Asmita Adhikary

Mercator 1, 03.11b · CESCA Lab · Digital Security Group · Toernooiveld 212 · Radboud University · 6525EC Nijmegen · The Netherlands asmita.adhikary@ru.nl

I am a PhD student at CESCA Lab, at the Digital Security Group of Radboud University, under the supervision of Prof. Lejla Batina and Dr. Ileana Buhan. I received a B. Tech. and an M. Tech. in Computer Science and Engineering, from Maulana Abul Kalam Azad University of Technology in 2019, and, from Pondicherry University in 2021, respectively.


Publications

At Conferences:

Fault injection attacks have caused implementations to behave unexpectedly, resulting in a spectacular bypass of security features and even the extraction of cryptographic keys. Clearly, developers want to ensure the robustness of the software against faults and eliminate production weaknesses that could lead to exploitation. Several fault simulators have been released that promise cost-effective evaluations against fault attacks. In this paper, we set out to discover how suitable such tools are, for a developer who wishes to create robust software against fault attacks. We found four open-source fault simulators that employ different techniques to navigate faults, which we objectively compare and discuss their benefits and drawbacks. Unfortunately, none of the four open-source fault simulators employ artificial intelligence (AI) techniques. However, AI was successfully applied to improve the fault simulation of cryptographic algorithms, though none of these tools is open source. We suggest improvements to open-source fault simulators inspired by the AI techniques used by cryptographic fault simulators.

@ICIRCA 2020

Association rule mining is utilized to take care of various types of area issues. These days' affiliation rule mining has been stretched out to huge information. As a result of the gigantic measure of information, a solitary way the sequential procedure isn't adequate subsequently. The most basic piece of ARM is discovering a potential relationship between things in an enormous exchange based dataset. The well-known algorithms in particular apriori and FP Growth has been identified & implemented those algorithms using the WEKA (version 3.7.10) tool.


Courses

Teaching Assistant:

Selected Topics on Hardware for Security, NWI-IMC065

Winter 2022
Introduction to Cryptography, NWI-IBC023

Autumn 2023