Maria Mushtaq
Maria Mushtaq
LIRMM-CNRS, Univ Montpellier
Verified email at lirmm.fr
Title
Cited by
Cited by
Year
Nights-watch: A cache-based side-channel intrusion detector using hardware performance counters
M Mushtaq, A Akram, MK Bhatti, M Chaudhry, V Lapotre, G Gogniat
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
282018
Run-time detection of prime+ probe side-channel attack on AES encryption algorithm
M Mushtaq, A Akram, MK Bhatti, RNB Rais, V Lapotre, G Gogniat
2018 Global Information Infrastructure and Networking Symposium (GIIS), 1-5, 2018
172018
Machine learning for security: The case of side-channel attack detection at run-time
M Mushtaq, A Akram, MK Bhatti, M Chaudhry, M Yousaf, U Farooq, ...
2018 25th IEEE International Conference on Electronics, Circuits and Systems …, 2018
122018
Whisper: A tool for run-time detection of side-channel attacks
M Mushtaq, J Bricq, MK Bhatti, A Akram, V Lapotre, G Gogniat, P Benoit
IEEE Access 8, 83871-83900, 2020
92020
Locality-aware task scheduling for homogeneous parallel computing systems
MK Bhatti, I Oz, S Amin, M Mushtaq, U Farooq, K Popov, M Brorsson
Computing 100 (6), 557-595, 2018
92018
Cache-Based Side-Channel Intrusion Detection using Hardware Performance Counters
M Mushtaq, A Akram, MK Bhatti, V Lapotre, G Gogniat
CryptArchi 2018-16th International Workshops on Cryptographic architectures …, 2018
52018
Flush+ prefetch: A countermeasure against access-driven cache-based side-channel attacks
MA Mukhtar, M Mushtaq, MK Bhatti, V Lapotre, G Gogniat
Journal of Systems Architecture 104, 101698, 2020
42020
Meet the Sherlock Holmes’ of Side Channel leakage: a survey of cache SCA detection techniques
A Akram, M Mushtaq, MK Bhatti, V Lapotre, G Gogniat
IEEE Access 8, 70836-70860, 2020
32020
Sherlock Holmes of Cache Side-Channel Attacks in Intel's x86 Architecture
M Mushtaq, A Akram, MK Bhatti, U Ali, V Lapotre, G Gogniat
2019 IEEE Conference on Communications and Network Security (CNS), 1-9, 2019
32019
Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA
M Mushtaq, MA Mukhtar, V Lapotre, MK Bhatti, G Gogniat
Information Systems 92, 101524, 2020
22020
Transit-Guard: An OS-based Defense Mechanism Against Transient Execution Attacks
M Mushtaq, D Novo, F Bruguier, P Benoit, MK Bhatti
26th IEEE European Test Symposium (ETS 2021), 2021
2021
Vulnerability Assessment of the Rowhammer Attack Using Machine Learning and the gem5 Simulator-Work in Progress
L France, M Mushtaq, F Bruguier, D Novo, P Benoit
Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber …, 2021
2021
Efficient AES Implementation for Better Resource Usage and Performance of IoTs
U Farooq, M Mushtaq, M Bhatti
5th International Conference on Cyber-Technologies and Cyber-Systems (CYBER …, 2020
2020
Challenges of Using Performance Counters in Security Against Side-Channel Leakage
M Mushtaq, P Benoit, U Farooq
5th International Conference on Cyber-Technologies and Cyber-Systems (CYBER …, 2020
2020
Software-based Detection and Mitigation of Microarchitectural Attacks on Intel’s x86 Architecture
M Mushtaq
Université de Bretagne Sud, 2019
2019
Improving Confidentiality Against Cache-based SCAs
M Mushtaq, V Lapotre, G Gogniat, M Mukhtar, MK Bhatti
ACM WomENcourage, 2017
2017
Developing Trust in Ride Sharing System
MM CIIT
COMSATS Institute of Information Technology, Lahore, 2014
2014
NIGHTs-WATCH
HP Counters
The system can't perform the operation now. Try again later.
Articles 1–18