Trusted execution environment: What it is, and what it is not M Sabt, M Achemlal, A Bouabdallah 2015 IEEE Trustcom/BigDataSE/Ispa 1, 57-64, 2015 | 730 | 2015 |
BlindIDS: Market-compliant and privacy-friendly intrusion detection system over encrypted traffic S Canard, A Diop, N Kheir, M Paindavoine, M Sabt Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 75 | 2017 |
Practical implementation of ring-SIS/LWE based signature and IBE P Bert, PA Fouque, A Roux-Langlois, M Sabt Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort …, 2018 | 63 | 2018 |
“They’re not that hard to mitigate”: What cryptographic library developers think about timing attacks J Jancar, M Fourné, DDA Braga, M Sabt, P Schwabe, G Barthe, ... 2022 IEEE Symposium on Security and Privacy (SP), 632-649, 2022 | 45 | 2022 |
Breaking into the keystore: A practical forgery attack against Android keystore M Sabt, J Traoré Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 39 | 2016 |
Implementation of lattice trapdoors on modules and applications P Bert, G Eberhart, L Prabel, A Roux-Langlois, M Sabt Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021 …, 2021 | 24 | 2021 |
The dual-execution-environment approach: Analysis and comparative evaluation M Sabt, M Achemlal, A Bouabdallah ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015 | 21 | 2015 |
Dragonblood is still leaking: Practical cache-based side-channel in the wild D de Almeida Braga, PA Fouque, M Sabt Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 18 | 2020 |
PARASITE: Password recovery attack against SRP implementations in the wild D de Almeida Braga, PA Fouque, M Sabt Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 13 | 2021 |
Exploring widevine for fun and profit G Patat, M Sabt, PA Fouque 2022 IEEE Security and Privacy Workshops (SPW), 277-288, 2022 | 9 | 2022 |
Cryptanalysis of globalplatform secure channel protocols M Sabt, J Traoré Security Standardisation Research: Third International Conference, SSR 2016 …, 2016 | 9 | 2016 |
Method for securing contactless transactions M Sabt, M Alattar, M Achemlal US Patent 11,282,079, 2022 | 8 | 2022 |
Please remember me: security analysis of U2F remember me implementations in the wild G Patat, M Sabt Actes SSTIC 2020, 18ème Symposium sur la sécurité des technologies de l …, 2020 | 5 | 2020 |
WideLeak: How Over-the-Top Platforms Fail in Android G Patat, M Sabt, PA Fouque 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022 | 4 | 2022 |
Towards integrating trusted execution environment into embedded autonomic systems M Sabt, M Achemlal, A Bouabdallah 2015 IEEE International Conference on Autonomic Computing, 165-166, 2015 | 4 | 2015 |
Over-the-internet: efficient remote content management for secure elements in mobile devices M Sabt, M Achemlal, A Bouabdallah 2015 First Conference on Mobile and Secure Services (MOBISECSERV), 1-5, 2015 | 4 | 2015 |
The long and winding path to secure implementation of GlobalPlatform SCP10 DDA Braga, PA Fouque, M Sabt Cryptology ePrint Archive, 2020 | 2 | 2020 |
“These results must be false”: A usability evaluation of constant-time analysis tools M Fourné, DDA Braga, J Jancar, M Sabt, P Schwabe, G Barthe, ... 33th USENIX Security Symposium (USENIX Security 2024), 2024 | 1 | 2024 |
From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake DDA Braga, N Kulatova, M Sabt, PA Fouque, K Bhargavan 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 707-723, 2023 | 1 | 2023 |
Formal Security Analysis of Widevine through the W3C EME Standard S Delaune, J Lallemand, G Patat, F Roudot, M Sabt USENIX Security Symposium, 2024 | | 2024 |