default search action
Maria Mushtaq
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2019
- [b1]Maria Mushtaq:
Software-based Detection and Mitigation of Microarchitectural Attacks on Intel's x86 Architecture. (Mise en oeuvre de mécanismes logiciels pour la détection et la prévention des attaques exploitant la micro-architecture des processeurs Intel x86). University of Southern Brittany, Vannes, Morbihan, France, 2019
Journal Articles
- 2024
- [j8]Loïc France, Florent Bruguier, David Novo, Maria Mushtaq, Pascal Benoit:
Reducing the Silicon Area Overhead of Counter-Based Rowhammer Mitigations. IEEE Comput. Archit. Lett. 23(1): 61-64 (2024) - 2022
- [j7]Maria Mushtaq, Muhammad Muneeb Yousaf, Muhammad Khurram Bhatti, Vianney Lapotre, Guy Gogniat:
The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection. Ann. des Télécommunications 77(11-12): 731-747 (2022) - 2021
- [j6]Flavio Esposito, Maria Mushtaq, Michele Berno, Gianluca Davoli, Davide Borsatti, Walter Cerroni, Michele Rossi:
Necklace: An Architecture for Distributed and Robust Service Function Chains With Guarantees. IEEE Trans. Netw. Serv. Manag. 18(1): 152-166 (2021) - 2020
- [j5]Ayaz Akram, Maria Mushtaq, Muhammad Khurram Bhatti, Vianney Lapotre, Guy Gogniat:
Meet the Sherlock Holmes' of Side Channel Leakage: A Survey of Cache SCA Detection Techniques. IEEE Access 8: 70836-70860 (2020) - [j4]Maria Mushtaq, Jeremy Bricq, Muhammad Khurram Bhatti, Ayaz Akram, Vianney Lapotre, Guy Gogniat, Pascal Benoit:
WHISPER: A Tool for Run-Time Detection of Side-Channel Attacks. IEEE Access 8: 83871-83900 (2020) - [j3]Maria Mushtaq, Muhammad Asim Mukhtar, Vianney Lapotre, Muhammad Khurram Bhatti, Guy Gogniat:
Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA. Inf. Syst. 92: 101524 (2020) - [j2]Muhammad Asim Mukhtar, Maria Mushtaq, Muhammad Khurram Bhatti, Vianney Lapotre, Guy Gogniat:
FLUSH + PREFETCH: A countermeasure against access-driven cache-based side-channel attacks. J. Syst. Archit. 104: 101698 (2020) - 2018
- [j1]Muhammad Khurram Bhatti, Isil Öz, Sarah Amin, Maria Mushtaq, Umer Farooq, Konstantin Popov, Mats Brorsson:
Locality-aware task scheduling for homogeneous parallel computing systems. Computing 100(6): 557-595 (2018)
Conference and Workshop Papers
- 2023
- [c14]Maria Mushtaq, Morteza Golkarifard, Nashid Shahriar, Raouf Boutaba, Aladdin Saleh:
Optimal Functional Splitting, Placement and Routing for Isolation-Aware Network Slicing in NG-RAN. CNSM 2023: 1-5 - [c13]Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, Jean-Luc Danger:
Here comes SAID: A SOME/IP Attention-based mechanism for Intrusion Detection. ICUFN 2023: 462-467 - 2022
- [c12]Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, Jean-Luc Danger:
CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model. AICCSA 2022: 1-8 - [c11]Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, Jean-Luc Danger:
Unsupervised Network Intrusion Detection System for AVTP in Automotive Ethernet Networks. IV 2022: 1731-1738 - 2021
- [c10]Loïc France, Maria Mushtaq, Florent Bruguier, David Novo, Pascal Benoit:
Vulnerability Assessment of the Rowhammer Attack Using Machine Learning and the gem5 Simulator - Work in Progress. SAT-CPS@CODASPY 2021: 104-109 - [c9]Ameer Hamza, Maria Mushtaq, Khurram Bhatti, David Novo, Florent Bruguier, Pascal Benoit:
Diminisher: A Linux Kernel Based Countermeasure for TAA Vulnerability. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 477-495 - [c8]Maria Mushtaq, David Novo, Florent Bruguier, Pascal Benoit, Muhammad Khurram Bhatti:
Transit-Guard: An OS-based Defense Mechanism Against Transient Execution Attacks. ETS 2021: 1-2 - [c7]Quentin Forcioli, Jean-Luc Danger, Clémentine Maurice, Lilian Bossuet, Florent Bruguier, Maria Mushtaq, David Novo, Loïc France, Pascal Benoit, Sylvain Guilley, Thomas Perianin:
Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level. EuroS&P Workshops 2021: 96-102 - [c6]Aziza Alzadjali, Maria Mushtaq, Flavio Esposito, Claudio Fiandrino, Jitender S. Deogun:
OctoMap: Supporting Service Function Chaining via Supervised Learning and Online Contextual Bandit. NetSoft 2021: 133-141 - [c5]Loïc France, Florent Bruguier, Maria Mushtaq, David Novo, Pascal Benoit:
Implementing Rowhammer Memory Corruption in the gem5 Simulator. RSP 2021: 36-42 - 2019
- [c4]Maria Mushtaq, Ayaz Akram, Muhammad Khurram Bhatti, Usman Ali, Vianney Lapotre, Guy Gogniat:
Sherlock Holmes of Cache Side-Channel Attacks in Intel's x86 Architecture. CNS 2019: 64-72 - 2018
- [c3]Maria Mushtaq, Ayaz Akram, Muhammad Khurram Bhatti, Rao Naveed Bin Rais, Vianney Lapotre, Guy Gogniat:
Run-time Detection of Prime + Probe Side-Channel Attack on AES Encryption Algorithm. GIIS 2018: 1-5 - [c2]Maria Mushtaq, Ayaz Akram, Muhammad Khurram Bhatti, Maham Chaudhry, Muhammad Muneeb Yousaf, Umer Farooq, Vianney Lapotre, Guy Gogniat:
Machine Learning For Security: The Case of Side-Channel Attack Detection at Run-time. ICECS 2018: 485-488 - [c1]Maria Mushtaq, Ayaz Akram, Muhammad Khurram Bhatti, Maham Chaudhry, Vianney Lapotre, Guy Gogniat:
NIGHTs-WATCH: a cache-based side-channel intrusion detector using hardware performance counters. HASP@ISCA 2018: 1:1-1:8
Informal and Other Publications
- 2022
- [i2]Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, Jean-Luc Danger:
AVTPnet: Convolutional Autoencoder for AVTP anomaly detection in Automotive Ethernet Networks. CoRR abs/2202.00045 (2022) - [i1]Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, Jean-Luc Danger:
CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model. CoRR abs/2210.09439 (2022)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-19 00:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint