Follow
Saad Islam
Title
Cited by
Cited by
Year
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks.
S Islam, A Moghimi, I Bruhns, M Krebbel, B Gülmezoglu, T Eisenbarth, ...
USENIX Security Symposium, 621-637, 2019
922019
Undermining user privacy on mobile devices using AI
B Gulmezoglu, A Zankl, MC Tol, S Islam, T Eisenbarth, B Sunar
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
282019
QuantumHammer: a practical hybrid attack on the LUOV signature scheme
K Mus, S Islam, B Sunar
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
272020
Signature Correction Attack on Dilithium Signature Scheme
S Islam, K Mus, R Singh, P Schaumont, B Sunar
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 647-663, 2022
212022
Secure end-to-end communication over GSM and PSTN networks
S Islam, F Ajmal, S Ali, J Zahid, A Rashdi
2009 IEEE International Conference on Electro/Information Technology, 323-326, 2009
192009
Don’t Knock! Rowhammer at the Backdoor of DNN Models
MC Tol, S Islam, AJ Adiletta, B Sunar, Z Zhang
19*
On the security of LBlock against the cube attack and side channel cube attack
S Islam, M Afzal, A Rashdi
Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops …, 2013
182013
Developing and implementing encryption algorithm for addressing GSM security issues
S Islam, F Ajmal
2009 International Conference on Emerging Technologies, 358-361, 2009
142009
An end-to-end analysis of emfi on bit-sliced post-quantum implementations
R Singh, S Islam, B Sunar, P Schaumont
arXiv preprint arXiv:2204.06153, 2022
8*2022
Cube attack on Trivium and A5/1 stream ciphers
S Islam, IU Haq
2016 13th International Bhurban Conference on Applied Sciences and …, 2016
82016
Secure end-to-end SMS communication over GSM networks
S Islam, IU Haq, A Saeed
2015 12th International Bhurban Conference on Applied Sciences and …, 2015
52015
Effective normal binary ordering in QAM compared with Gray coded scheme for enhanced voice quality in software defined radios
S Islam, M Ali, U Nasir, F Ajmal, S Ali, A Rashdi
2009 2nd International Conference on Computer, Control and Communication, 1-5, 2009
22009
Software-Induced Fault Attacks on Post-Quantum Signature Schemes
S Islam
Worcester Polytechnic Institute, 2022
2022
Authenticated mode of Trivium
S Islam, IU Haq
2016 13th International Bhurban Conference on Applied Sciences and …, 2016
2016
CUBE ATTACK
S Islam
faculty of Information Security Department Military College of Signals …, 2012
2012
Enhancing software defined radio (SDR) security using variations in gray coded mapping scheme in rectangular QAM
S Islam, M Ali, U Nasir, F Ajmal, S Ali, A Rashdi
2009 2nd International Conference on Computer, Control and Communication, 1-4, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–16