Targeted deanonymization via the cache side channel: Attacks and defenses M Zaheri, Y Oren, R Curtmola 31st USENIX Security Symposium (USENIX Security 22), 1505-1523, 2022 | 6 | 2022 |
SMT-Based Cube Attack on Round-Reduced SIMECK32/64 M Zaheri, B Sadeghiyan IET Information Security 14 (5), 604-611, 2020 | 4 | 2020 |
Leakuidator: Leaky Resource Attacks and Countermeasures M Zaheri, R Curtmola Security and Privacy in Communication Networks: 17th EAI International …, 2021 | 2 | 2021 |
Preventing Reflective DLL Injection on UWP Apps M Zaheri, S Niksefat, B Sadeghiyan OIC-CERT Journal of Cyber Security 1 (1), 41-52, 2018 | 2 | 2018 |
SMT-Based Cube Attack on SIMECK32/64 M Zaheri, B Sadeghiyan Cryptology ePrint Archive, 2018 | 2 | 2018 |
Comparing Resistance Against Cube-Like Attacks M Zaheri, B Sadeghiyan 24th Iranian Conference on Electrical Engineering (ICEE), 2016 | 2 | 2016 |