Research Interest

  • Adversarial Machine Learning

  • Deepfake Detection

  • Cyber Security

  • Hardware Security and Trust

  • IoT and Smart Infrastructure Design and Security

For more details on our research visit MIST Lab

  Academic Background

  Subjects Taught

  • CSL607: Adversarial Machine Learning: Monsoon 2019, 2021, Winter 2022, 2024
  • CS550: Machine Learning: Winter 2020, 2021,2022
  • CSL204: Computer Organization and Architecture: Monsoon 2018, 2020, 2021
  • CSL100: Introduction to Programming: Monsoon 2022, 2023, 2024
  • CS301: Computer Network: Monsoon 2019
  • EE311: Advanced Digital Circuit: Winter 2019
  • CS555: Network and System Security: Winter 2019
  •   Responsibilities

      Professional Experience

      Intellectual Property

    • Sudev Kumar Padhi, Archana Tiwari, Sk SubidhAli “A system and method for detecting and localizing digital document forgery for reconstruction of tamper-region”, Indian Patent Application No: 202421094908, Filed on 3-Dec-2024

    • Sudev Padhi, Mohit Kumar, Debanka Giri, and Sk Subidh Ali, “A system and method for enhanced grasp stability by detecting slip, crumple, and shape of the object in robotic hand,” Indian Patent No: 557306, Granted on 31-Dec-2024

    • Sudev Kumar Padhi, Archana Tiwari, Sk SubidhAli “a deep learning based system and method for dual watermarking of images”, Indian Patent Application No: 202421009753, Filed on 19-July-2024

    • Yogendra Sao and Sk Subidh Ali, “A System and Method for Defeating Scan Attacks on Cipher,” Indian Patent No. 538348, Granted on 16-May-2024

    • Sudev Kumar Padhi, Indrakumar Mhaski, Sk SubidhAli “A system and method for detecting fake images with source attribution”, Indian Patent Application No: 202321079201, Filed on 25-April-2024

    • Brejesh Lall, Sk Subidh Ali, Debanka Giri, and Sudev Kumar Padhi, "Systems and methods for verifying navigation signals", US Application No.: 18/520,583, Filed on 12-Nov-2023

    • Brejesh Lall, Sk Subidh Ali, Debanka Giri, and Sudev Kumar Padhi, "Systems and methods for verifying navigation signals", Indian Patent No: 554204, Granted on 12-Nov-2024

    •   Selected Publications

      Journal Papers
      1. Sudev Kumar Padhi, Archana Tiwari, Sk SubidhAli, “Deep Learning-Based Dual Watermarking for Image Copyright Protection and Authentication" , IEEE Transactions on Artificial Intelligence, Year 2024, vol. 5, pp. 6134 - 6145,

      2. YogendraSao, Sk SubidhAli, “DefScan: Provably Defeating Scan Attack on AES-Like Ciphers" , IEEE IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Year 2024, vol. 43, pp. 2326 - 2339,

      3. YogendraSao, Sk SubidhAli, “Security Analysis of Scan Obfuscation Techniques" , IEEE Transactions on Information Forensics and Security, Year 2023, vol. 18, pp. 2842-2855,

      4. Dipojjwal Ray, YogendraSao, Sk SubidhAli, Santosh Biswa, “On securing cryptographic ICs against scan-based attacks: A Hamming weight distribution perspective,” in ACM J. Emerg. Technol. Comput. Syst, vol. 19, no. 2, Mar 2023

      5. YogendraSao, Sk SubidhAli, Dipojjwal Ray, Siddharth Singh, Santosh Biswasa, “Co-relation scan attack analysis (COSAA) on AES: A comprehensive approach", Elsevier Microelectronics Reliability, Year 2021, Volume 123, Page 1-18.

      6. Sk Subidh Ali, Mohamed Ibrahim, J. Rajendran, Ozgur Sinanoglu, Krishnendu Chakrabarty, “Supply-Chain Security of Digital Microfluidic Biochips", IEEE Computer, Year 2016, Volume 49, Issue 8, Page 36-43.

      7. Chandra KH Suresh, Sk Subidh Ali , M. Bodhisatwa, Ozgur Sinanoglu, “A Comparative Security Analysis of Current and Emerging Technologies", IEEE Micro, Year 2016, Volume 36, Issue 5, Page 50-61.

      8. Bodhisatwa Mazumdar, Samah Mohamed Saeed, Sk Subidh Ali, Ozgur Sinanoglu: Timing Attack and Countermeasure on NEMS Relay Based Design of Block Ciphers. IEEE Trans. Emerging Topics Comput. 5(3): 317-328 (2017)

      9. Sk Subidh Ali, Mohamed Ibrahim, Ozgur Sinanoglu, Krishnendu Chakrabarty, Ramesh Karri: Security Assessment of Cyberphysical Digital Microfluidic Biochips. IEEE/ACM Trans. Comput. Biology Bioinform. 13(3): 445-458 (2016)

      10. Bodhisatwa Mazumdar, Sk Subidh Ali , Ozgur Sinanoglu: A Compact Implementation of Salsa20 and Its Power Analysis Vulnerabilities. ACM Trans. Design Autom. Electr. Syst. 22(1): 11:1-11:26 (2016)

      11. Sk Subidh Ali, Samah Mohamed Saeed, Ozgur Sinanoglu, Ramesh Karri: Novel Test-Mode-Only Scan Attack and Countermeasure for Compression-Based Scan Architectures. IEEE Trans. on CAD of Integrated Circuits and Systems 34(5): 808-821 (2015)

      12. Sk Subidh Ali, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay: A Fault Analysis Perspective for Testing of Secured SoC Cores. IEEE Design & Test 30(5): 63-73 (2013)

      13. Sk Subidh Ali , Debdeep Mukhopadhyay, Michael Tunstall: Differential fault analysis of AES: towards reaching its limits. J. Cryptographic Engineering 3(2): 73-97 (2013)

      Editorial
      1. Sk Subidh Ali , Debdeep Mukhopadhyay: Guest Editorial SPACE 2017 Special Issue in the Journal of Hardware and Systems Security (HaSS). J. Hardware and Systems Security 3(1): 1-2 (2019)
      2. Sk Subidh Ali, Jean-Luc Danger, Thomas Eisenbarth: "Security, Privacy, and Applied Cryptography Engineering" - 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings. Lecture Notes in Computer Science 10662, Springer 2017, ISBN 978-3-319-71500-1
      Book Chapter
      1. Sk Subidh Ali , Samah Mohamed Saeed, Ozgur Sinanoglu, and Ramesh Karri, “New Scan-Based Attack Using Only the Test Mode And An Input Corruption Countermeasure”, In "VLSI-SoC:At the Crossroads of Emerging Trends", edited by H. F. Ugurdag, Alex Orailoglu, R. Reis, M. Margala, L. Carro, L. M. Silveira, Springer, Chapter 3, p. 48-68, New York, USA, 2015.

      2. Sk Subidh Ali , Xiaofei Guo, D. Mukhopadhyay and Ramesh Karri, “Differential Fault Attacks on AES and Their Countermeasures” In “Secure System Design and Trustable Computing”, edited by M. Potkonjak and Y. Liu, Springer, Chapter 5, p. 163-208, New York, USA, 2015.

      3. S. Samah, Sk Subidh Ali , O Sinanoglu, “Scan Design: Basics, Advancements, and Vulnerabilities”, In “Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment”, Nicolas Sklavos, Ricardo Chaves, Giorgio Di Natale, Francesco Regazzoni (editors), Springer 2017.

      Peer Review Conference
      1. Yogendra Sao, Anjum Riaz, Satyadev Ahlawat, and Sk Subidh Ali, “Evaluating Security of New Locking SIB-based Architectures,” 2022 IEEE European Test Symposium (ETS), Barcelona, Spain, 2022, pp. 1-6,

      2. Yogendra Sao, Sk Subidh Ali,“Security Analysis of State-of-the-art Scan Obfuscation Technique,” 2021 IEEE 39th International Conference on Computer Design (ICCD), Storrs, CT, USA, 2021, pp.599-602

      3. Yogendra Sao, Sk Subidh Ali, and S. Biswas,"Opacity preserving Countermeasure using Finite State Machines against Differential Scan Attacks", 2021 IEEE European Test Symposium (ETS), Bruges, Belgium, 2021, pp. 1-2

      4. Yogendra Sao, K.K.Soundra Pandian, and Sk Subidh Ali, "Revisiting the security of static masking and compaction: Discovering new vulnerability and Improved Scan Attack on AES", 2020 IEEE Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Kolkata, India, 2020, pp. 1-6

      5. D. Ray, S. Singh, Sk Subidh Ali and S. Biswas, ``Co-relation Scan Attack Analysis (COSAA) on AES: A Comprehensive Approach" 2019 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), Noordwijk, Netherlands, 2019, pp. 1-6.

      6. Sk Subidh Ali, Mohamed Ibrahim, Ozgur Sinanoglu, Krishnendu Chakrabarty, and Ramesh Karri, “Microfluidic encryption of on-chip biochemical assays”, 2016 IEEE Biomedical Circuits and Systems Conference (BioCAS 2016), p. 152-155.

      7. Chandra KH Suresh, M. Bodhisatwa, S. Samah, Sk Subidh Ali, and O. Sinanoglu, “Power-side-channel analysis of carbon nanotube FET-based design," 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS 2016), p. 215-218, Spain.

      8. Sk Subidh Ali, Mohamed Ibrahim, Ozgur Sinanoglu, Krishnendu Chakrabarty, and Ramesh Karri, “Security Implications of Cyberphysical Digital Micro Biochips”, 2015 IEEE 33rd International Conference on Computer Design (ICCD 2015), p. 483-486, New York, USA.

      9. M. Bodhisatwa, S. Samah, Sk Subidh Ali, and O. Sinanoglu, “Thwarting Timing Attacks on NEMS Relay Based Designs," IEEE 34-th VLSI Test Symposium (VTS 2016) (accepted).

      10. Sk Subidh Ali, O. Sinanoglu, “Scan Attack on Elliptic Curve Cryptosystem”, 2015 IEEE 28-th Symposium of Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS-2015), p. 115-118, Massachusetts, USA.

      11. Y. Muhammad, M. Bodhisatwa, Sk Subidh Ali , O. Sinanoglu, “Security Analysis of Logic Encryption Against the Most Effective Side-Channel Attack: DPA”, 2015 IEEE 28-th Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS 2015), p. 97-102, Massachusetts, USA.

      12. . S. Samah, M. Bodhisatwa, Sk Subidh Ali, O. Sinanoglu, “Timing Attack on NEMS Relay Based Design of AES”, 2015 IFIP/IEEE 23rd International Conference on Very Large Scale Integration (VLSI-SOC), 264-269, Daejeon, South Korea.

      13. Bodhisatwa Mazumdar, Sk Subidh Ali and O. Sinanoglu, "Power Analysis Attacks on ARX: An Application to Salsa20", 2015 IEEE 21-st International Online Testing Symposium (IOLTS 2015), p. 40-43, Halkidiki, Greece.

      14. Sk Subidh Ali and Ozgur Sinanoglu “TMO: A New Class of Attack on Cipher Misusing Test Infrastructure” , 2015 IEEE 33-rd VLSI Test Symposium (VTS), p.1-4, Napa, CA, USA.

      15. Jerry Backer, Sk Subidh Ali, Kurt Rosenfeld, David Hely, Ozgur Sinanoglu, and Ramesh Karri, “A Secure Design-for-Test Architecture to Thwart Attacks Throughout The Life Cycle of SoCs”, 2015 IEEE International Symposium on Circuits and Systems (ISCAS), p. 37-40, Lisbon, Portugal.

      16. Sk Subidh Ali, Ozgur Sinanoglu, and Ramesh Karri, “AES Design Space Exploration New Line for Scan Attack Resiliency”, 2014 IFIP/IEEE 22nd International Conference on Very Large Scale Integration (VLSI-SoC), p. 1-6, Cancun, Mexico

      17. Samah Mohamed Saeed, Sk Subidh Ali, Ozgur Sinanoglu, and Ramesh Karri, "Novel Test-Mode-Only Scan Attack and Countermeasure for Contemporary Scan Architectures", 2014 IEEE International Test Conference (ITC), p. 1-8, Seattle, WA, USA.

      18. Sk Subidh Ali, Ozgur Sinanoglu, and Ramesh Karri, “Test-Mode-Only Scan Attack Using The Boundary Scan Chain”, 19th IEEE European Test Symposium (ETS), p.1-6, Paderborn, Germany.

      19. Sk Subidh Ali, Samah Mohamed Saeed, Ozgur Sinanoglu, and Ramesh Karri, “New Scan Attacks Against State-of-The-Art Countermeasures And DFT”, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), p.142-147, Arlington, USA.

      20. Sk Subidh Ali, Samah Mohamed Saeed, Ozgur Sinanoglu, and Ramesh Karri, “New Scan-based Attack Using Only The Test Mode”, 2013 IFIP/IEEE 21st International Conference on Very Large Scale Integration(VLSI-SoC), p.234-239, Istanbul, Turkey.

      21. Sk Subidh Ali, Samah Mohamed Saeed, Ozgur Sinanoglu, Ramesh Karri, “Scan Attack in Presence of Mode-Reset Countermeasure", 2013 IEEE 19-th International On-Line Testing Symposium (IOLTS), p.230-231, Chania, Greece.

      22. Sk Subidh Ali, and Debdeep Mukhopadhyay, “Differential Fault Analysis of Twofish”, 8th International Conference Information Security and Cryptology (INSCRYPT) 2013: LNCS Volume 7763, p. 10-28, Beijing, China.

      23. Sk Subidh Ali, and Debdeep Mukhopadhyay, “Improved Di_erential Fault Analysis of CLEFIA”, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), p. 60-70, Santa Barbara, CA, USA

      24. Sk Subidh Ali, and Debdeep Mukhopadhyay, “A Differential Fault Analysis on AES Key Schedule Using Single Multi-Byte Fault”, IFIP WG 10th Smart Card Research and Advanced Applications (CARDIS) 2011: LNCS Volume 6737, p.50-64, Leuven, Belgium.

      25. Sk Subidh Ali, and Debdeep Mukhopadhyay, “A Differential Fault Analysis on AES Key Schedule Using Single Fault”, 2011 IEEE Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) p. 35-42, Nara, Japan.

      26. Michael Tunstall, Debdeep Mukhopadhyay, and Sk Subidh Ali, Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault" , IFIPWG 5th International Workshop on Information Security Theory and Practice (WISTP) 2011: LNCS Volume 6633, p. 224-233, Crete, Greece.

      27. Sk Subidh Ali, and Debdeep Mukhopadhyay, “An Improved Differential Fault Analysis on AES-256”, 2011 Progress in Cryptology, 4th International Conference in Cryptology in Africa, (Africacrypt) LNCS Volume 6737, p. 332-347, Dakar, Senegal.

      28. Sk Subidh Ali, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay and Swarup Bhunia, “Multi-level Attack: an Emerging Threat Model for Cryptographic Hardware”, In the proceeding of (DATE), p. 1-4, France.

Message From Director

I am pleased to extend my greetings to students and their parents as well as colleagues near and far. IIT Bhilai was established on 7 August 2016. We are located in Chhattisgarh, the rice bowl of India, in a state rich in natural resources as well as cultural memory and heritage. Read More

Newsletter

Subscribe to our Newsletter and stay tuned.