default search action
Sudipta Chattopadhyay 0001
Person information
- affiliation: Singapore University of Technology and Design (SUTD)
- affiliation (former): Saarland University, Computer Science Department
- affiliation (former): Linköping University, Sweden
Other persons with the same name
- Sudipta Chattopadhyay — disambiguation page
- Sudipta Chattopadhyay 0002 — Bengal Engineering and Science University, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Sai Sathiesh Rajan, Ezekiel O. Soremekun, Yves Le Traon, Sudipta Chattopadhyay:
Distribution-aware fairness test generation. J. Syst. Softw. 215: 112090 (2024) - [c49]Meixuan Li, Awais Yousaf, Mark Goh, Jianying Zhou, Sudipta Chattopadhyay:
Guidelines for Cyber Risk Management in Autonomous Shipping. ACNS Workshops (2) 2024: 143-161 - [c48]Sai Sathiesh Rajan, Ezekiel Olamide Soremekun, Sudipta Chattopadhyay:
Knowledge-based Consistency Testing of Large Language Models. EMNLP (Findings) 2024: 10185-10196 - [c47]Zewen Shang, Matheus E. Garbelini, Sudipta Chattopadhyay:
U-Fuzz: Stateful Fuzzing of IoT Protocols on COTS Devices. ICST 2024: 209-220 - [c46]Zewen Shang, Matheus E. Garbelini, Sudipta Chattopadhyay:
U-Fuzz: A Tool Prototype for Stateful Fuzzing of IoT Protocols on COTS Devices. ICST 2024: 448-450 - [e3]Jianying Zhou, Sudipta Chattopadhyay:
Proceedings of the 10th ACM Cyber-Physical System Security Workshop, CPSS 2024, Singapore, 2 July 2024. ACM 2024 [contents] - [i27]Yustynn Panicker, Ezekiel O. Soremekun, Sumei Sun, Sudipta Chattopadhyay:
End-user Comprehension of Transfer Risks in Smart Contracts. CoRR abs/2407.11440 (2024) - [i26]Sai Sathiesh Rajan, Ezekiel O. Soremekun, Sudipta Chattopadhyay:
Knowledge-based Consistency Testing of Large Language Models. CoRR abs/2407.12830 (2024) - [i25]Yee Ching Tok, Davis Zheng Yang, Sudipta Chattopadhyay:
A Smart City Infrastructure Ontology for Threats, Cybercrime, and Digital Forensic Investigation. CoRR abs/2408.02023 (2024) - [i24]Meixuan Li, Jianying Zhou, Sudipta Chattopadhyay, Mark Goh:
Maritime Cybersecurity: A Comprehensive Review. CoRR abs/2409.11417 (2024) - 2023
- [j33]Ezekiel O. Soremekun, Sakshi Udeshi, Sudipta Chattopadhyay:
Towards Backdoor Attacks and Defense in Robust Machine Learning Models. Comput. Secur. 127: 103101 (2023) - [j32]Yee Ching Tok, Sudipta Chattopadhyay:
Identifying threats, cybercrime and digital forensic opportunities in Smart City Infrastructure via threat modeling. Forensic Sci. Int. Digit. Investig. 45: 301540 (2023) - [j31]Yifan Jia, Christopher M. Poskitt, Peixin Zhang, Jingyi Wang, Jun Sun, Sudipta Chattopadhyay:
Boosting Adversarial Training in Safety-Critical Systems Through Boundary Data Selection. IEEE Robotics Autom. Lett. 8(12): 8350-8357 (2023) - [j30]Anthony Kee Teck Yeo, Matheus E. Garbelini, Sudipta Chattopadhyay, Jianying Zhou:
VitroBench: Manipulating in-vehicle networks and COTS ECUs on your bench: A comprehensive test platform for automotive cybersecurity research. Veh. Commun. 43: 100649 (2023) - [c45]Ko Zheng Teng, Trupil Limbasiya, Federico Turrin, Yan Lin Aung, Sudipta Chattopadhyay, Jianying Zhou, Mauro Conti:
PAID: Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems. CPSS@AsiaCCS 2023: 3-13 - [c44]Setsuko Yokoyama, Sai Sathiesh Rajan, Sudipta Chattopadhyay:
Accented DH: Assessing Fairness of Multilingual Speech Recognition Systems. DH 2023 - [c43]Sai Sathiesh Rajan, Ezekiel O. Soremekun, Sudipta Chattopadhyay, Yves Le Traon:
Poster: Distribution-aware Fairness Test Generation. ICSE Companion 2023: 322-323 - [c42]Yan Lin Aung, Shanshan Wang, Wang Cheng, Sudipta Chattopadhyay, Jianying Zhou, Anyu Cheng:
VNGuard: Intrusion Detection System for In-Vehicle Networks. ISC 2023: 79-98 - [i23]Sai Sathiesh Rajan, Ezekiel O. Soremekun, Yves Le Traon, Sudipta Chattopadhyay:
Distribution-aware Fairness Test Generation. CoRR abs/2305.13935 (2023) - 2022
- [j29]Adrian Horga, Ahmed Rezine, Sudipta Chattopadhyay, Petru Eles, Zebo Peng:
Symbolic identification of shared memory based bank conflicts for GPUs. J. Syst. Archit. 127: 102518 (2022) - [j28]Yifan Jia, Christopher M. Poskitt, Jun Sun, Sudipta Chattopadhyay:
Physical Adversarial Attack on a Robotic Arm. IEEE Robotics Autom. Lett. 7(4): 9334-9341 (2022) - [j27]Chundong Wang, Gunavaran Brihadiswarn, Xingbin Jiang, Sudipta Chattopadhyay:
Circ-Tree: A B+-Tree Variant With Circular Design for Persistent Memory. IEEE Trans. Computers 71(2): 296-308 (2022) - [j26]Matheus E. Garbelini, Chundong Wang, Sudipta Chattopadhyay:
Greyhound: Directed Greybox Wi-Fi Fuzzing. IEEE Trans. Dependable Secur. Comput. 19(2): 817-834 (2022) - [j25]Sakshi Udeshi, Shanshan Peng, Gerald Woo, Lionell Loh, Louth Rawshan, Sudipta Chattopadhyay:
Model Agnostic Defence Against Backdoor Attacks in Machine Learning. IEEE Trans. Reliab. 71(2): 880-895 (2022) - [j24]Ezekiel O. Soremekun, Sakshi Udeshi, Sudipta Chattopadhyay:
Astraea: Grammar-Based Fairness Testing. IEEE Trans. Software Eng. 48(12): 5188-5211 (2022) - [j23]Trupil Limbasiya, Ko Zheng Teng, Sudipta Chattopadhyay, Jianying Zhou:
A systematic survey of attack detection and prevention in Connected and Autonomous Vehicles. Veh. Commun. 37: 100515 (2022) - [c41]Sai Sathiesh Rajan, Sakshi Udeshi, Sudipta Chattopadhyay:
AequeVox: Automated Fairness Testing of Speech Recognition Systems. FASE 2022: 245-267 - [c40]Matheus E. Garbelini, Zewen Shang, Sudipta Chattopadhyay, Sumei Sun, Ernest Kurniawan:
Towards Automated Fuzzing of 4G/5G Protocol Implementations Over the Air. GLOBECOM 2022: 86-92 - [c39]Eric Rothstein Morris, Jun Sun, Sudipta Chattopadhyay:
ORIGAMI: Folding Data Structures to Reduce Timing Side-Channel Leakage. MEMOCODE 2022: 1-12 - [c38]Guoliang Dong, Jingyi Wang, Jun Sun, Sudipta Chattopadhyay, Xinyu Wang, Ting Dai, Jie Shi, Jin Song Dong:
Repairing Adversarial Texts Through Perturbation. TASE 2022: 29-48 - [c37]Matheus E. Garbelini, Vaibhav Bedi, Sudipta Chattopadhyay, Sumei Sun, Ernest Kurniawan:
BrakTooth: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing. USENIX Security Symposium 2022: 1025-1042 - [e2]Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, Sudipta Chattopadhyay, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Weizhi Meng, Stjepan Picek, Jun Shao, Chunhua Su, Cong Wang, Yury Zhauniarovich, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7 [contents] - [i22]Guoliang Dong, Jingyi Wang, Jun Sun, Sudipta Chattopadhyay, Xinyu Wang, Ting Dai, Jie Shi, Jin Song Dong:
Repairing Adversarial Texts through Perturbation. CoRR abs/2201.02504 (2022) - [i21]Trupil Limbasiya, Ko Zheng Teng, Sudipta Chattopadhyay, Jianying Zhou:
A Systematic Survey of Attack Detection and Prevention in Connected and Autonomous Vehicles. CoRR abs/2203.14965 (2022) - [i20]Yee Ching Tok, Sudipta Chattopadhyay:
Identifying Threats, Cybercrime and Digital Forensic Opportunities in Smart City Infrastructure via Threat Modeling. CoRR abs/2210.14692 (2022) - 2021
- [j22]Eyasu Getahun Chekole, Martín Ochoa, Sudipta Chattopadhyay:
SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems. Int. J. Crit. Infrastructure Prot. 33: 100431 (2021) - [j21]Yifan Jia, Jingyi Wang, Christopher M. Poskitt, Sudipta Chattopadhyay, Jun Sun, Yuqi Chen:
Adversarial attacks and mitigation for anomaly detectors of cyber-physical systems. Int. J. Crit. Infrastructure Prot. 34: 100452 (2021) - [j20]Chundong Wang, Yee Ching Tok, Rohini Poolat, Sudipta Chattopadhyay, Mohan Rajesh Elara:
How to secure autonomous mobile robots? An approach with fuzzing, detection and mitigation. J. Syst. Archit. 112: 101838 (2021) - [j19]Sakshi Udeshi, Sudipta Chattopadhyay:
Grammar Based Directed Testing of Machine Learning Systems. IEEE Trans. Software Eng. 47(11): 2487-2503 (2021) - [j18]Guanhua Wang, Sudipta Chattopadhyay, Ivan Gotovchits, Tulika Mitra, Abhik Roychoudhury:
oo7: Low-Overhead Defense Against Spectre Attacks via Program Analysis. IEEE Trans. Software Eng. 47(11): 2504-2519 (2021) - [e1]Jianying Zhou, Chuadhry Mujeeb Ahmed, Lejla Batina, Sudipta Chattopadhyay, Olga Gadyatskaya, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Mihalis Maniatakos, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Masaki Shimaoka, Chunhua Su, Cong Wang:
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. Lecture Notes in Computer Science 12809, Springer 2021, ISBN 978-3-030-81644-5 [contents] - [i19]Yifan Jia, Jingyi Wang, Christopher M. Poskitt, Sudipta Chattopadhyay, Jun Sun, Yuqi Chen:
Adversarial Attacks and Mitigation for Anomaly Detectors of Cyber-Physical Systems. CoRR abs/2105.10707 (2021) - [i18]Sai Sathiesh Rajan, Sakshi Udeshi, Sudipta Chattopadhyay:
AequeVox: Automated Fairness Testing of Speech Recognition Systems. CoRR abs/2110.09843 (2021) - 2020
- [j17]Eyasu Getahun Chekole, Sudipta Chattopadhyay, Martín Ochoa, Huaqun Guo, Unnikrishnan Cheramangalath:
CIMA: Compiler-Enforced Resilience Against Memory Safety Attacks in Cyber-Physical Systems. Comput. Secur. 94: 101832 (2020) - [j16]Yee Ching Tok, Chundong Wang, Sudipta Chattopadhyay:
Stitcher: Correlating digital forensic evidence on internet-of-things devices. Digit. Investig. 35: 301071 (2020) - [j15]Adrian Horga, Sudipta Chattopadhyay, Petru Eles, Zebo Peng:
Genetic algorithm based estimation of non-functional properties for GPGPU programs. J. Syst. Archit. 103: 101697 (2020) - [j14]Tiyash Basu, Kartik Aggarwal, Chundong Wang, Sudipta Chattopadhyay:
An exploration of effective fuzzing for side-channel cache leakage. Softw. Test. Verification Reliab. 30(1) (2020) - [j13]Chundong Wang, Sudipta Chattopadhyay, Gunavaran Brihadiswarn:
Crab-tree: A Crash Recoverable B+-tree Variant for Persistent Memory with ARMv8 Architecture. ACM Trans. Embed. Comput. Syst. 19(5): 35:1-35:26 (2020) - [j12]Xingbin Jiang, Michele Lora, Sudipta Chattopadhyay:
An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices. ACM Trans. Internet Techn. 20(2): 16:1-16:24 (2020) - [j11]Guanhua Wang, Sudipta Chattopadhyay, Arnab Kumar Biswas, Tulika Mitra, Abhik Roychoudhury:
KLEESpectre: Detecting Information Leakage through Speculative Cache Attacks via Symbolic Execution. ACM Trans. Softw. Eng. Methodol. 29(3): 14:1-14:31 (2020) - [c36]Xingbin Jiang, Michele Lora, Sudipta Chattopadhyay:
Efficient and Trusted Detection of Rootkit in IoT Devices via Offline Profiling and Online Monitoring. ACM Great Lakes Symposium on VLSI 2020: 433-438 - [c35]Chundong Wang, Sudipta Chattopadhyay:
Isle-Tree: A B+-Tree with Intra-Cache Line Sorted Leaves for Non-volatile Memory. ICCD 2020: 573-580 - [c34]Teck Ping Khoo, Jun Sun, Sudipta Chattopadhyay:
Learning Fault Models of Cyber Physical Systems. ICFEM 2020: 147-162 - [c33]Sakshi Udeshi, Xingbin Jiang, Sudipta Chattopadhyay:
Callisto: Entropy-based Test Generation and Data Quality Assessment for Machine Learning Systems. ICST 2020: 448-453 - [c32]Matheus E. Garbelini, Chundong Wang, Sudipta Chattopadhyay, Sumei Sun, Ernest Kurniawan:
SweynTooth: Unleashing Mayhem over Bluetooth Low Energy. USENIX ATC 2020: 911-925 - [c31]Eric Rothstein Morris, Jun Sun, Sudipta Chattopadhyay:
Systematic Classification of Attackers via Bounded Model Checking. VMCAI 2020: 226-247 - [i17]Ezekiel O. Soremekun, Sakshi Udeshi, Sudipta Chattopadhyay, Andreas Zeller:
Exposing Backdoors in Robust Machine Learning Models. CoRR abs/2003.00865 (2020) - [i16]Chundong Wang, Yee Ching Tok, Rohini Poolat, Sudipta Chattopadhyay, Mohan Rajesh Elara:
Securing Autonomous Service Robots through Fuzzing, Detection, and Mitigation. CoRR abs/2003.05564 (2020) - [i15]Yee Ching Tok, Chundong Wang, Sudipta Chattopadhyay:
STITCHER: Correlating Digital Forensic Evidence on Internet-of-Things Devices. CoRR abs/2003.07242 (2020) - [i14]Ezekiel O. Soremekun, Sakshi Udeshi, Sudipta Chattopadhyay:
Astraea: Grammar-based Fairness Testing. CoRR abs/2010.02542 (2020) - [i13]Eyasu Getahun Chekole, Martín Ochoa, Sudipta Chattopadhyay:
SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems. CoRR abs/2012.12529 (2020)
2010 – 2019
- 2019
- [j10]Sudipta Chattopadhyay, Moritz Beck, Ahmed Rezine, Andreas Zeller:
Quantifying the Information Leakage in Cache Attacks via Symbolic Execution. ACM Trans. Embed. Comput. Syst. 18(1): 7:1-7:27 (2019) - [j9]Stefano Spellini, Michele Lora, Franco Fummi, Sudipta Chattopadhyay:
Compositional Design of Multi-Robot Systems Control Software on ROS. ACM Trans. Embed. Comput. Syst. 18(5s): 71:1-71:24 (2019) - [c30]Arian Maghazeh, Sudipta Chattopadhyay, Petru Eles, Zebo Peng:
Cache-Aware Kernel Tiling: An Approach for System-Level Performance Optimization of GPU-Based Applications. DATE 2019: 570-575 - [c29]Jingxuan Jiang, Chundong Wang, Sudipta Chattopadhyay, Wei Zhang:
Road Context-Aware Intrusion Detection System for Autonomous Cars. ICICS 2019: 124-142 - [c28]Chundong Wang, Sudipta Chattopadhyay, Gunavaran Brihadiswarn:
Crash recoverable ARMv8-oriented B+-tree for byte-addressable persistent memory. LCTES 2019: 33-44 - [i12]Sakshi Udeshi, Sudipta Chattopadhyay:
Grammar Based Directed Testing of Machine Learning Systems. CoRR abs/1902.10027 (2019) - [i11]Jingxuan Jiang, Chundong Wang, Sudipta Chattopadhyay, Wei Zhang:
Road Context-aware Intrusion Detection System for Autonomous Cars. CoRR abs/1908.00732 (2019) - [i10]Sakshi Udeshi, Shanshan Peng, Gerald Woo, Lionell Loh, Louth Rawshan, Sudipta Chattopadhyay:
Model Agnostic Defence against Backdoor Attacks in Machine Learning. CoRR abs/1908.02203 (2019) - [i9]Guanhua Wang, Sudipta Chattopadhyay, Arnab Kumar Biswas, Tulika Mitra, Abhik Roychoudhury:
KLEESPECTRE: Detecting Information Leakage through Speculative Cache Attacks via Symbolic Execution. CoRR abs/1909.00647 (2019) - [i8]Eric Rothstein Morris, Jun Sun, Sudipta Chattopadhyay:
Systematic Classification of Attackers via Bounded Model Checking. CoRR abs/1911.05808 (2019) - [i7]Sakshi Udeshi, Xingbin Jiang, Sudipta Chattopadhyay:
Callisto: Entropy based test generation and data quality assessment for Machine Learning Systems. CoRR abs/1912.08920 (2019) - [i6]Chundong Wang, Gunavaran Brihadiswarn, Xingbin Jiang, Sudipta Chattopadhyay:
Circ-Tree: A B+-Tree Variant with Circular Design for Persistent Memory. CoRR abs/1912.09783 (2019) - 2018
- [j8]Sudipta Chattopadhyay, Abhik Roychoudhury:
Symbolic Verification of Cache Side-Channel Freedom. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(11): 2812-2823 (2018) - [c27]Stefano Spellini, Michele Lora, Sudipta Chattopadhyay, Franco Fummi:
Introducing assume-guarantee contracts for verifying robotic applications: work-in-progress. CODES+ISSS 2018: 4 - [c26]Chundong Wang, Sudipta Chattopadhyay:
LAWN: boosting the performance of NVMM file system through reducing write amplification. DAC 2018: 6:1-6:6 - [c25]Adrian Horga, Sudipta Chattopadhyay, Petru Eles, Zebo Peng:
Measurement Based Execution Time Analysis of GPGPU Programs via SE+GA. DSD 2018: 30-37 - [c24]Tanya Srivastava, Pryanshu Arora, Chundong Wang, Sudipta Chattopadhyay:
Road context-aware intrusion detection system for autonomous cars: work-in-progress. EMSOFT 2018: 8 - [c23]Eyasu Getahun Chekole, Sudipta Chattopadhyay, Martín Ochoa, Huaqun Guo:
Enforcing Full-Stack Memory-Safety in Cyber-Physical Systems. ESSoS 2018: 9-26 - [c22]Sakshi Udeshi, Pryanshu Arora, Sudipta Chattopadhyay:
Automated directed fairness testing. ASE 2018: 98-108 - [c21]Marcel Böhme, Ezekiel Olamide Soremekun, Sudipta Chattopadhyay, Emamurho Ugherughe, Andreas Zeller:
Wo ist der Fehler und wie wird er behoben? Ein Experiment mit Softwareentwicklern. Software Engineering 2018: 101-102 - [i5]Sakshi Udeshi, Pryanshu Arora, Sudipta Chattopadhyay:
Automated Directed Fairness Testing. CoRR abs/1807.00468 (2018) - [i4]Sudipta Chattopadhyay, Abhik Roychoudhury:
Symbolic Verification of Cache Side-channel Freedom. CoRR abs/1807.04701 (2018) - [i3]Guanhua Wang, Sudipta Chattopadhyay, Ivan Gotovchits, Tulika Mitra, Abhik Roychoudhury:
oo7: Low-overhead Defense against Spectre Attacks via Binary Analysis. CoRR abs/1807.05843 (2018) - [i2]Eyasu Getahun Chekole, Unnikrishnan Cheramangalath, Sudipta Chattopadhyay, Martín Ochoa, Huaqun Guo:
Taming the War in Memory: A Resilient Mitigation Strategy Against Memory Safety Attacks in CPS. CoRR abs/1809.07477 (2018) - 2017
- [c20]Marcel Böhme, Ezekiel O. Soremekun, Sudipta Chattopadhyay, Emamurho Ugherughe, Andreas Zeller:
How developers debug software the DbgBench dataset: poster. ICSE (Companion Volume) 2017: 244-246 - [c19]Tiyash Basu, Sudipta Chattopadhyay:
Testing Cache Side-Channel Leakage. ICST Workshops 2017: 51-60 - [c18]Sudipta Chattopadhyay, Moritz Beck, Ahmed Rezine, Andreas Zeller:
Quantifying the information leak in cache attacks via symbolic execution. MEMOCODE 2017: 25-35 - [c17]Marcel Böhme, Ezekiel O. Soremekun, Sudipta Chattopadhyay, Emamurho Ugherughe, Andreas Zeller:
Where is the bug and how is it fixed? an experiment with practitioners. ESEC/SIGSOFT FSE 2017: 117-128 - [c16]Sudipta Chattopadhyay:
Directed Automated Memory Performance Testing. TACAS (2) 2017: 38-55 - 2016
- [j7]Abhijeet Banerjee, Sudipta Chattopadhyay, Abhik Roychoudhury:
On Testing Embedded Software. Adv. Comput. 101: 121-153 (2016) - [j6]Adrian Horga, Sudipta Chattopadhyay, Petru Eles, Zebo Peng:
Systematic detection of memory related performance bottlenecks in GPGPU programs. J. Syst. Archit. 71: 73-87 (2016) - [c15]Ke Jiang, Petru Eles, Zebo Peng, Sudipta Chattopadhyay, Lejla Batina:
SPARTA: A scheduling policy for thwarting differential power analysis attacks. ASP-DAC 2016: 667-672 - [i1]Sudipta Chattopadhyay, Moritz Beck, Ahmed Rezine, Andreas Zeller:
Quantifying the Information Leak in Cache Attacks through Symbolic Execution. CoRR abs/1611.04426 (2016) - 2015
- [c14]Sudipta Chattopadhyay:
MESS: Memory Performance Debugging on Embedded Multi-core Systems. SPIN 2015: 105-125 - 2014
- [j5]Sudipta Chattopadhyay, Abhik Roychoudhury, Jakob Rosen, Petru Eles, Zebo Peng:
Time-Predictable Embedded Software on Multi-Core Platforms: Analysis and Optimization. Found. Trends Electron. Des. Autom. 8(3-4): 199-356 (2014) - [j4]Timon Kelter, Heiko Falk, Peter Marwedel, Sudipta Chattopadhyay, Abhik Roychoudhury:
Static analysis of multi-core TDMA resource arbitration delays. Real Time Syst. 50(2): 185-229 (2014) - [j3]Sudipta Chattopadhyay, Lee Kee Chong, Abhik Roychoudhury, Timon Kelter, Peter Marwedel, Heiko Falk:
A Unified WCET analysis framework for multicore platforms. ACM Trans. Embed. Comput. Syst. 13(4s): 124:1-124:29 (2014) - [j2]Sudipta Chattopadhyay, Abhik Roychoudhury:
Cache-Related Preemption Delay Analysis for Multilevel Noninclusive Caches. ACM Trans. Embed. Comput. Syst. 13(5s): 147:1-147:29 (2014) - [c13]Sudipta Chattopadhyay, Petru Eles, Zebo Peng:
Automated software testing of memory performance in embedded GPUs. EMSOFT 2014: 17:1-17:10 - [c12]Abhijeet Banerjee, Lee Kee Chong, Sudipta Chattopadhyay, Abhik Roychoudhury:
Detecting energy bugs and hotspots in mobile apps. SIGSOFT FSE 2014: 588-598 - 2013
- [j1]Sudipta Chattopadhyay, Abhik Roychoudhury:
Scalable and precise refinement of cache timing analysis via path-sensitive verification. Real Time Syst. 49(4): 517-562 (2013) - [c11]Sudipta Chattopadhyay, Lee Kee Chong, Abhik Roychoudhury:
Program performance spectrum. LCTES 2013: 65-76 - [c10]Abhijeet Banerjee, Sudipta Chattopadhyay, Abhik Roychoudhury:
Precise micro-architectural modeling for WCET analysis via AI+SAT. IEEE Real-Time and Embedded Technology and Applications Symposium 2013: 87-96 - [c9]Lee Kee Chong, Clément Ballabriga, Van-Thuan Pham, Sudipta Chattopadhyay, Abhik Roychoudhury:
Integrated Timing Analysis of Application and Operating Systems Code. RTSS 2013: 128-139 - [c8]Abhijeet Banerjee, Sudipta Chattopadhyay, Abhik Roychoudhury:
Static Analysis Driven Cache Performance Testing. RTSS 2013: 319-329 - 2012
- [c7]Sudipta Chattopadhyay, Lee Kee Chong, Abhik Roychoudhury, Timon Kelter, Peter Marwedel, Heiko Falk:
A Unified WCET Analysis Framework for Multi-core Platforms. IEEE Real-Time and Embedded Technology and Applications Symposium 2012: 99-108 - 2011
- [c6]Timon Kelter, Heiko Falk, Peter Marwedel, Sudipta Chattopadhyay, Abhik Roychoudhury:
Bus-Aware Multicore WCET Analysis through TDMA Offset Bounds. ECRTS 2011: 3-12 - [c5]Sudipta Chattopadhyay, Abhik Roychoudhury:
Static bus schedule aware scratchpad allocation in multiprocessors. LCTES 2011: 11-20 - [c4]Sudipta Chattopadhyay, Abhik Roychoudhury:
Scalable and Precise Refinement of Cache Timing Analysis via Model Checking. RTSS 2011: 193-203 - [c3]Bernard Blackham, Yao Shi, Sudipta Chattopadhyay, Abhik Roychoudhury, Gernot Heiser:
Timing Analysis of a Protected Operating System Kernel. RTSS 2011: 339-348 - 2010
- [c2]Sudipta Chattopadhyay, Abhik Roychoudhury, Tulika Mitra:
Modeling shared cache and bus in multi-cores for timing analysis. SCOPES 2010: 6
2000 – 2009
- 2009
- [c1]Sudipta Chattopadhyay, Abhik Roychoudhury:
Unified Cache Modeling for WCET Analysis and Layout Optimizations. RTSS 2009: 47-56
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint