Mohamed Sabt

According to our database1, Mohamed Sabt authored at least 20 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
"These results must be false": A usability evaluation of constant-time analysis tools.
Proceedings of the 33rd USENIX Security Symposium, 2024

Formal Security Analysis of Widevine through the W3C EME Standard.
Proceedings of the 33rd USENIX Security Symposium, 2024

They're not that hard to mitigate: What Cryptographic Library Developers Think About Timing Attacks.
Proceedings of the Software Engineering 2024, Fachtagung des GI-Fachbereichs Softwaretechnik, Linz, Austria, February 26, 2024

2023
Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME.
Proc. Priv. Enhancing Technol., October, 2023

From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
Exploring Widevine for Fun and Profit.
Proceedings of the 43rd IEEE Security and Privacy, 2022

WideLeak: How Over-the-Top Platforms Fail in Android.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks.
IACR Cryptol. ePrint Arch., 2021

PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild.
IACR Cryptol. ePrint Arch., 2021

Implementation of Lattice Trapdoors on Modules and Applications.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

2020
The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2018
Practical Implementation of Ring-SIS/LWE Based Signature and IBE.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

2017
Cryptanalysis of GlobalPlatform Secure Channel Protocols.
IACR Cryptol. ePrint Arch., 2017

BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Outsmarting smartphones: trust based on provable security and hardware primitives in smartphones architectures. (Confiance basée sur la sécurité prouvée et ancrée aux dispositifs matériels dans les architectures des ordiphones).
PhD thesis, 2016

Breaking Into the KeyStore: A Practical Forgery Attack Against Android KeyStore.
IACR Cryptol. ePrint Arch., 2016

2015
Trusted Execution Environment: What It is, and What It is Not.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Towards Integrating Trusted Execution Environment into Embedded Autonomic Systems.
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015


  Loading...