Monjur Alam
Monjur Alam
PhD , Computer Science, Georgia Institute of Technology
Email verificata su gatech.edu
Titolo
Citata da
Citata da
Anno
HDFI: Hardware-assisted data-flow isolation
C Song, H Moon, M Alam, I Yun, B Lee, T Kim, W Lee, Y Paek
2016 IEEE Symposium on Security and Privacy (SP), 1-17, 2016
742016
Eddie: Em-based detection of deviations in program execution
A Nazari, N Sehatbakhsh, M Alam, A Zajic, M Prvulovic
Proceedings of the 44th Annual International Symposium on Computer …, 2017
692017
Parallel crypto-devices for GF (p) elliptic curve multiplication resistant against side channel attacks
S Ghosh, M Alam, DR Chowdhury, IS Gupta
Computers & Electrical Engineering 35 (2), 329-338, 2009
452009
One&Done: A Single-Decryption EM-Based Attack on OpenSSL’s Constant-Time Blinded {RSA}
M Alam, HA Khan, M Dey, N Sinha, R Callan, A Zajic, M Prvulovic
27th {USENIX} Security Symposium ({USENIX} Security 18), 585-602, 2018
282018
An area optimized reconfigurable encryptor for AES-Rijndael
M Alam, S Ray, D Mukhopadhayay, S Ghosh, D RoyChowdhury, ...
Proceedings of the conference on Design, automation and test in Europe, 1116 …, 2007
232007
Effect of glitches against masked AES S-box implementation and countermeasure
M Alam, S Ghosh, MJ Mohan, D Mukhopadhyay, DR Chowdhury, ...
IET Information Security 3 (1), 34-44, 2009
222009
A robust GF (p) parallel arithmetic unit for public key cryptography
S Ghosh, M Alam, IS Gupta, DR Chowdhury
10th Euromicro Conference on Digital System Design Architectures, Methods …, 2007
222007
Syndrome: Spectral analysis for anomaly detection on medical iot and embedded devices
N Sehatbakhsh, M Alam, A Nazari, A Zajic, M Prvulovic
2018 IEEE international symposium on hardware oriented security and trust …, 2018
212018
Exposing search and advertisement abuse tactics and infrastructure of technical support scammers
B Srinivasan, A Kountouras, N Miramirkhani, M Alam, N Nikiforakis, ...
Proceedings of the 2018 World Wide Web Conference, 319-328, 2018
172018
Detailed tracking of program control flow using analog side-channel signals: a promise for iot malware detection and a threat for many cryptographic implementations
HA Khan, M Alam, A Zajic, M Prvulovic
Cyber Sensing 2018 10630, 1063005, 2018
132018
Single chip encryptor/decryptor core implementation of AES algorithm
M Alam, S Ghosh, DR Chowdhury, I Sengupta
21st International Conference on VLSI Design (VLSID 2008), 693-698, 2008
132008
REMOTE: Robust external malware detection framework by using electromagnetic signals
N Sehatbakhsh, A Nazari, M Alam, F Werner, Y Zhu, A Zajic, M Prvulovic
IEEE Transactions on Computers 69 (3), 312-326, 2019
112019
Design of an Intelligent SHA-1 Based Cryptographic System: A CPSO Based Approach.
M Alam, S Ray
IJ Network Security 15 (6), 465-470, 2013
102013
Preventing the side-channel leakage of masked AES S-box
S Ghosh, M Alam, K Kumar, D Mukhopadhyay, DR Chowdhury
15th International Conference on Advanced Computing and Communications …, 2007
52007
Effect of side channel attacks on RSA embedded devices
S Ghosh, M Alam, DR Chowdhury, IS Gupta
TENCON 2007-2007 IEEE Region 10 Conference, 1-4, 2007
52007
Syndrome: Spectral analysis for anomaly detection on medical iot and embedded devicesexperimental demonstration
N Sehatbakhsh, H Hong, B Lazar, B Johnson-Smith, O Yilmaz, M Alam, ...
Hardware Demo at IEEE International Symposium on Hardware Oriented Security …, 2017
42017
First-order DPA Vulnerability of Rijndael: Security and Area-delay Optimization Trade-off.
M Alam, S Ghosh, DR Chowdhury, I Sengupta
IJ Network Security 15 (3), 219-230, 2013
42013
Leveraging electromagnetic emanations for iot security
N Sehatbakhsh, R Callan, M Alam, M Prvulovic, A Zajic
Hardware Demo at IEEE International Symposium on Hardware Oriented Security …, 2017
32017
A rewrite rule based model of bangla morphophonological change
M Choudhury, M Alam, S Sarkar, A Basu
Proc. of ICCPB, 64-71, 2006
32006
SBBOX: A TAMPER-RESISTANT DIGITAL ARCHIVING SYSTEM
M Alam, ZC Lee, C Nicopoulos, KH Lee, J Kim, J Leee
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5 (3 …, 2016
22016
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20