Παρακολούθηση
Mohamed Sabt
Mohamed Sabt
Univ Rennes, CNRS, IRISA
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα irisa.fr - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Trusted execution environment: what it is, and what it is not
M Sabt, M Achemlal, A Bouabdallah
2015 IEEE Trustcom/BigDataSE/ISPA 1, 57-64, 2015
3632015
BlindIDS: Market-compliant and privacy-friendly intrusion detection system over encrypted traffic
S Canard, A Diop, N Kheir, M Paindavoine, M Sabt
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
472017
Practical implementation of ring-SIS/LWE based signature and IBE
P Bert, PA Fouque, A Roux-Langlois, M Sabt
International Conference on Post-Quantum Cryptography, 271-291, 2018
362018
Breaking into the keystore: A practical forgery attack against Android keystore
M Sabt, J Traoré
European Symposium on Research in Computer Security, 531-548, 2016
292016
The dual-execution-environment approach: Analysis and comparative evaluation
M Sabt, M Achemlal, A Bouabdallah
IFIP International Information Security and Privacy Conference, 557-570, 2015
152015
Trusted Execution Environment: What It is, and What It is Not. In 2015 IEEE Trustcom/BigDataSE/ISPA, Vol. 1. 57–64
M Sabt, M Achemlal, A Bouabdallah
142015
Cryptanalysis of globalplatform secure channel protocols
M Sabt, J Traoré
International Conference on Research in Security Standardisation, 62-91, 2016
92016
Dragonblood is still leaking: Practical cache-based side-channel in the wild
D de Almeida Braga, PA Fouque, M Sabt
Annual Computer Security Applications Conference, 291-303, 2020
72020
“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks
J Jancar, M Fourné, DDA Braga, M Sabt, P Schwabe, G Barthe, ...
2022 IEEE Symposium on Security and Privacy (SP), 632-649, 2022
52022
Implementation of lattice trapdoors on modules and applications
P Bert, G Eberhart, L Prabel, A Roux-Langlois, M Sabt
International Conference on Post-Quantum Cryptography, 195-214, 2021
42021
PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild
D de Almeida Braga, PA Fouque, M Sabt
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
32021
Over-the-internet: efficient remote content management for secure elements in mobile devices
M Sabt, M Achemlal, A Bouabdallah
2015 First Conference on Mobile and Secure Services (MOBISECSERV), 1-5, 2015
32015
Please remember me: security analysis of U2F remember me implementations in the wild
G Patat, M Sabt
Actes SSTIC 2020, 18ème Symposium sur la sécurité des technologies de l …, 2020
22020
Towards integrating trusted execution environment into embedded autonomic systems
M Sabt, M Achemlal, A Bouabdallah
2015 IEEE International Conference on Autonomic Computing, 165-166, 2015
22015
WideLeak: How Over-the-Top Platforms Fail in Android
G Patat, M Sabt, PA Fouque
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022
2022
Exploring Widevine for Fun and Profit
G Patat, M Sabt, PA Fouque
arXiv preprint arXiv:2204.09298, 2022
2022
Method for securing contactless transactions
M Sabt, M Alattar, M Achemlal
US Patent 11,282,079, 2022
2022
The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10
DDA Braga, PA Fouque, M Sabt
Cryptology ePrint Archive, 2020
2020
Practical Implementation of Ring-SIS/LWE Based Signature and IBE
M Sabt
Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort …, 2018
2018
Outsmarting smartphones: trust based on provable security and hardware primitives in smartphones architectures
M Sabt
Compiègne, 2016
2016
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20