scispace - formally typeset
R

Rajat Subhra Chakraborty

Researcher at Indian Institute of Technology Kharagpur

Publications -  160
Citations -  4834

Rajat Subhra Chakraborty is an academic researcher from Indian Institute of Technology Kharagpur. The author has contributed to research in topics: Hardware Trojan & Trojan. The author has an hindex of 29, co-authored 149 publications receiving 3831 citations. Previous affiliations of Rajat Subhra Chakraborty include Indian Institutes of Technology & Case Western Reserve University.

Papers
More filters
Journal ArticleDOI

HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection

TL;DR: Simulation results for a set of ISCAS-89 benchmark circuits and the advanced-encryption-standard IP core show that high levels of security can be achieved at less than 5% area and power overhead under delay constraint.
Book ChapterDOI

MERO: A Statistical Approach for Hardware Trojan Detection

TL;DR: A test pattern generation technique based on multiple excitation of rare logic conditions at internal nodes that maximizes the probability of inserted Trojans getting triggered and detected by logic testing, while drastically reducing the number of vectors compared to a weighted random pattern based test generation.
Proceedings ArticleDOI

Hardware Trojan: Threats and emerging solutions

TL;DR: The threat posed by hardware Trojans and the methods of deterring them are analyzed, a Trojan taxonomy, models of Trojan operations and a review of the state-of-the-art Trojan prevention and detection techniques are presented.
Journal ArticleDOI

Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis

TL;DR: A novel noninvasive, multiple-parameter side-channel analysisbased Trojan detection approach that uses the intrinsic relationship between dynamic current and maximum operating frequency of a circuit to isolate the effect of a Trojan circuit from process noise.
Proceedings ArticleDOI

Security against hardware Trojan through a novel application of design obfuscation

TL;DR: Simulation results for a set of benchmark circuits show that the proposed obfuscation scheme is capable of achieving high levels of security at modest design overhead and makes some inserted Trojans benign by making them activate only in the obfuscated mode.