Sk Subidh ali

@iitbhilai.ac.in

Assistant Professor
Indian Insitute of Technology Bhilai



              

https://researchid.co/subidhali

EDUCATION

PhD in Computer Science and Engineering, Indian Institute of Technology Kharagpur

RESEARCH INTERESTS

Hardware security and Machine Learning

1448

Scholar Citations

19

Scholar h-index

24

Scholar i10-index

RECENT SCHOLAR PUBLICATIONS

  • Deep Learning-based Dual Watermarking for Image Copyright Protection and Authentication
    SK Padhi, A Tiwari, SS Ali
    IEEE Transactions on Artificial Intelligence 2024

  • DLOVE: A new Security Evaluation Tool for Deep Learning Based Watermarking Techniques
    SK Padhi, SS Ali
    arXiv preprint arXiv:2407.06552 2024

  • Attack GAN (AGAN): A new Security Evaluation Tool for Perceptual Encryption
    U Kashyap, SK Padhi, SS Ali
    arXiv preprint arXiv:2407.06570 2024

  • Generalized deepfake attribution
    SM Shahid, SK Padhi, U Kashyap, SS Ali
    arXiv preprint arXiv:2406.18278 2024

  • DefScan: Provably Defeating Scan Attack on AES-Like Ciphers
    Y Sao, SS Ali, B Mazumdar
    IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2024

  • Vulnerability of Dynamic Masking in Test Compression
    Y Sao, D Giri, S Saha, SS Ali
    International Conference on Security, Privacy, and Applied Cryptography 2023

  • Security analysis of scan obfuscation techniques
    Y Sao, SS Ali
    IEEE Transactions on Information Forensics and Security 18, 2842-2855 2023

  • On Securing Cryptographic ICs against Scan-based Attacks: A Hamming Weight Distribution Perspective
    D Ray, Y Sao, S Biswas, SS Ali
    ACM Journal on Emerging Technologies in Computing Systems 19 (2), 1-20 2023

  • Emerging Technologies in Computing Systems
    D Ray, Y Sao, S Biswas, SS Ali, BMSB Talukder, F Ferdaus, MT Rahman, ...
    ACM Journal on 19 (2) 2023

  • Evaluating security of new locking SIB-based architectures
    Y Sao, A Riaz, S Ahlawat, SS Ali
    2022 IEEE European Test Symposium (ETS), 1-6 2022

  • Security analysis of state-of-the-art scan obfuscation technique
    Y Sao, SS Ali
    2021 IEEE 39th International Conference on Computer Design (ICCD), 599-602 2021

  • Co-relation scan attack analysis (COSAA) on AES: A comprehensive approach
    Y Sao, SS Ali, D Ray, S Singh, S Biswas
    Microelectronics Reliability 123, 114216 2021

  • Opacity preserving countermeasure using finite state machines against differential scan attacks
    SS Ali, Y Sao, S Biswas
    2021 IEEE European Test Symposium (ETS), 1-2 2021

  • Revisiting the security of static masking and compaction: Discovering new vulnerability and improved scan attack on aes
    Y Sao, KKS Pandian, SS Ali
    2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 1-6 2020

  • Guest Editorial SPACE 2017 Special Issue in the Journal of Hardware and Systems Security (HaSS)
    SS Ali, D Mukhopadhyay
    Journal of Hardware and Systems Security 3, 1-2 2019

  • Security, privacy, and applied cryptography engineering
    SS Ali, JL Danger, T Eisenbarth
    7th International Conference, SPACE, 13-17 2017

  • Scan design: Basics, advancements, and vulnerabilities
    SM Saeed, SS Ali, O Sinanoglu
    Hardware Security and Trust: Design and Deployment of Integrated Circuits in 2017

  • A compact implementation of Salsa20 and its power analysis vulnerabilities
    B Mazumdar, SS Ali, O Sinanoglu
    ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 2016

  • A comparative security analysis of current and emerging technologies
    CKH Suresh, B Mazumdar, SS Ali, O Sinanoglu
    IEEE Micro 36 (5), 50-61 2016

  • Microfluidic encryption of on-chip biochemical assays
    SS Ali, M Ibrahim, O Sinanoglu, K Chakrabarty, R Karri
    2016 IEEE Biomedical Circuits and Systems Conference (BioCAS), 152-155 2016

MOST CITED SCHOLAR PUBLICATIONS

  • Differential fault analysis of the advanced encryption standard using a single fault
    M Tunstall, D Mukhopadhyay, S Ali
    Information Security Theory and Practice. Security and Privacy of Mobile 2011
    Citations: 448

  • Supply-chain security of digital microfluidic biochips
    SS Ali, M Ibrahim, J Rajendran, O Sinanoglu, K Chakrabarty
    Computer 49 (8), 36-43 2016
    Citations: 73

  • Security assessment of cyberphysical digital microfluidic biochips
    SS Ali, M Ibrahim, O Sinanoglu, K Chakrabarty, R Karri
    IEEE/ACM transactions on computational biology and Bioinformatics 13 (3 2015
    Citations: 72

  • Security analysis of logic encryption against the most effective side-channel attack: DPA
    M Yasin, B Mazumdar, SS Ali, O Sinanoglu
    2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and 2015
    Citations: 70

  • Novel test-mode-only scan attack and countermeasure for compression-based scan architectures
    SS Ali, SM Saeed, O Sinanoglu, R Karri
    IEEE transactions on computer-aided design of integrated circuits and 2015
    Citations: 69

  • Differential fault analysis of AES: towards reaching its limits
    SS Ali, D Mukhopadhyay, M Tunstall
    Journal of Cryptographic Engineering 3, 73-97 2013
    Citations: 65

  • A differential fault analysis on AES key schedule using single fault
    SS Ali, D Mukhopadhyay
    2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 35-42 2011
    Citations: 59

  • New scan-based attack using only the test mode
    SS Ali, O Sinanoglu, SM Saeed, R Karri
    2013 IFIP/IEEE 21st International Conference on Very Large Scale Integration 2013
    Citations: 58

  • Multi-level attacks: An emerging security concern for cryptographic hardware
    SS Ali, RS Chakraborty, D Mukhopadhyay, S Bhunia
    2011 Design, Automation & Test in Europe, 1-4 2011
    Citations: 57

  • Microfluidic encryption of on-chip biochemical assays
    SS Ali, M Ibrahim, O Sinanoglu, K Chakrabarty, R Karri
    2016 IEEE Biomedical Circuits and Systems Conference (BioCAS), 152-155 2016
    Citations: 55

  • Fault attacks on AES and their countermeasures
    S Ali, X Guo, R Karri, D Mukhopadhyay
    Secure System Design and Trustable Computing, 163-208 2016
    Citations: 45

  • Test-mode-only scan attack using the boundary scan chain
    SS Ali, O Sinanoglu, R Karri
    2014 19th IEEE European test symposium (ETS), 1-6 2014
    Citations: 36

  • Security implications of cyberphysical digital microfluidic biochips
    SS Ali, M Ibrahim, O Sinanoglu, K Chakrabarty, R Karri
    2015 33rd IEEE International Conference on Computer Design (ICCD), 483-486 2015
    Citations: 30

  • Test-mode-only scan attack and countermeasure for contemporary scan architectures
    SM Saeed, SS Ali, O Sinanoglu, R Karri
    2014 International Test Conference, 1-8 2014
    Citations: 30

  • New scan attacks against state-of-the-art countermeasures and DFT
    SS Ali, O Sinanoglu, SM Saeed, R Karri
    2014 IEEE International Symposium on Hardware-Oriented Security and Trust 2014
    Citations: 26

  • Power analysis attacks on ARX: an application to Salsa20
    B Mazumdar, SS Ali, O Sinanoglu
    2015 IEEE 21st International On-Line Testing Symposium (IOLTS), 40-43 2015
    Citations: 24

  • Scan attack in presence of mode-reset countermeasure
    SS Ali, SM Saeed, O Sinanoglu, R Karri
    2013 IEEE 19th International On-Line Testing Symposium (IOLTS), 230-231 2013
    Citations: 24

  • Differential fault analysis of AES-128 key schedule using a single multi-byte fault
    SS Ali, D Mukhopadhyay
    Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 2011
    Citations: 20

  • Differential fault analysis of AES using a single multiple-byte fault
    S Ali, D Mukhopadhyay, M Tunstall
    Cryptology ePrint Archive 2010
    Citations: 19

  • Improved differential fault analysis of CLEFIA
    SS Ali, D Mukhopadhyay
    2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 60-70 2013
    Citations: 17