......................... A De, MNI Khan, K Nagarajan, S Ghosh | | 2020 |
Meeting the Conflicting Goals of Low-Power and Resiliency Using Emerging Memories K Nagarajan, MNI Khan, SS Ensan, A Ash-Saki, S Ghosh 2019 IEEE 25th International Symposium on On-Line Testing and Robust System …, 2019 | | 2019 |