Follow
Monjur Alam
Monjur Alam
PhD , Computer Science, Georgia Institute of Technology
Verified email at gatech.edu
Title
Cited by
Cited by
Year
HDFI: Hardware-assisted data-flow isolation
C Song, H Moon, M Alam, I Yun, B Lee, T Kim, W Lee, Y Paek
2016 IEEE Symposium on Security and Privacy (SP), 1-17, 2016
1582016
Eddie: Em-based detection of deviations in program execution
A Nazari, N Sehatbakhsh, M Alam, A Zajic, M Prvulovic
Proceedings of the 44th Annual International Symposium on Computer …, 2017
1552017
{One&Done}: A {Single-Decryption}{EM-Based} Attack on {OpenSSL’s}{Constant-Time} Blinded {RSA}
M Alam, HA Khan, M Dey, N Sinha, R Callan, A Zajic, M Prvulovic
27th USENIX Security Symposium (USENIX Security 18), 585-602, 2018
672018
Syndrome: Spectral analysis for anomaly detection on medical iot and embedded devices
N Sehatbakhsh, M Alam, A Nazari, A Zajic, M Prvulovic
2018 IEEE international symposium on hardware oriented security and trust …, 2018
652018
Parallel crypto-devices for GF (p) elliptic curve multiplication resistant against side channel attacks
S Ghosh, M Alam, DR Chowdhury, IS Gupta
Computers & Electrical Engineering 35 (2), 329-338, 2009
552009
REMOTE: Robust external malware detection framework by using electromagnetic signals
N Sehatbakhsh, A Nazari, M Alam, F Werner, Y Zhu, A Zajic, M Prvulovic
IEEE Transactions on Computers 69 (3), 312-326, 2019
462019
Exposing search and advertisement abuse tactics and infrastructure of technical support scammers
B Srinivasan, A Kountouras, N Miramirkhani, M Alam, N Nikiforakis, ...
Proceedings of the 2018 World Wide Web Conference, 319-328, 2018
452018
Detailed tracking of program control flow using analog side-channel signals: a promise for iot malware detection and a threat for many cryptographic implementations
HA Khan, M Alam, A Zajic, M Prvulovic
Cyber Sensing 2018 10630, 23-36, 2018
302018
Effect of glitches against masked AES S-box implementation and countermeasure
M Alam, S Ghosh, MJ Mohan, D Mukhopadhyay, DR Chowdhury, ...
IET Information Security 3 (1), 34-44, 2009
302009
A robust GF (p) parallel arithmetic unit for public key cryptography
S Ghosh, M Alam, IS Gupta, DR Chowdhury
10th Euromicro conference on digital system design architectures, methods …, 2007
272007
An area optimized reconfigurable encryptor for AES-Rijndael
M Alam, S Ray, D Mukhopadhayay, S Ghosh, D RoyChowdhury, ...
Proceedings of the conference on Design, automation and test in Europe, 1116 …, 2007
262007
Single chip encryptor/decryptor core implementation of AES algorithm
M Alam, S Ghosh, DR Chowdhury, I Sengupta
21st International Conference on VLSI Design (VLSID 2008), 693-698, 2008
152008
Nonce@ Once: A single-trace EM side channel attack on several constant-time elliptic curve implementations in mobile platforms
A Monjur, B Yilmaz, F Werner, N Samwel, A Zajic, D Genkin, Y Yarom, ...
IEEE European Symposium on Security and Privacy, 2021
92021
Syndrome: Spectral analysis for anomaly detection on medical iot and embedded devicesexperimental demonstration
N Sehatbakhsh, H Hong, B Lazar, B Johnson-Smith, O Yilmaz, M Alam, ...
Proc. IEEE Int. Symp. Hardware Oriented Secur. Trust, 1-8, 2017
92017
Design of an Intelligent SHA-1 Based Cryptographic System: A CPSO Based Approach.
M Alam, S Ray
Int. J. Netw. Secur. 15 (6), 465-470, 2013
92013
Effect of side channel attacks on RSA embedded devices
S Ghosh, M Alam, DR Chowdhury, IS Gupta
TENCON 2007-2007 IEEE Region 10 Conference, 1-4, 2007
72007
A biomarker ensemble ranking framework for prioritizing depression candidate genes
AS Chowdhury, MM Alam, Y Zhang
2015 IEEE Conference on Computational Intelligence in Bioinformatics and …, 2015
62015
Leveraging electromagnetic emanations for iot security
N Sehatbakhsh&, R Callan, M Alam&, M Prvulovic&, A Zajic
Hardware Demo at IEEE International Symposium on Hardware Oriented Security …, 2017
52017
Preventing the side-channel leakage of masked AES S-box
S Ghosh, M Alam, K Kumar, D Mukhopadhyay, DR Chowdhury
15th International Conference on Advanced Computing and Communications …, 2007
52007
RAPPER: Ransomware prevention via performance counters. arXiv 2020
M Alam, S Sinha, S Bhattacharya, S Dutta, D Mukhopadhyay, ...
arXiv preprint arXiv:2004.01712, 0
5
The system can't perform the operation now. Try again later.
Articles 1–20