Trusted execution environment: what it is, and what it is not M Sabt, M Achemlal, A Bouabdallah 2015 IEEE Trustcom/BigDataSE/Ispa 1, 57-64, 2015 | 521 | 2015 |
BlindIDS: Market-compliant and privacy-friendly intrusion detection system over encrypted traffic S Canard, A Diop, N Kheir, M Paindavoine, M Sabt Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 56 | 2017 |
Practical implementation of ring-SIS/LWE based signature and IBE P Bert, PA Fouque, A Roux-Langlois, M Sabt Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort …, 2018 | 50 | 2018 |
Breaking into the keystore: A practical forgery attack against Android keystore M Sabt, J Traoré Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 35 | 2016 |
“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks J Jancar, M Fourné, DDA Braga, M Sabt, P Schwabe, G Barthe, ... 2022 IEEE Symposium on Security and Privacy (SP), 632-649, 2022 | 18 | 2022 |
The dual-execution-environment approach: Analysis and comparative evaluation M Sabt, M Achemlal, A Bouabdallah ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015 | 16 | 2015 |
Implementation of lattice trapdoors on modules and applications P Bert, G Eberhart, L Prabel, A Roux-Langlois, M Sabt Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021 …, 2021 | 11 | 2021 |
Cryptanalysis of globalplatform secure channel protocols M Sabt, J Traoré Security Standardisation Research: Third International Conference, SSR 2016 …, 2016 | 10 | 2016 |
Dragonblood is still leaking: Practical cache-based side-channel in the wild D de Almeida Braga, PA Fouque, M Sabt Annual Computer Security Applications Conference, 291-303, 2020 | 9 | 2020 |
Method for securing contactless transactions M Sabt, M Alattar, M Achemlal US Patent 11,282,079, 2022 | 5 | 2022 |
Towards integrating trusted execution environment into embedded autonomic systems M Sabt, M Achemlal, A Bouabdallah 2015 IEEE International Conference on Autonomic Computing, 165-166, 2015 | 4 | 2015 |
Over-the-internet: efficient remote content management for secure elements in mobile devices M Sabt, M Achemlal, A Bouabdallah 2015 First Conference on Mobile and Secure Services (MOBISECSERV), 1-5, 2015 | 4 | 2015 |
PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild D de Almeida Braga, PA Fouque, M Sabt Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 3 | 2021 |
Exploring Widevine for Fun and Profit G Patat, M Sabt, PA Fouque 2022 IEEE Security and Privacy Workshops (SPW), 277-288, 2022 | 2 | 2022 |
Please remember me: security analysis of U2F remember me implementations in the wild G Patat, M Sabt Actes SSTIC 2020, 18ème Symposium sur la sécurité des technologies de l …, 2020 | 2 | 2020 |
WideLeak: How Over-the-Top Platforms Fail in Android G Patat, M Sabt, PA Fouque 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022 | 1 | 2022 |
The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10 DDA Braga, PA Fouque, M Sabt Cryptology ePrint Archive, 2020 | | 2020 |
Outsmarting smartphones: trust based on provable security and hardware primitives in smartphones architectures M Sabt Université de Technologie de Compiègne, 2016 | | 2016 |
Procédé de sécurisation de transactions sans contact M Sabt, M Achemlal, M Alattar | | 2014 |
Method of protecting a mobile terminal against attacks M Sabt, M Achemlal | | 2014 |