Suivre
Sudipta Chattopadhyay
Sudipta Chattopadhyay
Adresse e-mail validée de sutd.edu.sg - Page d'accueil
Titre
Citée par
Citée par
Année
Detecting energy bugs and hotspots in mobile apps
A Banerjee, LK Chong, S Chattopadhyay, A Roychoudhury
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations …, 2014
2532014
A unified WCET analysis framework for multicore platforms
S Chattopadhyay, LK Chong, A Roychoudhury, T Kelter, P Marwedel, ...
ACM Transactions on Embedded Computing Systems (TECS) 13 (4s), 124, 2014
1682014
Automated Directed Fairness Testing
S Udeshi, P Arora, S Chattopadhyay
Automated Software Engineering (ASE), 2018, 2018
1502018
Modeling shared cache and bus in multi-cores for timing analysis
S Chattopadhyay, A Roychoudhury, T Mitra
Proceedings of the 13th International Workshop on Software & Compilers for …, 2010
1402010
Bus-aware multicore WCET analysis through TDMA offset bounds
T Kelter, H Falk, P Marwedel, S Chattopadhyay, A Roychoudhury
2011 23rd Euromicro Conference on Real-Time Systems, 3-12, 2011
1282011
Where is the bug and how is it fixed? an experiment with practitioners
M Böhme, EO Soremekun, S Chattopadhyay, E Ugherughe, A Zeller
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
1202017
Timing analysis of a protected operating system kernel
B Blackham, Y Shi, S Chattopadhyay, A Roychoudhury, G Heiser
Real-Time Systems Symposium (RTSS), 2011 IEEE 32nd, 339-348, 2011
1042011
oo7: Low-overhead defense against spectre attacks via program analysis
G Wang, S Chattopadhyay, I Gotovchits, T Mitra, A Roychoudhury
IEEE Transactions on Software Engineering 47 (11), 2504-2519, 2019
882019
Model agnostic defence against backdoor attacks in machine learning
S Udeshi, S Peng, G Woo, L Loh, L Rawshan, S Chattopadhyay
IEEE Transactions on Reliability 71 (2), 880-895, 2022
852022
An experimental analysis of security vulnerabilities in industrial IoT devices
X Jiang, M Lora, S Chattopadhyay
ACM Transactions on Internet Technology (TOIT) 20 (2), 1-24, 2020
822020
SweynTooth: Unleashing Mayhem over Bluetooth Low Energy
ME Garbelini, C Wang, S Chattopadhyay, S Sumei, E Kurniawan
2020 {USENIX} Annual Technical Conference ({USENIX}{ATC} 20), 911-925, 2020
722020
Kleespectre: Detecting information leakage through speculative cache attacks via symbolic execution
G Wang, S Chattopadhyay, AK Biswas, T Mitra, A Roychoudhury
ACM Transactions on Software Engineering and Methodology (TOSEM) 29 (3), 1-31, 2020
632020
Static analysis of multi-core TDMA resource arbitration delays
T Kelter, H Falk, P Marwedel, S Chattopadhyay, A Roychoudhury
Real-Time Systems 50 (2), 185-229, 2014
572014
Unified Cache Modeling for WCET Analysis and Layout Optimizations.
S Chattopadhyay, A Roychoudhury
RTSS 9, 47-56, 2009
562009
Quantifying the information leakage in cache attacks via symbolic execution
S Chattopadhyay, M Beck, A Rezine, A Zeller
ACM Transactions on Embedded Computing Systems (TECS) 18 (1), 1-27, 2019
54*2019
Scalable and precise refinement of cache timing analysis via model checking
S Chattopadhyay, A Roychoudhury
Real-Time Systems Symposium (RTSS), 2011 IEEE 32nd, 193-203, 2011
392011
Chapter Three-On Testing Embedded Software
A Banerjee, S Chattopadhyay, A Roychoudhury
Advances in Computers 101, 121-153, 2016
352016
Symbolic verification of cache side-channel freedom
S Chattopadhyay, A Roychoudhury
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2018
322018
Towards Backdoor Attacks and Defense in Robust Machine Learning Models
E Soremekun, S Udeshi, S Chattopadhyay
Computers & Security, 103101, 2023
31*2023
Astraea: Grammar-Based Fairness Testing
E Soremekun, S Udeshi, S Chattopadhyay
IEEE Transactions on Software Engineering 48 (12), 5188-5211, 2022
302022
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20