Papers by Venkata Lakshmi Bommakanti

Unintended side-channel leaks can be exploited by attackers and achieved quickly, and using relat... more Unintended side-channel leaks can be exploited by attackers and achieved quickly, and using relatively inexpensive equipment. Cloud providers aren't equipped to provide assurances of security against such attacks. One most wellknown and effective of the side-channel attack is on information leaked through power consumption. Differential Power Analysis (DPA) can extract a secret key by measuring the power used while a device is executing the any algorithm. This research explores the susceptibility of current implementations of Circuit I would like to thank my advisor Dr. Richard Brooks for believing in my abilities, providing me with an opportunity to pursue this research and providing invaluable guidance and support. Working with him and his team has been a fantastic learning experience. I thank Dr. Rajendra Singh for his encouragement and valuable suggestions towards taking up this project and being a part of my committee. I would like to thank Dr. Richard Groff for being a part of my committee and reviewing my thesis. I extend my gratitude towards Dr. Yingjie Lao and senior PhD candidate Nilim Sarma for helping me solve design challenges and providing me with resources to understand underlying concepts. I am also grateful to Dr. Brook's research team for their amicable support. Finally, I appreciate Clemson University for their wonderful research facilities.
Uploads
Papers by Venkata Lakshmi Bommakanti