Follow
Saad Islam
Title
Cited by
Cited by
Year
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks.
S Islam, A Moghimi, I Bruhns, M Krebbel, B Gülmezoglu, T Eisenbarth, ...
USENIX Security Symposium, 621-637, 2019
1002019
QuantumHammer: a practical hybrid attack on the LUOV signature scheme
K Mus, S Islam, B Sunar
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
362020
Don’t Knock! Rowhammer at the Backdoor of DNN Models
MC Tol, S Islam, AJ Adiletta, B Sunar, Z Zhang
34*
Undermining user privacy on mobile devices using AI
B Gulmezoglu, A Zankl, MC Tol, S Islam, T Eisenbarth, B Sunar
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
332019
Signature Correction Attack on Dilithium Signature Scheme
S Islam, K Mus, R Singh, P Schaumont, B Sunar
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 647-663, 2022
312022
Secure end-to-end communication over GSM and PSTN networks
S Islam, F Ajmal, S Ali, J Zahid, A Rashdi
2009 IEEE International Conference on Electro/Information Technology, 323-326, 2009
212009
On the security of LBlock against the cube attack and side channel cube attack
S Islam, M Afzal, A Rashdi
Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops …, 2013
182013
Developing and implementing encryption algorithm for addressing GSM security issues
S Islam, F Ajmal
2009 International Conference on Emerging Technologies, 358-361, 2009
142009
An end-to-end analysis of emfi on bit-sliced post-quantum implementations
R Singh, S Islam, B Sunar, P Schaumont
arXiv preprint arXiv:2204.06153, 2022
10*2022
Cube attack on Trivium and A5/1 stream ciphers
S Islam, IU Haq
2016 13th International Bhurban Conference on Applied Sciences and …, 2016
102016
Secure end-to-end SMS communication over GSM networks
S Islam, IU Haq, A Saeed
2015 12th International Bhurban Conference on Applied Sciences and …, 2015
52015
A signature correction attack on the post-quantum scheme dilithium
S Islam, K Mus, R Singh, P Schaumont, B Sunar
Proceedings of the IEEE European Workshop on Security and & Privacy, 2022
32022
Effective normal binary ordering in QAM compared with Gray coded scheme for enhanced voice quality in software defined radios
S Islam, M Ali, U Nasir, F Ajmal, S Ali, A Rashdi
2009 2nd International Conference on Computer, Control and Communication, 1-5, 2009
22009
Software-Induced Fault Attacks on Post-Quantum Signature Schemes
S Islam
Worcester Polytechnic Institute, 2022
2022
Authenticated mode of Trivium
S Islam, IU Haq
2016 13th International Bhurban Conference on Applied Sciences and …, 2016
2016
CUBE ATTACK
S Islam
faculty of Information Security Department Military College of Signals …, 2012
2012
Enhancing software defined radio (SDR) security using variations in gray coded mapping scheme in rectangular QAM
S Islam, M Ali, U Nasir, F Ajmal, S Ali, A Rashdi
2009 2nd International Conference on Computer, Control and Communication, 1-4, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–17