default search action
Pramod Subramanyan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i7]Ayush Bansal, Pramod Subramanyan, Satyadev Nandakumar:
Analysis of Linux-PRNG (Pseudo Random Number Generator). CoRR abs/2312.03369 (2023) - 2021
- [c26]Shivendra Kushwah, Ankush Desai, Pramod Subramanyan, Sanjit A. Seshia:
PSec: Programming Secure Distributed Systems using Enclaves. AsiaCCS 2021: 802-816 - 2020
- [j5]Deepak Sirone, Pramod Subramanyan:
Functional Analysis Attacks on Logic Locking. IEEE Trans. Inf. Forensics Secur. 15: 2514-2527 (2020) - [j4]Qutaiba Alasad, Jiann-Shuin Yuan, Pramod Subramanyan:
Strong Logic Obfuscation with Low Overhead against IC Reverse Engineering Attacks. ACM Trans. Design Autom. Electr. Syst. 25(4): 34:1-34:31 (2020) - [c25]Shubham Sahai, Pramod Subramanyan, Rohit Sinha:
Verification of Quantitative Hyperproperties Using Trace Enumeration Relations. CAV (1) 2020: 201-224 - [c24]Sujit Kumar Muduli, Gourav Takhar, Pramod Subramanyan:
HyperFuzzing for SoC Security Validation. ICCAD 2020: 106:1-106:9 - [c23]Mayank Rawat, Sujit Kumar Muduli, Pramod Subramanyan:
Mining Hyperproperties from Behavioral Traces. VLSI-SOC 2020: 88-93 - [c22]Nirjhar Roy, Nikhil Bansal, Gourav Takhar, Nikhil Mittal, Pramod Subramanyan:
When Oblivious is Not: Attacks against OPAM. WOOT @ USENIX Security Symposium 2020 - [i6]Shubham Sahai, Rohit Sinha, Pramod Subramanyan:
Verification of Quantitative Hyperproperties Using Trace Enumeration Relations. CoRR abs/2005.04606 (2020)
2010 – 2019
- 2019
- [j3]Bo-Yuan Huang, Hongce Zhang, Pramod Subramanyan, Yakir Vizel, Aarti Gupta, Sharad Malik:
Instruction-Level Abstraction (ILA): A Uniform Specification for System-on-Chip (SoC) Verification. ACM Trans. Design Autom. Electr. Syst. 24(1): 10:1-10:24 (2019) - [c21]Sujit Kumar Muduli, Pramod Subramanyan:
Towards Verifiably Secure Systems-on-Chip Platforms. ATS 2019: 92-97 - [c20]Kevin Cheang, Cameron Rasmussen, Sanjit A. Seshia, Pramod Subramanyan:
A Formal Approach to Secure Speculation. CSF 2019: 288-303 - [c19]Deepak Sirone, Pramod Subramanyan:
Functional Analysis Attacks on Logic Locking. DATE 2019: 936-939 - [c18]Sujit Kumar Muduli, Pramod Subramanyan, Sayak Ray:
Verification of Authenticated Firmware Loaders. FMCAD 2019: 110-119 - [i5]Kevin Cheang, Cameron Rasmussen, Sanjit A. Seshia, Pramod Subramanyan:
A Formal Approach to Secure Speculation. IACR Cryptol. ePrint Arch. 2019: 310 (2019) - [i4]Sujit Kumar Muduli, Pramod Subramanyan, Sayak Ray:
Verification of Authenticated Firmware Load. IACR Cryptol. ePrint Arch. 2019: 564 (2019) - 2018
- [j2]Pramod Subramanyan, Bo-Yuan Huang, Yakir Vizel, Aarti Gupta, Sharad Malik:
Template-Based Parameterized Synthesis of Uniform Instruction-Level Abstractions for SoC Verification. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(8): 1692-1705 (2018) - [c17]Weikun Yang, Yakir Vizel, Pramod Subramanyan, Aarti Gupta, Sharad Malik:
Lazy Self-composition for Security Verification. CAV (2) 2018: 136-156 - [c16]Sanjit A. Seshia, Pramod Subramanyan:
UCLID5: Integrating Modeling, Verification, Synthesis and Learning. MEMOCODE 2018: 1-10 - [i3]Bo-Yuan Huang, Hongce Zhang, Pramod Subramanyan, Yakir Vizel, Aarti Gupta, Sharad Malik:
Instruction-Level Abstraction (ILA): A Uniform Specification for System-on-Chip (SoC) Verification. CoRR abs/1801.01114 (2018) - [i2]Deepak Sirone, Pramod Subramanyan:
Functional Analysis Attacks on Logic Locking. CoRR abs/1811.12088 (2018) - 2017
- [b1]Pramod Subramanyan:
Deriving Abstractions to Address Hardware Platform Security Challenges. Princeton University, USA, 2017 - [c15]Pramod Subramanyan, Rohit Sinha, Ilia A. Lebedev, Srinivas Devadas, Sanjit A. Seshia:
A Formal Foundation for Secure Remote Execution of Enclaves. CCS 2017: 2435-2450 - [c14]Zhixing Xu, Sayak Ray, Pramod Subramanyan, Sharad Malik:
Malware detection using machine learning based analysis of virtual memory access patterns. DATE 2017: 169-174 - [i1]Pramod Subramanyan, Rohit Sinha, Ilia A. Lebedev, Srinivas Devadas, Sanjit A. Seshia:
A Formal Foundation for Secure Remote Execution of Enclaves. IACR Cryptol. ePrint Arch. 2017: 565 (2017) - 2016
- [c13]Sharad Malik, Pramod Subramanyan:
Invited - Specification and modeling for systems-on-chip security verification. DAC 2016: 66:1-66:6 - [c12]Pramod Subramanyan, Sharad Malik, Hareesh Khattri, Abhranil Maiti, Jason M. Fung:
Verifying information flow properties of firmware using symbolic execution. DATE 2016: 337-342 - 2015
- [c11]Pramod Subramanyan, Yakir Vizel, Sayak Ray, Sharad Malik:
Template-based Synthesis of Instruction-Level Abstractions for SoC Verification. FMCAD 2015: 160-167 - [c10]Pramod Subramanyan, Sayak Ray, Sharad Malik:
Evaluating the security of logic encryption algorithms. HOST 2015: 137-143 - 2014
- [j1]Pramod Subramanyan, Nestan Tsiskaridze, Wenchao Li, Adrià Gascón, Wei Yang Tan, Ashish Tiwari, Natarajan Shankar, Sanjit A. Seshia, Sharad Malik:
Reverse Engineering Digital Circuits Using Structural and Functional Analyses. IEEE Trans. Emerg. Top. Comput. 2(1): 63-80 (2014) - [c9]Pramod Subramanyan, Divya Arora:
Formal verification of taint-propagation security properties in a commercial SoC design. DATE 2014: 1-2 - [c8]Adrià Gascón, Pramod Subramanyan, Bruno Dutertre, Ashish Tiwari, Dejan Jovanovic, Sharad Malik:
Template-based circuit understanding. FMCAD 2014: 83-90 - [c7]Yinlei Yu, Pramod Subramanyan, Nestan Tsiskaridze, Sharad Malik:
All-SAT Using Minimal Blocking Clauses. VLSID 2014: 86-91 - [p1]Georg Weissenbacher, Pramod Subramanyan, Sharad Malik:
Boolean Satisfiability: Solvers and Extensions. Software Systems Safety 2014: 223-278 - 2013
- [c6]Pramod Subramanyan, Nestan Tsiskaridze, Kanika Pasricha, Dillon Reisman, Adriana Susnea, Sharad Malik:
Reverse engineering digital circuits using functional analysis. DATE 2013: 1277-1280 - [c5]Wenchao Li, Adrià Gascón, Pramod Subramanyan, Wei Yang Tan, Ashish Tiwari, Sharad Malik, Natarajan Shankar, Sanjit A. Seshia:
WordRev: Finding word-level structures in a sea of bit-level gates. HOST 2013: 67-74 - 2011
- [c4]Pramod Subramanyan, Virendra Singh, Kewal K. Saluja, Erik Larsson:
Adaptive execution assistance for multiplexed fault-tolerant chip multiprocessors. ICCD 2011: 419-426 - 2010
- [c3]Pramod Subramanyan, Virendra Singh, Kewal K. Saluja, Erik Larsson:
Multiplexed redundant execution: A technique for efficient fault tolerance in chip multiprocessors. DATE 2010: 1572-1577 - [c2]Pramod Subramanyan, Virendra Singh, Kewal K. Saluja, Erik Larsson:
Energy-efficient fault tolerance in chip multiprocessors using Critical Value Forwarding. DSN 2010: 121-130 - [c1]Pramod Subramanyan, Virendra Singh, Kewal K. Saluja, Erik Larsson:
Energy-efficient redundant execution for chip multiprocessors. ACM Great Lakes Symposium on VLSI 2010: 143-146
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-09 01:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint