Awesome

Selected Publications

Download BibTeX.

2024
AirBugCatcher: Automated Wireless Reproduction of IoT Bugs.
Guoqiang Hua, Matheus E. Garbelini, and Sudipta Chattopadhyay.
40th Annual Computer Security Applications Conference (ACSAC).
PDF VaktBLE: A Benevolent Man-in-the-middle Bridge to Guard against Malevolent BLE Connections.
Geovani Benita, Leonardo Sestrem, Matheus E. Garbelini, Sudipta Chattopadhyay, Sumei Sun, and Ernest Kurniawan.
40th Annual Computer Security Applications Conference (ACSAC).
PDF Knowledge-based Consistency Testing of Large Language Models.
Sai Sathiesh Rajan, Ezekiel Soremekun, and Sudipta Chattopadhyay.
The 2024 Conference on Empirical Methods in Natural Language Processing (EMNLP) Findings.
PDF Distribution-aware Fairness Test Generation.
Sai Sathiesh Rajan, Ezekiel Soremekun, Yves Le Traon, and Sudipta Chattopadhyay.
Journal of Systems and Software (JSS). To be presented at 39th IEEE/ACM International Conference on Automated Software Engineering (ASE 2024).
PDF U-Fuzz: Stateful Fuzzing of IoT Protocols on COTS Devices.
Zewen Shang, Matheus E. Garbelini, and Sudipta Chattopadhyay.
17th IEEE International Conference on Software Testing, Verification and Validation (ICST).
PDF Boosting Adversarial Training in Safety-Critical Systems Through Boundary Data Selection.
Yifan Jia, Christopher M. Poskitt, Peixin Zhang, Jingyi Wang, Jun Sun, and Sudipta Chattopadhyay.
2024 IEEE International Conference on Robotics and Automation (ICRA)/IEEE Robotics and Automation Letters (RA-L), Vol 8 Issue 12.
2023
PDF VitroBench: Manipulating In-vehicle Networks and COTS ECUs on Your Bench.
Anthony Kee Teck Yeo, Matheus E. Garbelini, Sudipta Chattopadhyay, and Jianying Zhou.
Vehicular Communications.
PDF Identifying Threats, Cybercrime and Digital Forensic Opportunities in Smart City Infrastructure via Threat Modeling.
Yee Ching Tok and Sudipta Chattopadhyay.
Elsevier Forensic Science International: Digital Investigation (FSIDIIN).
PDF Towards Backdoor Attacks and Defense in Robust Machine Learning Models.
Ezekiel Soremekun, Sakshi Udeshi, and Sudipta Chattopadhyay.
Elsevier Journal of Computers and Security.
2022
PDF BrakTooth: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing.
Matheus E. Garbelini, Vaibhav Bedi, Sudipta Chattopadhyay, Sumei Sun, and Ernest Kurniawan.
USENIX Security Symposium.
PDF Towards Automated Fuzzing of 4G/5G Protocol Implementations Over the Air.
Matheus E. Garbelini, Zewen Shang, Sudipta Chattopadhyay, Sumei Sun, and Ernest Kurniawan.
IEEE Global Communications Conference (GLOBECOM).
PDF A systematic survey of attack detection and prevention in Connected and Autonomous Vehicles.
Trupil Limbasiya, Ko Zheng Teng, Sudipta Chattopadhyay, and Jianying Zhou.
Vehicular Communications, Volume 37, October 2022, 100515.
PDF Model Agnostic Defence against Backdoor Attacks in Machine Learning.
Sakshi Udeshi, Shanshan Peng, Gerald Woo, Lionell Loh, Louth Rawshan, and Sudipta Chattopadhyay.
IEEE Transactions on Reliability.
PDF AequeVox: Automated Fairness Testing of Speech Recognition Systems.
Sai Sathiesh Rajan, Sakshi Udeshi, and Sudipta Chattopadhyay.
25th International Conference on Fundamental Approaches to Software Engineering (FASE).
PDF Astraea: Grammar-based fairness testing.
Ezekiel Soremekun, Sakshi Sunil Udeshi, and Sudipta Chattopadhyay.
IEEE Transactions on Software Engineering (TSE).
PDF ORIGAMI: Folding Data Structures to Reduce Timing Side-Channel Leakage.
Eric Rothestein-Morris, Jun Sun, and Sudipta Chattopadhyay.
20th ACM-IEEE International Conference on Formal Methods and Models for System Design.
PDF Physical Adversarial Attack on a Robotic Arm.
Yifan Jia, Christopher M. Poskitt, Jun Sun, and Sudipta Chattopadhyay.
IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2022)/IEEE Robotics and Automation Letters (RA-L).
PDF Symbolic identification of shared memory based bank conflicts for GPUs.
Adrian Horga, Ahmed Rezine, Sudipta Chattopadhyay, Petru Eles, and Zebo Peng.
Journal of Systems Architecture (JSA).
2021
PDF SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems.
Eyasu Getahun Chekole, Martín Ochoa, and Sudipta Chattopadhyay.
International Journal of Critical Infrastructure Protection.
PDF Adversarial Attacks and Mitigation for Anomaly Detectors of Cyber-Physical Systems.
Yifan Jia, Jingyi Wang, Christopher M Poskitt, Sudipta Chattopadhyay, Jun Sun, and Yuqi Chen.
International Journal of Critical Infrastructure Protection.
PDF Circ-Tree: A B+-Tree Variant with Circular Design for Persistent Memory.
Chundong Wang, Gunavaran Brihadiswarn, Xingbin Jiang, and Sudipta Chattopadhyay.
IEEE Transactions on Computers (TC).
2020
PDF Greyhound: Directed Greybox Wi-Fi Fuzzing.
Matheus E. Garbelini, Chundong Wang, and Sudipta Chattopadhyay.
IEEE Transactions on Dependable and Secure Computing (TDSC).
PDF SweynTooth: Unleashing Mayhem over Bluetooth Low Energy.
Matheus E. Garbelini, Chundong Wang, Sudipta Chattopadhyay, Sumei Sun, and Ernest Kurniawan.
USENIX Annual Technical Conference (USENIX ATC).
PDF STITCHER: Correlating Digital Forensic Evidence on Internet-of-Things Devices.
Yee Ching Tok, Chundong Wang, and Sudipta Chattopadhyay.
Elsevier Forensic Science International: Digital Investigation (FSIDIIN).
PDF Crab-tree: A Crash Recoverable B+-tree Variant for Persistent Memory with ARMv8 Architecture.
Chundong Wang, Sudipta Chattopadhyay, and Gunavaran Brihadiswarn.
ACM Transactions on Embedded Computing Systems (TECS).
PDF CIMA: Compiler-Enforced Resilience Against Memory Safety Attacks in Cyber-Physical Systems.
Eyasu Getahun Chekole, Sudipta Chattopadhyay, Martin Ochoa, Huaqun Guo, and Unnikrishnan Cheramangalath.
Elsevier Journal of Computers and Security.
PDF KLEESpectre: Detecting Information Leakage through Speculative Cache Attacks via Symbolic Execution.
Guanhua Wang, Sudipta Chattopadhyay, Arnab Kumar Biswas, Tulika Mitra, and Abhik Roychoudhury.
ACM Transactions on Software Engineering and Methodology (TOSEM).
PDF An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices.
Xingbin Jiang, Michele Lora, and Sudipta Chattopadhyay.
ACM Transactions on Internet Technology (TOIT).
PDF Systematic Classification of Attackers via Bounded Model Checking.
Eric Rothstein-Morris, Jun Sun, and Sudipta Chattopadhyay.
Proceedings of the 21st International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI).
PDF Callisto: Entropy based test generation and data quality assessment for Machine Learning Systems.
Sakshi Udeshi, Xingbin Jiang, and Sudipta Chattopadhyay.
Proceedings of the IEEE International Conference on Software Testing, Verification and Validation (ICST) 2020. Testing Tools Track.
PDF Genetic Algorithm Based Estimation of Non-Functional Properties for GPGPU Programs.
Adrian Horga, Sudipta Chattopadhyay, Petru Eles, and Zebo Peng.
Elsevier Journal of Systems Architecture, Embedded Software Design.
PDF How to Secure Autonomous Mobile Robots? An Approach with Fuzzing, Detection and Mitigation.
Chundong Wang, Yee Ching Tok, Rohini Poolat, Sudipta Chattopadhyay, and Mohan Rajesh Elara.
Elsevier Journal of Systems Architecture, Embedded Software Design.
PDF Efficient and Trusted Detection of Rootkit in IoT Devices via Offline Profiling and Online Monitoring.
Xingbin Jiang, Michele Lora, and Sudipta Chattopadhyay.
30th ACM Great Lakes Symposium on VLSI (GLSVLSI).
PDF Isle-Tree: A B+-Tree with Intra-Cache Line Sorted Leaves for Non-volatile Memory.
Chundong Wang and Sudipta Chattopadhyay.
38th IEEE International Conference on Computer Design (ICCD).
2019
PDF oo7: Low-overhead Defense against Spectre Attacks via Program Analysis.
Guanhua Wang, Sudipta Chattopadhyay, Ivan Gotovchits, Tulika Mitra, and Abhik Roychoudhury.
IEEE Transactions on Software Engineering (TSE). Accepted to appear in the IEEE Transactions on Software Engineering (TSE).
PDF Grammar Based Directed Testing of Machine Learning Systems.
Sakshi Udeshi and Sudipta Chattopadhyay.
IEEE Transactions on Software Engineering (TSE). Accepted to appear in the IEEE Transactions on Software Engineering (TSE).
PDF An Exploration of Effective Fuzzing for Side-channel Cache Leakage.
Tiyash Basu, Kartik Aggarwal, Chundong Wang, and Sudipta Chattopadhyay.
Software Testing, Verification and Reliability (STVR).
PDF Compositional Design of Multi-Robot Systems Control Software on ROS.
Stefano Spellini, Michele Lora, Franco Fummi, and Sudipta Chattopadhyay.
ACM Transactions on Embedded Computing Systems (TECS). Also to appear in the International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS), 2019.
PDF Crash Recoverable ARMv8-oriented B+-tree for Byte-addressable Persistent Memory.
Chundong Wang, Sudipta Chattopadhyay, and Gunavaran Brihadiswarn.
Proceedings of the Languages, Compilers, Tools and Theory for Embedded Systems (LCTES), 2019. Fig. 5(c) in the LCTES version captures the same values as Fig. 5(b) by mistake. Kindly use the fixed version of the paper from our website.
PDF Cache-aware Kernel Tiling: An Approach for System-level Performance Optimization of GPU-based Applications.
Arian Maghazeh, Sudipta Chattopadhyay, Petru Eles, and Zebo Peng.
Proceedings of the 2019 Design, Automation & Test in Europe Conference & Exhibition, (DATE) 2019, Florence, Italy, March 25-29, 2019.
PDF Quantifying the Information Leakage in Cache Attacks via Symbolic Execution.
Sudipta Chattopadhyay, Moritz Beck, Ahmed Rezine, and Andreas Zeller.
ACM Transactions on Embedded Computing Systems (TECS).
PDF Road Context-aware Intrusion Detection System for Autonomous Cars.
Jingxuan Jiang, Chundong Wang, Sudipta Chattopadhyay, and Wei Zhang.
Proceedings of the 21st International Conference on Information and Communications Security (ICICS).
2018
PDF Symbolic Verification of Cache Side-channel Freedom.
Sudipta Chattopadhyay and Abhik Roychoudhury.
IEEE Transactions on Computer-aided Design of Integrated Circuits and Systems (TCAD). Also to appear in the International Conference on Embedded Software (EMSOFT), 2018.
PDF Automated directed fairness testing.
Sakshi Udeshi, Pryanshu Arora, and Sudipta Chattopadhyay.
Proceedings of the 33rd (ACM/IEEE) International Conference on Automated Software Engineering, (ASE) 2018, Montpellier, France, September 3-7, 2018.
PDF LAWN: boosting the performance of NVMM file system through reducing write amplification.
Chundong Wang and Sudipta Chattopadhyay.
Proceedings of the 55th Annual Design Automation Conference, DAC 2018, San Francisco, CA, USA, June 24-29, 2018.
PDF Enforcing Full-Stack Memory-Safety in Cyber-Physical Systems.
Eyasu Getahun Chekole, Sudipta Chattopadhyay, Martin Ochoa, and Huaqun Guo.
Engineering Secure Software and Systems - 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings.
PDF Measurement Based Execution Time Analysis of GPGPU Programs via SE+GA.
Adrian Horga, Sudipta Chattopadhyay, Petru Eles, and Zebo Peng.
Proceedings of the Euromicro Conference on Digital Systems Design (DSD).
PDF Work-in-Progress: Road Context-aware Intrusion Detection System for Autonomous Cars.
Tanya Srivastava, Pryanshu Arora, Chundong Wang, and Sudipta Chattopadhyay.
Proceedings of the International Conference on Embedded Software (EMSOFT).
PDF Work-in-Progress: Introducing Assume-Guarantee Contracts for Verifying Robotic Applications.
Stefano Spellini, Michele Lora, Sudipta Chattopadhyay, and Franco Fummi.
Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).
2017
PDF How developers debug software the DbgBench dataset: poster.
Marcel Boehme, Ezekiel O. Soremekun, Sudipta Chattopadhyay, Emamurho Ugherughe, and Andreas Zeller.
Proceedings of the 39th International Conference on Software Engineering, ICSE 2017, Buenos Aires, Argentina, May 20-28, 2017 - Companion Volume.
PDF Testing Cache Side-Channel Leakage.
Tiyash Basu and Sudipta Chattopadhyay.
2017 IEEE International Conference on Software Testing, Verification and Validation Workshops, ICST Workshops 2017, Tokyo, Japan, March 13-17, 2017.
PDF Quantifying the information leak in cache attacks via symbolic execution.
Sudipta Chattopadhyay, Moritz Beck, Ahmed Rezine, and Andreas Zeller.
Proceedings of the 15th ACM-IEEE International Conference on Formal Methods and Models for System Design, MEMOCODE 2017, Vienna, Austria, September 29 - October 02, 2017.
PDF Where is the bug and how is it fixed? an experiment with practitioners.
Marcel Boehme, Ezekiel O. Soremekun, Sudipta Chattopadhyay, Emamurho Ugherughe, and Andreas Zeller.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2017, Paderborn, Germany, September 4-8, 2017.
PDF Directed Automated Memory Performance Testing.
Sudipta Chattopadhyay.
Tools and Algorithms for the Construction and Analysis of Systems - 23rd International Conference, TACAS 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, Part II.
2016
PDF On Testing Embedded Software.
Abhijeet Banerjee, Sudipta Chattopadhyay, and Abhik Roychoudhury.
Advances in Computers.
PDF Systematic detection of memory related performance bottlenecks in GPGPU programs.
Adrian Horga, Sudipta Chattopadhyay, Petru Eles, and Zebo Peng.
Journal of Systems Architecture - Embedded Systems Design.
PDF SPARTA: A scheduling policy for thwarting differential power analysis attacks.
Ke Jiang, Petru Eles, Zebo Peng, Sudipta Chattopadhyay, and Lejla Batina.
21st Asia and South Pacific Design Automation Conference, ASP-DAC 2016, Macao, Macao, January 25-28, 2016.
PDF Quantifying the Information Leak in Cache Attacks through Symbolic Execution.
Sudipta Chattopadhyay, Moritz Beck, Ahmed Rezine, and Andreas Zeller.
CoRR.
2015
PDF MESS: Memory Performance Debugging on Embedded Multi-core Systems.
Sudipta Chattopadhyay.
Model Checking Software - 22nd International Symposium, SPIN 2015, Stellenbosch, South Africa, August 24-26, 2015, Proceedings.
2014
PDF Time-Predictable Embedded Software on Multi-Core Platforms: Analysis and Optimization.
Sudipta Chattopadhyay, Abhik Roychoudhury, Jakob Rosen, Petru Eles, and Zebo Peng.
Foundations and Trends in Electronic Design Automation 8(3-4).
PDF Static analysis of multi-core TDMA resource arbitration delays.
Timon Kelter, Heiko Falk, Peter Marwedel, Sudipta Chattopadhyay, and Abhik Roychoudhury.
Real-Time Systems 50(2).
PDF A Unified WCET analysis framework for multicore platforms.
Sudipta Chattopadhyay, Lee Kee Chong, Abhik Roychoudhury, Timon Kelter, Peter Marwedel, and Heiko Falk.
ACM Trans. Embedded Comput. Syst. 13(4s).
PDF Cache-Related Preemption Delay Analysis for Multilevel Noninclusive Caches.
Sudipta Chattopadhyay and Abhik Roychoudhury.
ACM Trans. Embedded Comput. Syst. 13(5s).
PDF Automated software testing of memory performance in embedded GPUs.
Sudipta Chattopadhyay, Petru Eles, and Zebo Peng.
2014 International Conference on Embedded Software, EMSOFT 2014, New Delhi, India, October 12-17, 2014.
PDF Detecting energy bugs and hotspots in mobile apps.
Abhijeet Banerjee, Lee Kee Chong, Sudipta Chattopadhyay, and Abhik Roychoudhury.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16 - 22, 2014.
2013
PDF Scalable and precise refinement of cache timing analysis via path-sensitive verification.
Sudipta Chattopadhyay and Abhik Roychoudhury.
Real-Time Systems 49(4).
PDF Program performance spectrum.
Sudipta Chattopadhyay, Lee Kee Chong, and Abhik Roychoudhury.
SIGPLAN/SIGBED Conference on Languages, Compilers and Tools for Embedded Systems 2013, LCTES '13, Seattle, WA, USA, June 20-21, 2013.
PDF Precise micro-architectural modeling for WCET analysis via AI+SAT.
Abhijeet Banerjee, Sudipta Chattopadhyay, and Abhik Roychoudhury.
19th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2013, Philadelphia, PA, USA, April 9-11, 2013.
PDF Integrated Timing Analysis of Application and Operating Systems Code.
Lee Kee Chong, Cl{\'{e}}ment Ballabriga, Van{-}Thuan Pham, Sudipta Chattopadhyay, and Abhik Roychoudhury.
Proceedings of the IEEE 34th Real-Time Systems Symposium, RTSS 2013, Vancouver, BC, Canada, December 3-6, 2013.
PDF Static Analysis Driven Cache Performance Testing.
Abhijeet Banerjee, Sudipta Chattopadhyay, and Abhik Roychoudhury.
Proceedings of the IEEE 34th Real-Time Systems Symposium, RTSS 2013, Vancouver, BC, Canada, December 3-6, 2013.
2012
PDF A Unified WCET Analysis Framework for Multi-core Platforms.
Sudipta Chattopadhyay, Lee Kee Chong, Abhik Roychoudhury, Timon Kelter, Peter Marwedel, and Heiko Falk.
2012 IEEE 18th Real Time and Embedded Technology and Applications Symposium, Beijing, China, April 16-19, 2012.
2011
PDF Bus-Aware Multicore WCET Analysis through TDMA Offset Bounds.
Timon Kelter, Heiko Falk, Peter Marwedel, Sudipta Chattopadhyay, and Abhik Roychoudhury.
23rd Euromicro Conference on Real-Time Systems, ECRTS 2011, Porto, Portugal, 5-8 July, 2011.
PDF Static bus schedule aware scratchpad allocation in multiprocessors.
Sudipta Chattopadhyay and Abhik Roychoudhury.
Proceedings of the ACM SIGPLAN/SIGBED 2011 conference on Languages, compilers, and tools for embedded systems, LCTES 2011, Chicago, IL, USA, April 11-14, 2011.
PDF Scalable and Precise Refinement of Cache Timing Analysis via Model Checking.
Sudipta Chattopadhyay and Abhik Roychoudhury.
Proceedings of the 32nd IEEE Real-Time Systems Symposium, RTSS 2011, Vienna, Austria, November 29 - December 2, 2011.
PDF Timing Analysis of a Protected Operating System Kernel.
Bernard Blackham, Yao Shi, Sudipta Chattopadhyay, Abhik Roychoudhury, and Gernot Heiser.
Proceedings of the 32nd IEEE Real-Time Systems Symposium, RTSS 2011, Vienna, Austria, November 29 - December 2, 2011.
2010
PDF Modeling shared cache and bus in multi-cores for timing analysis.
Sudipta Chattopadhyay, Abhik Roychoudhury, and Tulika Mitra.
13th International Workshop on Software and Compilers for Embedded Systems, SCOPES '10, St. Goar, Germany, June 29-30, 2010.
2009
PDF Unified Cache Modeling for WCET Analysis and Layout Optimizations.
Sudipta Chattopadhyay and Abhik Roychoudhury.
Proceedings of the 30th IEEE Real-Time Systems Symposium, RTSS 2009, Washington, DC, USA, 1-4 December 2009.