Maria Mushtaq
Maria Mushtaq
Telecom Paris
Verified email at telecom-paris.fr
Title
Cited by
Cited by
Year
Nights-watch: A cache-based side-channel intrusion detector using hardware performance counters
M Mushtaq, A Akram, MK Bhatti, M Chaudhry, V Lapotre, G Gogniat
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
302018
Run-time detection of prime+ probe side-channel attack on AES encryption algorithm
M Mushtaq, A Akram, MK Bhatti, RNB Rais, V Lapotre, G Gogniat
2018 Global Information Infrastructure and Networking Symposium (GIIS), 1-5, 2018
192018
Machine learning for security: The case of side-channel attack detection at run-time
M Mushtaq, A Akram, MK Bhatti, M Chaudhry, M Yousaf, U Farooq, ...
2018 25th IEEE International Conference on Electronics, Circuits and Systems …, 2018
142018
WHISPER: A tool for run-time detection of side-channel attacks
M Mushtaq, J Bricq, MK Bhatti, A Akram, V Lapotre, G Gogniat, P Benoit
IEEE Access 8, 83871-83900, 2020
122020
Locality-aware task scheduling for homogeneous parallel computing systems
MK Bhatti, I Oz, S Amin, M Mushtaq, U Farooq, K Popov, M Brorsson
Computing 100 (6), 557-595, 2018
122018
Flush+ prefetch: A countermeasure against access-driven cache-based side-channel attacks
MA Mukhtar, M Mushtaq, MK Bhatti, V Lapotre, G Gogniat
Journal of Systems Architecture 104, 101698, 2020
62020
Meet the sherlock holmes’ of side channel leakage: A survey of cache sca detection techniques
A Akram, M Mushtaq, MK Bhatti, V Lapotre, G Gogniat
IEEE Access 8, 70836-70860, 2020
52020
Cache-Based Side-Channel Intrusion Detection using Hardware Performance Counters
M Mushtaq, A Akram, MK Bhatti, V Lapotre, G Gogniat
CryptArchi 2018-16th International Workshops on Cryptographic architectures …, 2018
52018
Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA
M Mushtaq, MA Mukhtar, V Lapotre, MK Bhatti, G Gogniat
Information Systems 92, 101524, 2020
42020
Sherlock Holmes of Cache Side-Channel Attacks in Intel's x86 Architecture
M Mushtaq, A Akram, MK Bhatti, U Ali, V Lapotre, G Gogniat
2019 IEEE Conference on Communications and Network Security (CNS), 1-9, 2019
32019
Vulnerability Assessment of the Rowhammer Attack Using Machine Learning and the gem5 Simulator-Work in Progress
L France, M Mushtaq, F Bruguier, D Novo, P Benoit
Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber …, 2021
22021
Implementation of Rowhammer Effect in gem5
L France, F Bruguier, M Mushtaq, D Novo, P Benoit
15ème Colloque National du GDR SoC², 2021
2021
Transit-Guard: An OS-based Defense Mechanism Against Transient Execution Attacks
M Mushtaq, D Novo, F Bruguier, P Benoit, MK Bhatti
26th IEEE European Test Symposium (ETS 2021), 2021
2021
Efficient AES Implementation for Better Resource Usage and Performance of IoTs
U Farooq, M Mushtaq, M Bhatti
5th International Conference on Cyber-Technologies and Cyber-Systems (CYBER …, 2020
2020
Challenges of Using Performance Counters in Security Against Side-Channel Leakage
M Mushtaq, P Benoit, U Farooq
5th International Conference on Cyber-Technologies and Cyber-Systems (CYBER …, 2020
2020
Software-based Detection and Mitigation of Microarchitectural Attacks on Intel’s x86 Architecture
M Mushtaq
Université de Bretagne Sud, 2019
2019
Improving Confidentiality Against Cache-based SCAs
M Mushtaq, V Lapotre, G Gogniat, M Mukhtar, MK Bhatti
ACM WomENcourage, 2017
2017
Developing Trust in Ride Sharing System
MM CIIT
COMSATS Institute of Information Technology, Lahore, 2014
2014
NIGHTs-WATCH
HP Counters
The system can't perform the operation now. Try again later.
Articles 1–19