SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks. S Islam, A Moghimi, I Bruhns, M Krebbel, B Gülmezoglu, T Eisenbarth, ... USENIX Security Symposium, 621-637, 2019 | 96 | 2019 |
Undermining user privacy on mobile devices using AI B Gulmezoglu, A Zankl, MC Tol, S Islam, T Eisenbarth, B Sunar Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 31 | 2019 |
QuantumHammer: a practical hybrid attack on the LUOV signature scheme K Mus, S Islam, B Sunar Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 29 | 2020 |
Signature Correction Attack on Dilithium Signature Scheme S Islam, K Mus, R Singh, P Schaumont, B Sunar 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 647-663, 2022 | 24 | 2022 |
Don’t Knock! Rowhammer at the Backdoor of DNN Models MC Tol, S Islam, AJ Adiletta, B Sunar, Z Zhang | 24* | |
Secure end-to-end communication over GSM and PSTN networks S Islam, F Ajmal, S Ali, J Zahid, A Rashdi 2009 IEEE International Conference on Electro/Information Technology, 323-326, 2009 | 20 | 2009 |
On the security of LBlock against the cube attack and side channel cube attack S Islam, M Afzal, A Rashdi Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops …, 2013 | 18 | 2013 |
Developing and implementing encryption algorithm for addressing GSM security issues S Islam, F Ajmal 2009 International Conference on Emerging Technologies, 358-361, 2009 | 14 | 2009 |
An end-to-end analysis of emfi on bit-sliced post-quantum implementations R Singh, S Islam, B Sunar, P Schaumont arXiv preprint arXiv:2204.06153, 2022 | 8* | 2022 |
Cube attack on Trivium and A5/1 stream ciphers S Islam, IU Haq 2016 13th International Bhurban Conference on Applied Sciences and …, 2016 | 8 | 2016 |
Secure end-to-end SMS communication over GSM networks S Islam, IU Haq, A Saeed 2015 12th International Bhurban Conference on Applied Sciences and …, 2015 | 5 | 2015 |
Effective normal binary ordering in QAM compared with Gray coded scheme for enhanced voice quality in software defined radios S Islam, M Ali, U Nasir, F Ajmal, S Ali, A Rashdi 2009 2nd International Conference on Computer, Control and Communication, 1-5, 2009 | 2 | 2009 |
Software-Induced Fault Attacks on Post-Quantum Signature Schemes S Islam Worcester Polytechnic Institute, 2022 | | 2022 |
Authenticated mode of Trivium S Islam, IU Haq 2016 13th International Bhurban Conference on Applied Sciences and …, 2016 | | 2016 |
CUBE ATTACK S Islam faculty of Information Security Department Military College of Signals …, 2012 | | 2012 |
Enhancing software defined radio (SDR) security using variations in gray coded mapping scheme in rectangular QAM S Islam, M Ali, U Nasir, F Ajmal, S Ali, A Rashdi 2009 2nd International Conference on Computer, Control and Communication, 1-4, 2009 | | 2009 |