| 1 | Hirak Mondal | Security Evaluation of Authentication Protocols for Unmanned Air Vehicle Infrastructure | Sole Supervision |
| 2 | Chandan Kumar | Sorting Attacks Resilient Authentication Protocol for CMOS Image Sensor Based PUF – I | Sole Supervision |
| 3 | Swapnil Gade | Designing a Physically Unclonable Function Based Mutual Authentication Protocol for Keyless Automotive Entry System | Sole Supervision |
| 4 | Pushpraj Naik | Network Data Remanence Side-Channel Attack on SPREAD, H-SPREAD and Reverse AODV | Sole Supervision |
| 5 | Anuj Shrivastava | Lightweight Group Authentication Protocol for Swarm of Drones using SRAM PUF | Sole Supervision |
| 6 | Manthan Kojage | Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs | Sole Supervision |
| 7 | Prajwal P. Thakare | Secure Secret Sharing Protocol Against Network Data Remanence Side Channel Attacks | Sole Supervision |
| 8 | Mayuresh Shandilya | Design of Approximate Floating-Point Computing Format | Sole Supervision |
| 9 | Deepak Kumar | RStopper: Deception-Based Ransomware Detection | Sole Supervision |
| 10 | Akash Panzade | Vigilantly Watching Ransomware for Robust Trapping and Containment | Sole Supervision |
| 11 | Abhishek Revskar | Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log | Sole Supervision |
| 12 | Akash Shriwas | Toolkit for Vulnerability Analysis and Penetration Testing – I | Prof. Subhajit Roy |
| 13 | Lavkush Mani Tripathi | Toolkit for Vulnerability Analysis and Penetration Testing – II | Prof. Subhajit Roy |
| 14 | Aditya Sunilkumar Kankriya | SRAM PUF-Based Secure Communication and Recognition in Drone Swarms | Sole Supervision |
| 15 | Amit Kumar | SAC Assisted Machine Learning Attacks on Feed Forward PUF Compositions | Sole Supervision |
| 16 | Anurag Kamal | Sorting Attacks Resilient Authentication Protocol for CMOS Image Sensor Based PUF – II | Sole Supervision |
| 17 | Ashee Jain | Acoustic Side Channel Attack on Virtual Keyboard on Smartphones | Sole Supervision |
| 18 | Kapilkumar Kathiriya | Security Protocol Analysis of Trezor Wallet | Prof. Debapriya Basu Roy |
| 19 | Pratik Patil | Developing Test Bed for Far-Field Side Channel Attack on Mixed Signal Chip | Prof. Debapriya Basu Roy |
| 20 | Subhajit Panday | Machine Learning Attacks on the WiSARD PUF | Prof. Purushottam Kar |
| 21 | Shubhashish Moitra | Integer Exfiltration via Hamming-Weight Measurements – II | Prof. Purushottam Kar |
| 22 | K Vamsee Krishna | Developing Test Bed for Screen Gleaning Attack on Smartphones for OTP Retrieval | Prof. Debapriya Basu Roy |
| 23 | Kush Shah | TEASE: A Leak-Resilient Protocol for Strong PUFs | Prof. Purushottam Kar |
| 24 | Anshul Purohit | Intelligent Method for Smart Platform Vulnerability Analysis and Penetration Testing – User Interface Design | Prof. Subhajit Roy |
| 25 | Himanshu Karnatak | Formal Verification and AI for Proof Assistant | Prof. Indranil Saha |
| 26 | Pratibha Gupta | Intelligent Method for Smart Platform Vulnerability Analysis and Penetration Testing – Building for AP | Prof. Subhajit Roy |
| 27 | Ruby Prajapati | Intelligent Method for Smart Platform Vulnerability Analysis and Penetration Testing – LLM-Based Report Generation | Prof. Subhajit Roy |
| 28 | Abhinandan Singh Baghel | Privacy Attacks on RAG-Enabled Fine-Tuning of Large Language Models | Sole Supervision |