Mohamed Sabt
According to our database1,
Mohamed Sabt
authored at least 20 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
"These results must be false": A usability evaluation of constant-time analysis tools.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
They're not that hard to mitigate: What Cryptographic Library Developers Think About Timing Attacks.
Proceedings of the Software Engineering 2024, Fachtagung des GI-Fachbereichs Softwaretechnik, Linz, Austria, February 26, 2024
2023
Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME.
Proc. Priv. Enhancing Technol., October, 2023
From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
2022
Proceedings of the 43rd IEEE Security and Privacy, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
2021
âTheyâre not that hard to mitigateâ: What Cryptographic Library Developers Think About Timing Attacks.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021
2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2018
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018
2017
IACR Cryptol. ePrint Arch., 2017
BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Outsmarting smartphones: trust based on provable security and hardware primitives in smartphones architectures. (Confiance basée sur la sécurité prouvée et ancrée aux dispositifs matériels dans les architectures des ordiphones).
PhD thesis, 2016
IACR Cryptol. ePrint Arch., 2016
2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015