Swarup Bhunia mainly focuses on Embedded system, Trojan, Hardware Trojan, Electronic engineering and Integrated circuit design. His research integrates issues of Computer hardware, Integrated circuit, Cryptography and Benchmark in his study of Embedded system. His work carried out in the field of Trojan brings together such families of science as Chip, Side channel attack, Hardware security module and Sensitivity.
His Hardware Trojan research is included under the broader classification of Computer security. His studies examine the connections between Computer security and genetics, as well as such issues in Logic testing, with regards to Variety. His work on Logic synthesis, Circuit design and Physical design as part of general Electronic engineering study is frequently connected to Low-power electronics, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them.
Swarup Bhunia mostly deals with Embedded system, Electronic engineering, Computer security, Field-programmable gate array and Computer hardware. His studies deal with areas such as Trojan, Hardware Trojan, Integrated circuit, Chip and Hardware security module as well as Embedded system. In the field of Electronic engineering, his study on CMOS, Logic synthesis and Integrated circuit design overlaps with subjects such as Low-power electronics.
His biological study spans a wide range of topics, including Supply chain, Intellectual property and Electronic hardware. Within one scientific family, Swarup Bhunia focuses on topics pertaining to Overhead under Field-programmable gate array, and may sometimes address concerns connected to Fault. His Computer hardware study frequently draws connections between adjacent fields such as System on a chip.
His primary scientific interests are in Embedded system, Computer security, Hardware security module, Security policy and Supply chain. Swarup Bhunia interconnects Obfuscation and Authentication in the investigation of issues within Embedded system. The study incorporates disciplines such as Business model and Software deployment in addition to Computer security.
Swarup Bhunia combines subjects such as Field, Computer hardware and Electronic design automation with his study of Hardware security module. His Supply chain research focuses on Reverse engineering and how it relates to Integrated circuit and Hardware obfuscation. He works in the field of Trojan, focusing on Hardware Trojan in particular.
His primary areas of investigation include Embedded system, Hardware security module, Computer security, Key and Supply chain. The study incorporates disciplines such as Plaintext, Benchmarking, Block cipher and Authentication in addition to Embedded system. His Hardware security module study integrates concerns from other disciplines, such as Security analysis, Electronic design automation and Electronic hardware.
In general Computer security study, his work on Trojan often relates to the realm of Metric, thereby connecting several areas of interest. His Key research incorporates elements of Exploit, Logic synthesis and Computer engineering. His study in Supply chain is interdisciplinary in nature, drawing from both Risk analysis, Reverse engineering and Integrated circuit.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Hardware Trojan Attacks: Threat Analysis and Countermeasures
Swarup Bhunia;Michael S. Hsiao;Mainak Banga;Seetharam Narasimhan.
Proceedings of the IEEE (2014)
HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection
R.S. Chakraborty;S. Bhunia.
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2009)
MERO: A Statistical Approach for Hardware Trojan Detection
Rajat Subhra Chakraborty;Francis Wolff;Somnath Paul;Christos Papachristou.
cryptographic hardware and embedded systems (2009)
Hardware Trojan: Threats and emerging solutions
Rajat Subhra Chakraborty;Seetharam Narasimhan;Swarup Bhunia.
high level design validation and test (2009)
Towards trojan-free trusted ICs: problem analysis and detection scheme
Francis Wolff;Chris Papachristou;Swarup Bhunia;Rajat S. Chakraborty.
design, automation, and test in europe (2008)
Hardware Trojans: Lessons Learned after One Decade of Research
K. Xiao;D. Forte;Y. Jin;R. Karri.
ACM Transactions on Design Automation of Electronic Systems (2016)
Security against hardware Trojan through a novel application of design obfuscation
Rajat Subhra Chakraborty;Swarup Bhunia.
international conference on computer aided design (2009)
Electromechanical computing at 500°C with silicon carbide
Te Hao Lee;Swarup Bhunia;Mehran Mehregany.
Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis
Seetharam Narasimhan;Dongdong Du;Rajat Subhra Chakraborty;Somnath Paul.
IEEE Transactions on Computers (2013)
Benchmarking of Hardware Trojans and Maliciously Affected Circuits
Bicky Shakya;Tony He;Hassan Salmani;Domenic Forte.
Journal of Hardware and Systems Security (2017)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: