Maria Mushtaq
Maria Mushtaq
Telecom Paris
Verified email at
Cited by
Cited by
Nights-watch: A cache-based side-channel intrusion detector using hardware performance counters
M Mushtaq, A Akram, MK Bhatti, M Chaudhry, V Lapotre, G Gogniat
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
Run-time detection of prime+ probe side-channel attack on AES encryption algorithm
M Mushtaq, A Akram, MK Bhatti, RNB Rais, V Lapotre, G Gogniat
2018 Global Information Infrastructure and Networking Symposium (GIIS), 1-5, 2018
Machine learning for security: The case of side-channel attack detection at run-time
M Mushtaq, A Akram, MK Bhatti, M Chaudhry, M Yousaf, U Farooq, ...
2018 25th IEEE International Conference on Electronics, Circuits and Systems …, 2018
WHISPER: A tool for run-time detection of side-channel attacks
M Mushtaq, J Bricq, MK Bhatti, A Akram, V Lapotre, G Gogniat, P Benoit
IEEE Access 8, 83871-83900, 2020
Locality-aware task scheduling for homogeneous parallel computing systems
MK Bhatti, I Oz, S Amin, M Mushtaq, U Farooq, K Popov, M Brorsson
Computing 100 (6), 557-595, 2018
Flush+ prefetch: A countermeasure against access-driven cache-based side-channel attacks
MA Mukhtar, M Mushtaq, MK Bhatti, V Lapotre, G Gogniat
Journal of Systems Architecture 104, 101698, 2020
Meet the sherlock holmes’ of side channel leakage: A survey of cache sca detection techniques
A Akram, M Mushtaq, MK Bhatti, V Lapotre, G Gogniat
IEEE Access 8, 70836-70860, 2020
Cache-Based Side-Channel Intrusion Detection using Hardware Performance Counters
M Mushtaq, A Akram, MK Bhatti, V Lapotre, G Gogniat
CryptArchi 2018-16th International Workshops on Cryptographic architectures …, 2018
Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA
M Mushtaq, MA Mukhtar, V Lapotre, MK Bhatti, G Gogniat
Information Systems 92, 101524, 2020
Sherlock Holmes of Cache Side-Channel Attacks in Intel's x86 Architecture
M Mushtaq, A Akram, MK Bhatti, U Ali, V Lapotre, G Gogniat
2019 IEEE Conference on Communications and Network Security (CNS), 1-9, 2019
Vulnerability Assessment of the Rowhammer Attack Using Machine Learning and the gem5 Simulator-Work in Progress
L France, M Mushtaq, F Bruguier, D Novo, P Benoit
Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber …, 2021
Implementation of Rowhammer Effect in gem5
L France, F Bruguier, M Mushtaq, D Novo, P Benoit
15ème Colloque National du GDR SoC², 2021
Transit-Guard: An OS-based Defense Mechanism Against Transient Execution Attacks
M Mushtaq, D Novo, F Bruguier, P Benoit, MK Bhatti
26th IEEE European Test Symposium (ETS 2021), 2021
Efficient AES Implementation for Better Resource Usage and Performance of IoTs
U Farooq, M Mushtaq, M Bhatti
5th International Conference on Cyber-Technologies and Cyber-Systems (CYBER …, 2020
Challenges of Using Performance Counters in Security Against Side-Channel Leakage
M Mushtaq, P Benoit, U Farooq
5th International Conference on Cyber-Technologies and Cyber-Systems (CYBER …, 2020
Software-based Detection and Mitigation of Microarchitectural Attacks on Intel’s x86 Architecture
M Mushtaq
Université de Bretagne Sud, 2019
Improving Confidentiality Against Cache-based SCAs
M Mushtaq, V Lapotre, G Gogniat, M Mukhtar, MK Bhatti
ACM WomENcourage, 2017
Developing Trust in Ride Sharing System
COMSATS Institute of Information Technology, Lahore, 2014
HP Counters
The system can't perform the operation now. Try again later.
Articles 1–19