Trusted execution environment: What it is, and what it is not M Sabt, M Achemlal, A Bouabdallah 2015 IEEE Trustcom/BigDataSE/Ispa 1, 57-64, 2015 | 889 | 2015 |
BlindIDS: Market-compliant and privacy-friendly intrusion detection system over encrypted traffic S Canard, A Diop, N Kheir, M Paindavoine, M Sabt Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 85 | 2017 |
“They’re not that hard to mitigate”: What cryptographic library developers think about timing attacks J Jancar, M Fourné, DDA Braga, M Sabt, P Schwabe, G Barthe, ... 2022 IEEE Symposium on Security and Privacy (SP), 632-649, 2022 | 73 | 2022 |
Practical implementation of ring-SIS/LWE based signature and IBE P Bert, PA Fouque, A Roux-Langlois, M Sabt Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort …, 2018 | 71 | 2018 |
Breaking into the keystore: A practical forgery attack against Android keystore M Sabt, J Traoré Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 38 | 2016 |
Implementation of lattice trapdoors on modules and applications P Bert, G Eberhart, L Prabel, A Roux-Langlois, M Sabt Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021 …, 2021 | 37 | 2021 |
The dual-execution-environment approach: Analysis and comparative evaluation M Sabt, M Achemlal, A Bouabdallah ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015 | 22 | 2015 |
Dragonblood is still leaking: Practical cache-based side-channel in the wild D de Almeida Braga, PA Fouque, M Sabt Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 19 | 2020 |
Exploring widevine for fun and profit G Patat, M Sabt, PA Fouque 2022 IEEE Security and Privacy Workshops (SPW), 277-288, 2022 | 18 | 2022 |
PARASITE: Password recovery attack against SRP implementations in the wild D de Almeida Braga, PA Fouque, M Sabt Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 18 | 2021 |
Cryptanalysis of globalplatform secure channel protocols M Sabt, J Traoré Security Standardisation Research: Third International Conference, SSR 2016 …, 2016 | 10 | 2016 |
Method for securing contactless transactions M Sabt, M Alattar, M Achemlal US Patent 11,282,079, 2022 | 9 | 2022 |
WideLeak: how over-the-top platforms fail in Android G Patat, M Sabt, PA Fouque 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022 | 6 | 2022 |
Please remember me: security analysis of U2F remember me implementations in the wild G Patat, M Sabt Actes SSTIC 2020, 18ème Symposium sur la sécurité des technologies de l …, 2020 | 5 | 2020 |
Towards integrating trusted execution environment into embedded autonomic systems M Sabt, M Achemlal, A Bouabdallah 2015 IEEE International Conference on Autonomic Computing, 165-166, 2015 | 4 | 2015 |
Over-the-internet: efficient remote content management for secure elements in mobile devices M Sabt, M Achemlal, A Bouabdallah 2015 First Conference on Mobile and Secure Services (MOBISECSERV), 1-5, 2015 | 4 | 2015 |
From dragondoom to dragonstar: Side-channel attacks and formally verified implementation of WPA3 dragonfly handshake DDA Braga, N Kulatova, M Sabt, PA Fouque, K Bhargavan 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 707-723, 2023 | 3 | 2023 |
" These results must be false": A usability evaluation of constant-time analysis tools M Fourné, DDA Braga, J Jancar, M Sabt, P Schwabe, G Barthe, ... 33rd USENIX Security Symposium (USENIX Security 24), 6705-6722, 2024 | 2 | 2024 |
Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis) Implementations of Widevine EME G Patat, M Sabt, PA Fouque arXiv preprint arXiv:2308.05416, 2023 | 2 | 2023 |
The long and winding path to secure implementation of GlobalPlatform SCP10 DDA Braga, PA Fouque, M Sabt IACR Transactions on Cryptographic Hardware and Embedded Systems, 196-218, 2020 | 2 | 2020 |