Maria Mushtaq

Orcid: 0000-0003-0046-2582

According to our database1, Maria Mushtaq authored at least 24 papers between 2018 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Reducing the Silicon Area Overhead of Counter-Based Rowhammer Mitigations.
IEEE Comput. Archit. Lett., 2024

2023
Here comes SAID: A SOME/IP Attention-based mechanism for Intrusion Detection.
Proceedings of the Fourteenth International Conference on Ubiquitous and Future Networks, 2023

Optimal Functional Splitting, Placement and Routing for Isolation-Aware Network Slicing in NG-RAN.
Proceedings of the 19th International Conference on Network and Service Management, 2023

2022
AVTPnet: Convolutional Autoencoder for AVTP anomaly detection in Automotive Ethernet Networks.
CoRR, 2022

The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection.
Ann. des Télécommunications, 2022

Unsupervised Network Intrusion Detection System for AVTP in Automotive Ethernet Networks.
Proceedings of the 2022 IEEE Intelligent Vehicles Symposium, 2022

CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model.
Proceedings of the 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022

2021
Necklace: An Architecture for Distributed and Robust Service Function Chains With Guarantees.
IEEE Trans. Netw. Serv. Manag., 2021

Implementing Rowhammer Memory Corruption in the gem5 Simulator.
Proceedings of the IEEE International Workshop on Rapid System Prototyping, 2021

OctoMap: Supporting Service Function Chaining via Supervised Learning and Online Contextual Bandit.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

Transit-Guard: An OS-based Defense Mechanism Against Transient Execution Attacks.
Proceedings of the 26th IEEE European Test Symposium, 2021

Diminisher: A Linux Kernel Based Countermeasure for TAA Vulnerability.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

Vulnerability Assessment of the Rowhammer Attack Using Machine Learning and the gem5 Simulator - Work in Progress.
Proceedings of the SAT-CPS@CODASPY 2021, 2021

2020
FLUSH + PREFETCH: A countermeasure against access-driven cache-based side-channel attacks.
J. Syst. Archit., 2020

Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA.
Inf. Syst., 2020

WHISPER: A Tool for Run-Time Detection of Side-Channel Attacks.
IEEE Access, 2020

Meet the Sherlock Holmes' of Side Channel Leakage: A Survey of Cache SCA Detection Techniques.
IEEE Access, 2020

2019
Software-based Detection and Mitigation of Microarchitectural Attacks on Intel's x86 Architecture. (Mise en oeuvre de mécanismes logiciels pour la détection et la prévention des attaques exploitant la micro-architecture des processeurs Intel x86).
PhD thesis, 2019

Sherlock Holmes of Cache Side-Channel Attacks in Intel's x86 Architecture.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Locality-aware task scheduling for homogeneous parallel computing systems.
Computing, 2018

NIGHTs-WATCH: a cache-based side-channel intrusion detector using hardware performance counters.
Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, 2018

Machine Learning For Security: The Case of Side-Channel Attack Detection at Run-time.
Proceedings of the 25th IEEE International Conference on Electronics, Circuits and Systems, 2018

Run-time Detection of Prime + Probe Side-Channel Attack on AES Encryption Algorithm.
Proceedings of the 2018 Global Information Infrastructure and Networking Symposium, 2018


  Loading...