Recherche - Archive ouverte HAL Accéder directement au contenu

Filtrer vos résultats

29 résultats
Image document

Improving Confidentiality Against Cache-based SCAs

Maria Mushtaq , Vianney Lapotre , Guy Gogniat , M Asim Mukhtar , Muhammad Khurram Bhatti
ACM WomENcourage, Sep 2017, barcelona, France
Communication dans un congrès hal-01748057v1
Image document

Transit-Guard: An OS-based Defense Mechanism Against Transient Execution Attacks

Maria Mushtaq , David Novo , Florent Bruguier , Pascal Benoit , Muhammad Khurram Bhatti
ETS 2021 - 26th IEEE European Test Symposium, May 2021, Bruges (virtual), Belgium. pp.1-2, ⟨10.1109/ETS50041.2021.9465429⟩
Communication dans un congrès emse-03195702v1
Image document

Modeling Rowhammer in the gem5 simulator

Loïc France , Florent Bruguier , Maria Mushtaq , David Novo , Pascal Benoit
CHES 2022 - Conference on Cryptographic Hardware and Embedded Systems, Sep 2022, Leuven, Belgium.
Poster de conférence lirmm-03817275v1
Image document

Software-based Detection and Mitigation of Microarchitectural Attacks on Intel’s x86 Architecture

Maria Mushtaq
Cryptography and Security [cs.CR]. Université de Bretagne Sud, 2019. English. ⟨NNT : 2019LORIS531⟩
Thèse tel-02988980v1
Image document

WHISPER A Tool for Run-time Detection of Side-Channel Attacks

Maria Mushtaq , Jeremy Bricq , Muhammad Khurram Bhatti , Ayaz Akram , Vianney Lapotre , et al.
IEEE Access, 2020, 8, pp.83871-83900. ⟨10.1109/ACCESS.2020.2988370⟩
Article dans une revue hal-02546630v1
Image document

Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA

Maria Mushtaq , Muhammad Asim Mukhtar , Vianney Lapotre , Muhammad Khurram Bhatti , Guy Gogniat
Information Systems, 2020, 92, pp.#101524. ⟨10.1016/j.is.2020.101524⟩
Article dans une revue hal-02537540v1
Image document

Cache-Based Side-Channel Intrusion Detection using Hardware Performance Counters

Maria Mushtaq , Ayaz Akram , Muhammad Khurram Bhatti , Vianney Lapotre , Guy Gogniat
CryptArchi 2018 - 16th International Workshops on Cryptographic architectures embedded in logic devices, Jun 2018, Lorient, France
Communication dans un congrès cel-01824512v1
Image document

Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level

Quentin Forcioli , Jean-Luc Danger , Clémentine Maurice , Lilian Bossuet , Florent Bruguier , et al.
EuroS&PW 2021 - IEEE European Symposium on Security and Privacy Workshops, Sep 2021, Vienne, Austria. pp.96-102, ⟨10.1109/EuroSPW54576.2021.00017⟩
Communication dans un congrès hal-03353878v1
Image document

Challenges of Using Performance Counters in Security Against Side-Channel Leakage

Maria Mushtaq , Pascal Benoit , Umer Farooq
CYBER 2020 - 5th International Conference on Cyber-Technologies and Cyber-Systems, Oct 2020, Nice, France
Communication dans un congrès hal-02979362v1
Image document

Sherlock Holmes of Cache Side-Channel Attacks in Intel's x86 Architecture

Maria Mushtaq , Ayaz Akram , Muhammad Khurram Bhatti , Usman Ali , Vianney Lapotre , et al.
IEEE-Communications and Network Security, Jun 2019, Washington DC, United States
Communication dans un congrès hal-02151838v1
Image document

Reducing the Silicon Area Overhead of Counter-Based Rowhammer Mitigations

Loïc France , Florent Bruguier , David Novo , Maria Mushtaq , Pascal Benoit
IEEE Computer Architecture Letters, In press, IEEE Computer Architecture Letters, pp.1-4. ⟨10.1109/LCA.2023.3328824⟩
Article dans une revue lirmm-04420368v1

CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model

Natasha Alkhatib , Maria Mushtaq , Hadi Ghauch , Jean-Luc Danger
2022 IEEE/ACS 19th International Conference on Computer Systems and Applications (AICCSA), Dec 2022, Abu Dhabi, United Arab Emirates. pp.1-8, ⟨10.1109/AICCSA56895.2022.10017800⟩
Communication dans un congrès hal-04260887v1
Image document

Efficient AES Implementation for Better Resource Usage and Performance of IoTs

Umer Farooq , Maria Mushtaq , Muhammad Khurram Bhatti
CYBER 2020 - 5th International Conference on Cyber-Technologies and Cyber-Systems, Oct 2020, Nice, France
Communication dans un congrès hal-02979423v1
Image document

Modeling Rowhammer memory corruption in the gem5 simulator

Loïc France , Florent Bruguier , Maria Mushtaq , David Novo , Pascal Benoit
THCon 2022 - Toulouse Hacking Conference, Apr 2022, Toulouse, France
Communication dans un congrès lirmm-03817303v1

Locality-aware task scheduling for homogeneous parallel computing systems

Muhammad Khurram Bhatti , Isil Oz , Sarah Amin , Maria Mushtaq , Umer Farooq , et al.
Article dans une revue hal-01748398v1
Image document

Implementation of Rowhammer Effect in gem5

Loïc France , Florent Bruguier , Maria Mushtaq , David Novo , Pascal Benoit
15e Colloque National du GDR SoC², Jun 2021, Rennes, France. , 2021
Poster de conférence hal-03284443v1
Image document

Diminisher: A Linux Kernel based Countermeasure for TAA Vulnerability

Ameer Hamza , Maria Mushtaq , Muhammad Khurram Bhatti , David Novo , Florent Bruguier , et al.
CPS4CIP 2021 - 2nd International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, Oct 2021, virtual event, Germany. pp.477-495, ⟨10.1007/978-3-030-95484-0_28⟩
Communication dans un congrès hal-03372868v1
Image document

Reducing the Silicon Area Overhead of Counter-Based Rowhammer Mitigations

Loïc France , Florent Bruguier , David Novo , Maria Mushtaq , Pascal Benoit
18th CryptArchi Workshop, May 2022, Porquerolles, France
Communication dans un congrès lirmm-03738883v1
Image document

Implementing Rowhammer Memory Corruption in the gem5 Simulator

Loïc France , Florent Bruguier , Maria Mushtaq , David Novo , Pascal Benoit
RSP 2021 - 32nd International Workshop on Rapid System Prototyping, Oct 2021, Virtual Event, France. pp.36-42, ⟨10.1109/RSP53691.2021.9806242⟩
Communication dans un congrès hal-03418858v1
Image document

Machine Learning For Security: The Case of Side-Channel Attack Detection at Run-time

Maria Mushtaq , Ayaz Akram , Muhammad Khurram Bhatti , Maham Chaudhry , Muneeb Yousaf , et al.
ICECS-2018, Dec 2018, Bordeaux, France
Communication dans un congrès hal-01876792v1

Here comes SAID: A SOME/IP Attention-based mechanism for Intrusion Detection

Natasha Alkhatib , Maria Mushtaq , Hadi Ghauch , Jean-Luc Danger
2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN), Jul 2023, Paris, France. pp.462-467, ⟨10.1109/ICUFN57995.2023.10200508⟩
Communication dans un congrès hal-04260371v1

Unsupervised Network Intrusion Detection System for AVTP in Automotive Ethernet Networks

Natasha Alkhatib , Maria Mushtaq , Hadi Ghauch , Jean-Luc Danger
2022 IEEE Intelligent Vehicles Symposium (IV), Jun 2022, Aachen, Germany. pp.1731-1738, ⟨10.1109/IV51971.2022.9827285⟩
Communication dans un congrès hal-03854412v1
Image document

Run-time Detection of Prime+Probe Side-Channel Attack on AES Encryption Algorithm

Maria Mushtaq , Ayaz Akram , Muhammad Khurram Bhatti , Naveed Bin Raees Rao , Vianney Lapotre , et al.
Global Information Infrastructure and Networking Symposium (GIIS), Oct 2018, Thessaloniki, Greece
Communication dans un congrès hal-01879950v1
Image document

Software-based Detection and Mitigation of Microarchitectural Attacks on Intel’s x86 Architecture

Maria Mushtaq
Computer Science [cs]. Université de Bretagne Sud, 2019. English. ⟨NNT : ⟩
Thèse tel-03105715v1
Image document

FLUSH + PREFETCH: A Countermeasure Against Access-driven Cache-based Side-Channel Attacks

M Asim Mukhtar , Maria Mushtaq , M Khurram Bhatti , Vianney Lapotre , Guy Gogniat
Journal of Systems Architecture, 2020, 104, pp.101698. ⟨10.1016/j.sysarc.2019.101698⟩
Article dans une revue hal-02417391v1
Image document

NIGHTs-WATCH: A Cache-based Side-channel Intrusion Detector Using Hardware Performance Counters

Maria Mushtaq , Ayaz Akram , Muhammad Khurram Bhatti , Maham Chaudhry , Vianney Lapotre , et al.
7th International Workshop on Hardware and Architectural Support for Security and Privacy, Jun 2018, Los Angeles, United States. ⟨10.1145/3214292.3214293⟩
Communication dans un congrès hal-01806729v1
Image document

Meet the Sherlock Holmes’ of Side Channel Leakage: A Survey of Cache SCA Detection Techniques

Ayaz Akram , Maria Mushtaq , Muhammad Khurram Bhatti , Vianney Lapotre , Guy Gogniat
IEEE Access, 2020, 8, pp.70836-70860. ⟨10.1109/ACCESS.2020.2980522⟩
Article dans une revue hal-02508889v1
Image document

Vulnerability Assessment of the Rowhammer Attack Using Machine Learning and the gem5 Simulator -Work in Progress

Loïc France , Maria Mushtaq , Florent Bruguier , David Novo , Pascal Benoit
SaT-CPS 2021 - ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, Apr 2021, Virtually, United States. pp.104-109, ⟨10.1145/3445969.3450425⟩
Communication dans un congrès hal-03196090v1
Image document

The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection

Maria Mushtaq , Muhammad Muneeb Yousaf , Muhammad Khurram Bhatti , Vianney Lapotre , Gogniat Guy
Annals of Telecommunications - annales des télécommunications, 2022, ⟨10.1007/s12243-021-00906-3⟩
Article dans une revue hal-03545078v1