Publications

The push to meet growing user requirements and manufacturing challenges at lower technology nodes have motivated chip designers to …

Hardware Watermarking is one of the popular countermeasures to prevent hardware counterfeiting. A robust watermark has to be invisible …

The heterogeneous array of edge devices in an Internet of Things (IoT) infrastructure is increasingly vulnerable to physical in-field …

Cryptography hardware are highly vulnerable to a class of side-channel attacks known as Differential Fault Analysis (DFA). These …

HTTP/2 introduced multi-threaded server operation for performance improvement over HTTP/1.1. Recent works have discovered that …

Accomplish­ments

My Thesis was selected for presentation at the DAC PhD Forum

Richard Newton Young Fellow

Winner Embedded Systems Challenge, CyberSecurity Awareness Week, 2016

Winner Student Research Presentation

Winner Second place Yahoo Hacku 2013

Contact