Personal profile
Fingerprint
- 1 Similar Profiles
Collaborations and top research areas from the last five years
-
Comic character recognition using graph embedding in graph representations
Kajla, N. I., Saad Missen, M. M., Pasha, M., Coustaty, M., Luqman, M. M., Belbachir, F. & Mushtaq, M., 1 Jan 2026, (Accepted/In press) In: International Journal on Document Analysis and Recognition.Research output: Contribution to journal › Article › peer-review
-
Assessing Security RISC: Analyzing Flush+Fault Attack on RISC-V Using gem5 Simulator
Khan, M., Mushtaq, M., Pacalet, R. & Apvrille, L., 1 Jan 2025, Proceedings of the 22nd International Conference on Security and Cryptography, SECRYPT 2025. De Capitani Di Vimercati, S. & Samarati, P. (eds.). Science and Technology Publications, Lda, p. 607-612 6 p. (Proceedings of the International Conference on Security and Cryptography; vol. 1).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
Evaluating KASLR Break on RISC-V Using Gem5: Microarchitectural Side-Channel Analysis of Page-Table Walks
Khan, M., Mushtaq, M., Pacalet, R. & Apvrille, L., 1 Jan 2025, Cybersecurity - 9th European Interdisciplinary Cybersecurity Conference, EICC 2025, Proceedings. Praça, I., Bernardi, S. & Inácio, P. R. M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 229-235 7 p. (Communications in Computer and Information Science; vol. 2500 CCIS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
Evict+Spec+Time on RISC-V: Gem5-Based Implementation and Microarchitectural Analysis
Khan, M., Mushtaq, M., Pacalet, R. & Apvrille, L., 1 Jan 2025, Proceedings - 2025 28th Euromicro Conference on Digital System Design, DSD 2025. Casini, D. & Cazorla, F. J. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 260-267 8 p. (Proceedings - 2025 28th Euromicro Conference on Digital System Design, DSD 2025).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
Side-Channel Attack Detection Using gem5 and Machine Learning: A Case Study on Fault-Based Attacks in RISC-V
Khan, M., Mushtaq, M., Pacalet, R. & Apvrille, L., 1 Jan 2025, Proceedings - 2025 IEEE 31st International Symposium on On-Line Testing and Robust System Design, IOLTS 2025. Institute of Electrical and Electronics Engineers Inc., (Proceedings - 2025 IEEE 31st International Symposium on On-Line Testing and Robust System Design, IOLTS 2025).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
SpectreShield: Design and Analysis of Spectre Countermeasures on RISC-V Using gem5
Khan, M., Mushtaq, M., Pacalet, R. & Apvrille, L., 1 Jan 2025, Proceedings of the 2025 IEEE International Conference on Cyber Security and Resilience, CSR 2025. Institute of Electrical and Electronics Engineers Inc., p. 1008-1015 8 p. (Proceedings of the 2025 IEEE International Conference on Cyber Security and Resilience, CSR 2025).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
Decoding Attack Behaviors by Analyzing Patterns in Instruction-Based Attacks using gem5
Awais, M., Mushtaq, M., Naviner, L., Bruguier, F., Yahya, J. H. & Benoit, P., 1 Jan 2024, Proceedings of the 2024 35th International Workshop on Rapid System Prototyping: Shortening the Path from Specification to Prototype, RSP 2024. IEEE Computer Society, p. 1-6 6 p. (Proceedings of the International Workshop on Rapid System Prototyping).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
Reducing the Silicon Area Overhead of Counter-Based Rowhammer Mitigations
France, L., Bruguier, F., Novo, D., Mushtaq, M. & Benoit, P., 1 Jan 2024, In: IEEE Computer Architecture Letters. 23, 1, p. 61-64 4 p., 10302356.Research output: Contribution to journal › Article › peer-review
Open Access -
Here comes SAID: A SOME/IP Attention-based mechanism for Intrusion Detection
Alkhatib, N., Mushtaq, M., Ghauch, H. & Danger, J. L., 1 Jan 2023, ICUFN 2023 - 14th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 462-467 6 p. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2023-July).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model
Alkhatib, N., Mushtaq, M., Ghauch, H. & Danger, J. L., 1 Jan 2022, 2022 IEEE/ACS 19th International Conference on Computer Systems and Applications, AICCSA 2022 - Proceedings. IEEE Computer Society, (Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA; vol. 2022-December).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review