Follow
Maria Mushtaq
Maria Mushtaq
Associate Professor at Telecom Paris
Verified email at telecom-paris.fr - Homepage
Title
Cited by
Cited by
Year
Nights-watch: A cache-based side-channel intrusion detector using hardware performance counters
M Mushtaq, A Akram, MK Bhatti, M Chaudhry, V Lapotre, G Gogniat
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
892018
WHISPER: A tool for run-time detection of side-channel attacks
M Mushtaq, J Bricq, MK Bhatti, A Akram, V Lapotre, G Gogniat, P Benoit
IEEE Access 8, 83871-83900, 2020
642020
Run-time detection of prime+ probe side-channel attack on AES encryption algorithm
M Mushtaq, A Akram, MK Bhatti, RNB Rais, V Lapotre, G Gogniat
2018 Global Information Infrastructure and Networking Symposium (GIIS), 1-5, 2018
442018
Machine learning for security: The case of side-channel attack detection at run-time
M Mushtaq, A Akram, MK Bhatti, M Chaudhry, M Yousaf, U Farooq, ...
2018 25th IEEE International Conference on Electronics, Circuits and Systems …, 2018
312018
Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA
M Mushtaq, MA Mukhtar, V Lapotre, MK Bhatti, G Gogniat
Information Systems 92, 101524, 2020
292020
Meet the Sherlock Holmes’ of side channel leakage: A survey of cache SCA detection techniques
A Akram, M Mushtaq, MK Bhatti, V Lapotre, G Gogniat
IEEE Access 8, 70836-70860, 2020
242020
Piperine phytosomes for bioavailability enhancement of domperidone
N Islam, M Irfan, T Hussain, M Mushtaq, IU Khan, AM Yousaf, MU Ghori, ...
Journal of Liposome Research 32 (2), 172-180, 2022
192022
Flush+ prefetch: A countermeasure against access-driven cache-based side-channel attacks
MA Mukhtar, M Mushtaq, MK Bhatti, V Lapotre, G Gogniat
Journal of Systems Architecture 104, 101698, 2020
142020
Locality-aware task scheduling for homogeneous parallel computing systems
MK Bhatti, I Oz, S Amin, M Mushtaq, U Farooq, K Popov, M Brorsson
Computing 100, 557-595, 2018
142018
Unsupervised network intrusion detection system for AVTP in automotive Ethernet networks
N Alkhatib, M Mushtaq, H Ghauch, JL Danger
2022 IEEE Intelligent Vehicles Symposium (IV), 1731-1738, 2022
122022
Cache-Based Side-Channel Intrusion Detection using Hardware Performance Counters
M Mushtaq, A Akram, MK Bhatti, V Lapotre, G Gogniat
CryptArchi 2018-16th International Workshops on Cryptographic architectures …, 2018
112018
Vulnerability assessment of the rowhammer attack using machine learning and the gem5 simulator-work in progress
L France, M Mushtaq, F Bruguier, D Novo, P Benoit
Proceedings of the 2021 ACM workshop on secure and trustworthy cyber …, 2021
102021
CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model
N Alkhatib, M Mushtaq, H Ghauch, JL Danger
2022 IEEE/ACS 19th International Conference on Computer Systems and …, 2022
92022
Sherlock holmes of cache side-channel attacks in Intel's x86 architecture
M Mushtaq, A Akram, MK Bhatti, U Ali, V Lapotre, G Gogniat
2019 IEEE Conference on Communications and Network Security (CNS), 1-9, 2019
82019
AVTPnet: Convolutional Autoencoder for AVTP anomaly detection in Automotive Ethernet Networks
N Alkhatib, M Mushtaq, H Ghauch, JL Danger
arXiv preprint arXiv:2202.00045, 2022
62022
Transit-guard: An os-based defense mechanism against transient execution attacks
M Mushtaq, D Novo, F Bruguier, P Benoit, MK Bhatti
2021 IEEE European Test Symposium (ETS), 1-2, 2021
62021
The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection
M Mushtaq, MM Yousaf, MK Bhatti, V Lapotre, G Gogniat
Annals of Telecommunications 77 (11-12), 731-747, 2022
52022
Virtual platform to analyze the security of a system on chip at microarchitectural level
Q Forcioli, JL Danger, C Maurice, L Bossuet, F Bruguier, M Mushtaq, ...
2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2021
52021
Implementing rowhammer memory corruption in the gem5 simulator
L France, F Bruguier, M Mushtaq, D Novo, P Benoit
2021 IEEE International Workshop on Rapid System Prototyping (RSP), 36-42, 2021
42021
Challenges of using performance counters in security against side-channel leakage
M Mushtaq, P Benoit, U Farooq
CYBER 2020-5th International Conference on Cyber-Technologies and Cyber-Systems, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20