Sitemap
A list of all the posts and pages found on the site. For you robots out there, there is an XML version available for digesting as well.
Pages
Posts
Future Blog Post
Published:
This post will show up by default. To disable scheduling of future posts, edit config.yml and set future: false.
Blog Post number 4
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 3
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 2
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 1
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
portfolio
Portfolio item number 1
Short description of portfolio item number 1
Portfolio item number 2
Short description of portfolio item number 2 
publications
Dynamic Time Warping Assisted SVM Classifier for Bangla Speech Recognition
Published in 2018 International Conference on Computer, Communication, Chemical, Material and Electronic Engineering (IC4ME2), 2018
We propose a Bangla speech recognition system that combines Dynamic Time Warping (DTW) for feature alignment with a Support Vector Machine (SVM) classifier, achieving robust recognition performance on a collected Bangla speech dataset.
Recommended citation: M. M. Rahman, D. R. Dipta and M. M. Hasan, "Dynamic Time Warping Assisted SVM Classifier for Bangla Speech Recognition," 2018 International Conference on Computer, Communication, Chemical, Material and Electronic Engineering (IC4ME2), Rajshahi, Bangladesh, 2018.
Efficient Hardware Implementation of 256-bit ECC Processor Over Prime Field
Published in 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), 2019
We present an efficient FPGA-based hardware implementation of a 256-bit Elliptic Curve Cryptography (ECC) processor optimized for speed and area over prime fields.
Recommended citation: M. S. Rahman, M. S. Hossain, E. H. Rahat, D. R. Dipta, H. M. R. Faruque and F. K. Fattah, "Efficient Hardware Implementation of 256-bit ECC Processor Over Prime Field," 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), Bangladesh, 2019.
Design of a Convolutional Neural Network Based Smart Waste Disposal System
Published in 2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT), 2019
We design a smart waste disposal system using a convolutional neural network to automatically classify and sort waste materials, enabling automated recycling and reducing manual sorting effort.
Recommended citation: M. S. Haque Sunny, D. R. Dipta, S. Hossain, H. M. Resalat Faruque and E. Hossain, "Design of a Convolutional Neural Network Based Smart Waste Disposal System," 2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT), Dhaka, Bangladesh, 2019.
Comparison of Different Hybrid Renewable Energy Systems With Optimized PV Configuration to Realize the Effects of Multiple Schemes
Published in 2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT), 2019
We compare different hybrid renewable energy system configurations with optimized photovoltaic setups to evaluate performance trade-offs and the effects of various integration schemes on energy yield and reliability.
Recommended citation: F. I. Bappy, M. Jahirul Islam, A. K. Podder, D. R. Dipta, H. M. Resalat Faruque and E. Hossain, "Comparison of Different Hybrid Renewable Energy Systems With Optimized PV Configuration to Realize the Effects of Multiple Schemes," 2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT), Dhaka, Bangladesh, 2019.
A Comprehensive Review of the Load Forecasting Techniques Using Single and Hybrid Predictive Models
Published in IEEE Access, 2020
A comprehensive survey of electrical load forecasting methods, covering statistical models, machine learning approaches, and hybrid techniques, with comparative analysis of their accuracy, computational requirements, and applicability across forecasting horizons.
Recommended citation: A. A. Mamun, M. Sohel, N. Mohammad, M. S. Haque Sunny, D. R. Dipta and E. Hossain, "A Comprehensive Review of the Load Forecasting Techniques Using Single and Hybrid Predictive Models," IEEE Access, vol. 8, pp. 134911-134939, 2020.
Metrics and Enhancement Strategies for Grid Resilience and Reliability during Natural Disasters
Published in Applied Energy, 2021
We review and propose quantitative metrics for assessing electrical grid resilience and reliability under natural disaster conditions, and evaluate enhancement strategies including microgrids, distributed energy resources, and advanced communication systems.
Recommended citation: E. Hossain, S. Roy, N. Mohammad, N. Nawar, D. R. Dipta, "Metrics and enhancement strategies for grid resilience and reliability during natural disasters," Applied Energy, Volume 290, 2021.
Solar Energy in the United States: Development, Challenges and Future Prospects
Published in Energies, 2021
A comprehensive review of solar energy development in the United States, examining installation trends, policy challenges, grid integration issues, and future prospects for utility-scale and distributed solar deployment.
Recommended citation: S. Tabassum, T. Rahman, A. U. Islam, S. Rahman, D. R. Dipta, S. Roy, N. Mohammad, N. Nawar, E. Hossain, "Solar Energy in the United States: Development, Challenges and Future Prospects," Energies, 14(23), Article 8142, 2021.
DF-SCA: Dynamic Frequency Side Channel Attacks are Practical
Published in Proceedings of the 38th Annual Computer Security Applications Conference (ACSAC '22), 2022
We show that CPU dynamic frequency scaling — a ubiquitous performance optimization — creates a practical side channel that leaks sensitive information across privilege boundaries without requiring privileged access or precise timers.
Recommended citation: D. R. Dipta and Berk Gulmezoglu, "DF-SCA: Dynamic Frequency Side Channel Attacks are Practical," Proceedings of the 38th Annual Computer Security Applications Conference (ACSAC '22), Association for Computing Machinery, New York, NY, USA, 841–853, 2022.
Download Paper
MAD-EN: Microarchitectural Attack Detection Through System-Wide Energy Consumption
Published in IEEE Transactions on Information Forensics and Security (IEEE TIFS), 2023
MAD-EN leverages system-wide energy consumption data (via Intel RAPL) as a novel signal for detecting microarchitectural attacks, achieving high detection accuracy across diverse attack classes without requiring hardware performance counters.
Recommended citation: D. R. Dipta and B. Gulmezoglu, "MAD-EN: Microarchitectural Attack Detection Through System-Wide Energy Consumption," IEEE Transactions on Information Forensics and Security (IEEE TIFS), vol. 18, pp. 3006-3017, 2023.
Download Paper
DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection
Published in Proceedings of the 39th Annual Computer Security Applications Conference (ACSAC '23), 2023
DefWeb is a browser-level defense that injects carefully crafted noise into cache-based side-channel signals to mislead website fingerprinting classifiers while maintaining low overhead for legitimate users.
Recommended citation: S. Son, D. R. Dipta and B. Gulmezoglu, "DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection," Proceedings of the 39th Annual Computer Security Applications Conference (ACSAC '23), Association for Computing Machinery, New York, NY, USA, 379–393, 2023.
Download Paper
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments
Published in 2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P), 2024
We demonstrate that CPU dynamic frequency scaling can be exploited to fingerprint and identify web content executing inside modern sandbox environments such as V8 and Cloudflare Workers, bypassing isolation guarantees.
Recommended citation: D. R. Dipta, T. Tiemann, B. Gulmezoglu, E. Marin and T. Eisenbarth, "Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments," 2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P), pp. 327-344, Vienna, Austria, 2024.
Download Paper
Systematical Evasion From Learning-Based Microarchitectural Attack Detection Tools
Published in IEEE Journal on Emerging and Selected Topics in Circuits and Systems (IEEE JETCAS), 2024
We present a systematic methodology for evading machine learning-based microarchitectural attack detectors, demonstrating that adversarial perturbations to hardware performance counter traces can reliably bypass state-of-the-art detection tools.
Recommended citation: D. R. Dipta, J. Tan and B. Gulmezoglu, "Systematical Evasion From Learning-Based Microarchitectural Attack Detection Tools," IEEE Journal on Emerging and Selected Topics in Circuits and Systems (IEEE JETCAS), vol. 14, no. 4, pp. 823-833, Dec. 2024.
Download Paper
uGen: From Gaps to Exploits — A Multi-Agent, Retrieval-Augmented System for End-to-End Microarchitectural Attack Code Generation
Published in Under Review, 2025
uGen is an LLM-assisted multi-agent framework that autonomously identifies gaps in the microarchitectural attack literature, synthesizes relevant knowledge via retrieval-augmented generation, generates exploit code, tests it, and iteratively refines both attack and defense strategies.
Recommended citation: D. R. Dipta, T. Tiemann, B. Gulmezoglu, E. Marin and T. Eisenbarth, "uGen: From Gaps to Exploits — A Multi-Agent, Retrieval-Augmented System for End-to-End Microarchitectural Attack Code Generation." Under review.
DimShield: Exploring Intrinsic Dimension Estimation for Enhanced Machine Learning Security
Published in Under Review, 2025
DimShield is a runtime defense framework that leverages intrinsic dimension estimation to detect and mitigate adversarial attacks against machine learning models, providing robust protection without significant performance overhead.
Recommended citation: D. R. Dipta, K. Christofferson, S. Seonghun and B. Gulmezoglu, "DimShield: Exploring Intrinsic Dimension Estimation for Enhanced Machine Learning Security." Under review.
Exploiting and Mitigating Information Leakage at the Container-Kernel Interface
Published in Under Review, 2025
We systematically study information leakage channels that arise at the interface between containerized applications and the Linux kernel, demonstrating practical co-residence detection and cross-container side-channel attacks in serverless deployments.
Recommended citation: D. R. Dipta, E. Marin, B. Gulmezoglu and T. Eisenbarth, "Exploiting and Mitigating Information Leakage at the Container-Kernel Interface." Under review.
talks
DF-SCA: Dynamic Frequency Side Channel Attacks are Practical
Published:
Invited talk at NVIDIA presenting the dynamic frequency side-channel attack research, discussing its implications for GPU and heterogeneous computing security and potential mitigation strategies from a hardware design perspective.
DF-SCA: Dynamic Frequency Side Channel Attacks are Practical
Published:
Conference presentation at ACSAC 2022, presenting the paper “DF-SCA: Dynamic Frequency Side Channel Attacks are Practical.” The talk introduced the dynamic frequency side channel, demonstrated its practicality for keystroke inference and website fingerprinting across unprivileged settings, and discussed implications across Intel, AMD, and ARM platforms.
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments
Published:
Poster presentation at the CAE-R Symposium showcasing the dynamic frequency-based fingerprinting attack against modern sandbox environments, demonstrating the practical threat to serverless computing infrastructure.
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments
Published:
Conference presentation at IEEE EuroS&P 2024, presenting the paper “Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments.” The talk demonstrated how CPU dynamic frequency scaling can be exploited to fingerprint JavaScript workloads executing inside V8 and Cloudflare Workers sandbox environments, and discussed implications for serverless cloud security.
Dynamic Frequency-Based Side-Channel Attacks on Modern Computing Environments
Published:
Invited talk at the CAE-R (Center of Academic Excellence in Research) Symposium, presenting an overview of dynamic frequency side-channel attacks across modern computing environments including desktops, cloud VMs, and serverless platforms. The talk highlighted both attack capabilities and detection/mitigation strategies.
DF-SCA: Dynamic Frequency Side Channel Attacks are Practical
Published:
Poster presentation at the Youth Cyber Summit organized by the Iowa Cyber Hub, engaging high school and undergraduate students in understanding how hardware-level side-channel attacks work and why they matter for real-world security.
DF-SCA: Dynamic Frequency Side Channel Attacks are Practical
Published:
Poster presentation at the CEAB event organized by the Iowa Cyber Hub, demonstrating the practical implications of dynamic frequency side-channel attacks and highlighting the need for hardware-aware security practices.
Exploiting Dynamic Frequency: Side-Channel Attacks and Evasion in Modern Systems
Published:
Invited talk covering the dynamic frequency side-channel attack (DF-SCA) paradigm, its extension to fingerprinting modern sandbox environments, and systematic techniques for evading machine learning-based microarchitectural attack detectors. The talk also discussed ongoing work on LLM-assisted security evaluation frameworks.
teaching
Senior Design Project Mentor — CPR E 491/492
Senior Design Mentorship, Iowa State University, Department of Electrical and Computer Engineering, 2022
Courses: CPR E 491 (Senior Design Project I) — Fall 2022; CPR E 492 (Senior Design Project II) — Spring 2023
Undergraduate Research Mentor — MAIS Laboratory
Research Mentorship, Microarchitecture and Artificial Intelligence Security Laboratory (MAIS), Iowa State University, 2023
Period: 2023–2025
Research Mentor — Academic Program for EXcellence for Engineers (APEX-E)
Research Mentorship, Iowa State University, 2023
Program: Academic Program for EXcellence for Engineers (APEX-E), 2023 Summer Cohort
Teaching Assistant — CPR E 538: Reverse Engineering and Security Testing
Graduate Course, Iowa State University, Department of Electrical and Computer Engineering, 2024
Course: CPR E 538 — Reverse Engineering and Security Testing Semesters: Spring 2024, Fall 2024
