Research Interest

  • Adversarial Machine Learning

  • Deepfake Detection

  • Cyber Security

  • Hardware Security and Trust

  • IoT and Smart Infrastructure Design and Security

For more details on our research visit MIST Lab

  Academic Background

  Subjects Taught

  • 2021 Monsoon:
    • CS550: Machine Learning (UG & PG Elective Course)
    • CS204: Computer Organization and Architecture (B.Tech Course)

  • 2021 Winter:
    • CS550: Machine Learning (UG & PG Elective Course)

  • 2020 Monsoon:
    • CS607: Adversarial Machine Learning (UG & PG Elective Course)
    • CS204: Computer Organization and Architecture (B.Tech Course)

  • 2020 Winter:
    • CS550: Machine Learning (UG & PG Elective Course)
    • CS501: Computer System (PG Core)

  • 2019 Monsoon:
    • CS301: Computer Network (UG Core Course)
    • CS607: Adversarial Machine Learning (UG & PG Elective Course)

  • 2019 Winter:
    • EE311 Advanced Digital Circuit (B.Tech EE Course)
    • CS555 Network and System Security (PG Elective Course)

  • 2018 Monsoon:
    • CS204: Computer Organization and Architecture (B.Tech Course)
  • 2018 Winter:
    • CS3523: Operating System Concepts (B.Tech Course)

  Responsibilities

  Professional Experience

  Selected Publications

Journal Papers
  1. YogendraSao, Sk SubidhAli, “Security Analysis of Scan Obfuscation Techniques" , IEEE Transactions on Information Forensics and Security, Year 2023, vol. 18, pp. 2842-2855,

  2. Dipojjwal Ray, YogendraSao, Sk SubidhAli, Santosh Biswa, “On securing cryptographic ICs against scan-based attacks: A Hamming weight distribution perspective,” in ACM J. Emerg. Technol. Comput. Syst, vol. 19, no. 2, Mar 2023

  3. YogendraSao, Sk SubidhAli, Dipojjwal Ray, Siddharth Singh, Santosh Biswasa, “Co-relation scan attack analysis (COSAA) on AES: A comprehensive approach", Elsevier Microelectronics Reliability, Year 2021, Volume 123, Page 1-18.

  4. Sk Subidh Ali, Mohamed Ibrahim, J. Rajendran, Ozgur Sinanoglu, Krishnendu Chakrabarty, “Supply-Chain Security of Digital Microfluidic Biochips", IEEE Computer, Year 2016, Volume 49, Issue 8, Page 36-43.

  5. Chandra KH Suresh, Sk Subidh Ali , M. Bodhisatwa, Ozgur Sinanoglu, “A Comparative Security Analysis of Current and Emerging Technologies", IEEE Micro, Year 2016, Volume 36, Issue 5, Page 50-61.

  6. Bodhisatwa Mazumdar, Samah Mohamed Saeed, Sk Subidh Ali, Ozgur Sinanoglu: Timing Attack and Countermeasure on NEMS Relay Based Design of Block Ciphers. IEEE Trans. Emerging Topics Comput. 5(3): 317-328 (2017)

  7. Sk Subidh Ali, Mohamed Ibrahim, Ozgur Sinanoglu, Krishnendu Chakrabarty, Ramesh Karri: Security Assessment of Cyberphysical Digital Microfluidic Biochips. IEEE/ACM Trans. Comput. Biology Bioinform. 13(3): 445-458 (2016)

  8. Bodhisatwa Mazumdar, Sk Subidh Ali , Ozgur Sinanoglu: A Compact Implementation of Salsa20 and Its Power Analysis Vulnerabilities. ACM Trans. Design Autom. Electr. Syst. 22(1): 11:1-11:26 (2016)

  9. Sk Subidh Ali, Samah Mohamed Saeed, Ozgur Sinanoglu, Ramesh Karri: Novel Test-Mode-Only Scan Attack and Countermeasure for Compression-Based Scan Architectures. IEEE Trans. on CAD of Integrated Circuits and Systems 34(5): 808-821 (2015)

  10. Sk Subidh Ali, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay: A Fault Analysis Perspective for Testing of Secured SoC Cores. IEEE Design & Test 30(5): 63-73 (2013)

  11. Sk Subidh Ali , Debdeep Mukhopadhyay, Michael Tunstall: Differential fault analysis of AES: towards reaching its limits. J. Cryptographic Engineering 3(2): 73-97 (2013)

Editorial
  1. Sk Subidh Ali , Debdeep Mukhopadhyay: Guest Editorial SPACE 2017 Special Issue in the Journal of Hardware and Systems Security (HaSS). J. Hardware and Systems Security 3(1): 1-2 (2019)
  2. Sk Subidh Ali, Jean-Luc Danger, Thomas Eisenbarth: "Security, Privacy, and Applied Cryptography Engineering" - 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings. Lecture Notes in Computer Science 10662, Springer 2017, ISBN 978-3-319-71500-1
Book Chapter
  1. Sk Subidh Ali , Samah Mohamed Saeed, Ozgur Sinanoglu, and Ramesh Karri, “New Scan-Based Attack Using Only the Test Mode And An Input Corruption Countermeasure”, In "VLSI-SoC:At the Crossroads of Emerging Trends", edited by H. F. Ugurdag, Alex Orailoglu, R. Reis, M. Margala, L. Carro, L. M. Silveira, Springer, Chapter 3, p. 48-68, New York, USA, 2015.

  2. Sk Subidh Ali , Xiaofei Guo, D. Mukhopadhyay and Ramesh Karri, “Differential Fault Attacks on AES and Their Countermeasures” In “Secure System Design and Trustable Computing”, edited by M. Potkonjak and Y. Liu, Springer, Chapter 5, p. 163-208, New York, USA, 2015.

  3. S. Samah, Sk Subidh Ali , O Sinanoglu, “Scan Design: Basics, Advancements, and Vulnerabilities”, In “Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment”, Nicolas Sklavos, Ricardo Chaves, Giorgio Di Natale, Francesco Regazzoni (editors), Springer 2017.

Indian Patent File
  1. Yogendra Sao and Sk Subidh Ali, “A System and Method for Defeating Scan Attacks on Cipher,” Indian Patent Application No. 202321014527

  2. Brejesh Lall, Sk Subidh Ali, Debanka Giri, and Sudev Kumar Padhi, "Systems and methods for verifying navigation signals", Indian Patent Application No: 202311045094

Peer Review Conference
  1. Yogendra Sao, Anjum Riaz, Satyadev Ahlawat, and Sk Subidh Ali, “Evaluating Security of New Locking SIB-based Architectures,” 2022 IEEE European Test Symposium (ETS), Barcelona, Spain, 2022, pp. 1-6,

  2. Yogendra Sao, Sk Subidh Ali,“Security Analysis of State-of-the-art Scan Obfuscation Technique,” 2021 IEEE 39th International Conference on Computer Design (ICCD), Storrs, CT, USA, 2021, pp.599-602

  3. Yogendra Sao, Sk Subidh Ali, and S. Biswas,"Opacity preserving Countermeasure using Finite State Machines against Differential Scan Attacks", 2021 IEEE European Test Symposium (ETS), Bruges, Belgium, 2021, pp. 1-2

  4. Yogendra Sao, K.K.Soundra Pandian, and Sk Subidh Ali, "Revisiting the security of static masking and compaction: Discovering new vulnerability and Improved Scan Attack on AES", 2020 IEEE Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Kolkata, India, 2020, pp. 1-6

  5. D. Ray, S. Singh, Sk Subidh Ali and S. Biswas, ``Co-relation Scan Attack Analysis (COSAA) on AES: A Comprehensive Approach" 2019 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), Noordwijk, Netherlands, 2019, pp. 1-6.

  6. Sk Subidh Ali, Mohamed Ibrahim, Ozgur Sinanoglu, Krishnendu Chakrabarty, and Ramesh Karri, “Microfluidic encryption of on-chip biochemical assays”, 2016 IEEE Biomedical Circuits and Systems Conference (BioCAS 2016), p. 152-155.

  7. Chandra KH Suresh, M. Bodhisatwa, S. Samah, Sk Subidh Ali, and O. Sinanoglu, “Power-side-channel analysis of carbon nanotube FET-based design," 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS 2016), p. 215-218, Spain.

  8. Sk Subidh Ali, Mohamed Ibrahim, Ozgur Sinanoglu, Krishnendu Chakrabarty, and Ramesh Karri, “Security Implications of Cyberphysical Digital Micro Biochips”, 2015 IEEE 33rd International Conference on Computer Design (ICCD 2015), p. 483-486, New York, USA.

  9. M. Bodhisatwa, S. Samah, Sk Subidh Ali, and O. Sinanoglu, “Thwarting Timing Attacks on NEMS Relay Based Designs," IEEE 34-th VLSI Test Symposium (VTS 2016) (accepted).

  10. Sk Subidh Ali, O. Sinanoglu, “Scan Attack on Elliptic Curve Cryptosystem”, 2015 IEEE 28-th Symposium of Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS-2015), p. 115-118, Massachusetts, USA.

  11. Y. Muhammad, M. Bodhisatwa, Sk Subidh Ali , O. Sinanoglu, “Security Analysis of Logic Encryption Against the Most Effective Side-Channel Attack: DPA”, 2015 IEEE 28-th Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS 2015), p. 97-102, Massachusetts, USA.

  12. . S. Samah, M. Bodhisatwa, Sk Subidh Ali, O. Sinanoglu, “Timing Attack on NEMS Relay Based Design of AES”, 2015 IFIP/IEEE 23rd International Conference on Very Large Scale Integration (VLSI-SOC), 264-269, Daejeon, South Korea.

  13. Bodhisatwa Mazumdar, Sk Subidh Ali and O. Sinanoglu, "Power Analysis Attacks on ARX: An Application to Salsa20", 2015 IEEE 21-st International Online Testing Symposium (IOLTS 2015), p. 40-43, Halkidiki, Greece.

  14. Sk Subidh Ali and Ozgur Sinanoglu “TMO: A New Class of Attack on Cipher Misusing Test Infrastructure” , 2015 IEEE 33-rd VLSI Test Symposium (VTS), p.1-4, Napa, CA, USA.

  15. Jerry Backer, Sk Subidh Ali, Kurt Rosenfeld, David Hely, Ozgur Sinanoglu, and Ramesh Karri, “A Secure Design-for-Test Architecture to Thwart Attacks Throughout The Life Cycle of SoCs”, 2015 IEEE International Symposium on Circuits and Systems (ISCAS), p. 37-40, Lisbon, Portugal.

  16. Sk Subidh Ali, Ozgur Sinanoglu, and Ramesh Karri, “AES Design Space Exploration New Line for Scan Attack Resiliency”, 2014 IFIP/IEEE 22nd International Conference on Very Large Scale Integration (VLSI-SoC), p. 1-6, Cancun, Mexico

  17. Samah Mohamed Saeed, Sk Subidh Ali, Ozgur Sinanoglu, and Ramesh Karri, "Novel Test-Mode-Only Scan Attack and Countermeasure for Contemporary Scan Architectures", 2014 IEEE International Test Conference (ITC), p. 1-8, Seattle, WA, USA.

  18. Sk Subidh Ali, Ozgur Sinanoglu, and Ramesh Karri, “Test-Mode-Only Scan Attack Using The Boundary Scan Chain”, 19th IEEE European Test Symposium (ETS), p.1-6, Paderborn, Germany.

  19. Sk Subidh Ali, Samah Mohamed Saeed, Ozgur Sinanoglu, and Ramesh Karri, “New Scan Attacks Against State-of-The-Art Countermeasures And DFT”, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), p.142-147, Arlington, USA.

  20. Sk Subidh Ali, Samah Mohamed Saeed, Ozgur Sinanoglu, and Ramesh Karri, “New Scan-based Attack Using Only The Test Mode”, 2013 IFIP/IEEE 21st International Conference on Very Large Scale Integration(VLSI-SoC), p.234-239, Istanbul, Turkey.

  21. Sk Subidh Ali, Samah Mohamed Saeed, Ozgur Sinanoglu, Ramesh Karri, “Scan Attack in Presence of Mode-Reset Countermeasure", 2013 IEEE 19-th International On-Line Testing Symposium (IOLTS), p.230-231, Chania, Greece.

  22. Sk Subidh Ali, and Debdeep Mukhopadhyay, “Differential Fault Analysis of Twofish”, 8th International Conference Information Security and Cryptology (INSCRYPT) 2013: LNCS Volume 7763, p. 10-28, Beijing, China.

  23. Sk Subidh Ali, and Debdeep Mukhopadhyay, “Improved Di_erential Fault Analysis of CLEFIA”, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), p. 60-70, Santa Barbara, CA, USA

  24. Sk Subidh Ali, and Debdeep Mukhopadhyay, “A Differential Fault Analysis on AES Key Schedule Using Single Multi-Byte Fault”, IFIP WG 10th Smart Card Research and Advanced Applications (CARDIS) 2011: LNCS Volume 6737, p.50-64, Leuven, Belgium.

  25. Sk Subidh Ali, and Debdeep Mukhopadhyay, “A Differential Fault Analysis on AES Key Schedule Using Single Fault”, 2011 IEEE Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) p. 35-42, Nara, Japan.

  26. Michael Tunstall, Debdeep Mukhopadhyay, and Sk Subidh Ali, Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault" , IFIPWG 5th International Workshop on Information Security Theory and Practice (WISTP) 2011: LNCS Volume 6633, p. 224-233, Crete, Greece.

  27. Sk Subidh Ali, and Debdeep Mukhopadhyay, “An Improved Differential Fault Analysis on AES-256”, 2011 Progress in Cryptology, 4th International Conference in Cryptology in Africa, (Africacrypt) LNCS Volume 6737, p. 332-347, Dakar, Senegal.

  28. Sk Subidh Ali, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay and Swarup Bhunia, “Multi-level Attack: an Emerging Threat Model for Cryptographic Hardware”, In the proceeding of (DATE), p. 1-4, France.

Message From Director

I am pleased to extend my greetings to students and their parents as well as colleagues near and far. IIT Bhilai was established on 7 August 2016. We are located in Chhattisgarh, the rice bowl of India, in a state rich in natural resources as well as cultural memory and heritage. Read More

Newsletter

Subscribe to our Newsletter and stay tuned.