Follow
Sudipta Chattopadhyay
Title
Cited by
Cited by
Year
Detecting energy bugs and hotspots in mobile apps
A Banerjee, LK Chong, S Chattopadhyay, A Roychoudhury
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations …, 2014
2572014
Automated Directed Fairness Testing
S Udeshi, P Arora, S Chattopadhyay
Automated Software Engineering (ASE), 2018, 2018
1762018
A unified WCET analysis framework for multicore platforms
S Chattopadhyay, LK Chong, A Roychoudhury, T Kelter, P Marwedel, ...
ACM Transactions on Embedded Computing Systems (TECS) 13 (4s), 124, 2014
1722014
Modeling shared cache and bus in multi-cores for timing analysis
S Chattopadhyay, A Roychoudhury, T Mitra
Proceedings of the 13th International Workshop on Software & Compilers for …, 2010
1432010
Where is the bug and how is it fixed? an experiment with practitioners
M Böhme, EO Soremekun, S Chattopadhyay, E Ugherughe, A Zeller
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
1362017
Bus-aware multicore WCET analysis through TDMA offset bounds
T Kelter, H Falk, P Marwedel, S Chattopadhyay, A Roychoudhury
2011 23rd Euromicro Conference on Real-Time Systems, 3-12, 2011
1292011
An experimental analysis of security vulnerabilities in industrial IoT devices
X Jiang, M Lora, S Chattopadhyay
ACM Transactions on Internet Technology (TOIT) 20 (2), 1-24, 2020
1042020
oo7: Low-overhead defense against spectre attacks via program analysis
G Wang, S Chattopadhyay, I Gotovchits, T Mitra, A Roychoudhury
IEEE Transactions on Software Engineering 47 (11), 2504-2519, 2019
1042019
Timing analysis of a protected operating system kernel
B Blackham, Y Shi, S Chattopadhyay, A Roychoudhury, G Heiser
Real-Time Systems Symposium (RTSS), 2011 IEEE 32nd, 339-348, 2011
1042011
Model agnostic defence against backdoor attacks in machine learning
S Udeshi, S Peng, G Woo, L Loh, L Rawshan, S Chattopadhyay
IEEE Transactions on Reliability 71 (2), 880-895, 2022
1012022
SweynTooth: Unleashing Mayhem over Bluetooth Low Energy
ME Garbelini, C Wang, S Chattopadhyay, S Sumei, E Kurniawan
2020 {USENIX} Annual Technical Conference ({USENIX}{ATC} 20), 911-925, 2020
872020
Kleespectre: Detecting information leakage through speculative cache attacks via symbolic execution
G Wang, S Chattopadhyay, AK Biswas, T Mitra, A Roychoudhury
ACM Transactions on Software Engineering and Methodology (TOSEM) 29 (3), 1-31, 2020
662020
Static analysis of multi-core TDMA resource arbitration delays
T Kelter, H Falk, P Marwedel, S Chattopadhyay, A Roychoudhury
Real-Time Systems 50 (2), 185-229, 2014
592014
Unified Cache Modeling for WCET Analysis and Layout Optimizations.
S Chattopadhyay, A Roychoudhury
RTSS 9, 47-56, 2009
592009
Quantifying the information leakage in cache attacks via symbolic execution
S Chattopadhyay, M Beck, A Rezine, A Zeller
ACM Transactions on Embedded Computing Systems (TECS) 18 (1), 1-27, 2019
56*2019
A Systematic Survey of Attack Detection and Prevention in Connected and Autonomous Vehicles
T Limbasiya, KZ Teng, S Chattopadhyay, J Zhou
Vehicular Communications 37 (100515), 1-23, 2022
462022
Scalable and precise refinement of cache timing analysis via model checking
S Chattopadhyay, A Roychoudhury
Real-Time Systems Symposium (RTSS), 2011 IEEE 32nd, 193-203, 2011
392011
{BrakTooth}: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing
ME Garbelini, V Bedi, S Chattopadhyay, S Sun, E Kurniawan
31st USENIX Security Symposium (USENIX Security 22), 1025-1042, 2022
35*2022
Chapter Three-On Testing Embedded Software
A Banerjee, S Chattopadhyay, A Roychoudhury
Advances in Computers 101, 121-153, 2016
352016
Astraea: Grammar-Based Fairness Testing
E Soremekun, S Udeshi, S Chattopadhyay
IEEE Transactions on Software Engineering 48 (12), 5188-5211, 2022
342022
The system can't perform the operation now. Try again later.
Articles 1–20