Nahid Farhady Ghalaty

According to our database1, Nahid Farhady Ghalaty authored at least 22 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
EHR-Safe: generating high-fidelity and privacy-preserving synthetic electronic health records.
npj Digit. Medicine, 2023

SAFE-HEALTH: A Secure Framework for Advancing Edge-Based Health 5.0.
Proceedings of the 9th IEEE World Forum on Internet of Things, 2023

2020
Towards the Detection of Malicious URL and Domain Names Using Machine Learning.
Proceedings of the Technological Innovation for Life Improvement, 2020

2019
Editorial: Special Issue on Side-Channel and Fault Analysis of High-Performance Computing Platforms.
Int. J. Parallel Program., 2019

2018
New Opportunities for Compilers in Computer Security.
Proceedings of the Languages and Compilers for Parallel Computing, 2018

A Hierarchical Framework to Detect Targeted Attacks using Deep Neural Network.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Analyzing the Fault Injection Sensitivity of Secure Embedded Software.
ACM Trans. Embed. Comput. Syst., 2017

CAMFAS: A Compiler Approach to Mitigate Fault Attacks via Enhanced SIMDization.
IACR Cryptol. ePrint Arch., 2017

2016
Fault Attacks on Cryptosystems: Novel Threat Models, Countermeasures and Evaluation Metrics.
PhD thesis, 2016

A Cache-Assisted Scratchpad Memory for Multiple-Bit-Error Correction.
IEEE Trans. Very Large Scale Integr. Syst., 2016

Lightweight Fault Attack Resistance in Software Using Intra-Instruction Redundancy.
IACR Cryptol. ePrint Arch., 2016

Analyzing the Efficiency of Biased-Fault Based Attacks.
IEEE Embed. Syst. Lett., 2016

A Configurable and Lightweight Timing Monitor for Fault Attack Detection.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2016

FAME: Fault-attack Aware Microprocessor Extensions for Hardware Fault Detection and Software Fault Response.
Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, 2016

Software Fault Resistance is Futile: Effective Single-Glitch Attacks.
Proceedings of the 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2016

2015
TVVF: Estimating the vulnerability of hardware cryptosystems against timing violation attacks.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015

Improving Fault Attacks on Embedded Software Using RISC Pipeline Characterization.
Proceedings of the 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2015

Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

2014
Differential Fault Intensity Analysis.
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014

Analyzing and eliminating the causes of fault sensitivity analysis.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

2013
Digital fingerprints for low-cost platforms using MEMS sensors.
Proceedings of the Workshop on Embedded Systems Security, 2013

2011
Software-based control flow error detection and correction using branch triplication.
Proceedings of the 17th IEEE International On-Line Testing Symposium (IOLTS 2011), 2011


  Loading...