S
Sohaib ul Hassan
Researcher at Tampere University of Technology
Publications - 10
Citations - 226
Sohaib ul Hassan is an academic researcher from Tampere University of Technology. The author has contributed to research in topics: Side channel attack & Elliptic Curve Digital Signature Algorithm. The author has an hindex of 6, co-authored 10 publications receiving 164 citations.
Papers
More filters
Proceedings ArticleDOI
Port Contention for Fun and Profit
Alejandro Cabrera Aldaya,Billy Bob Brumley,Sohaib ul Hassan,Cesar Pereida García,Nicola Tuveri +4 more
TL;DR: This work targets ports to stacks of execution units to create a high-resolution timing side-channel due to port contention, inherently stealthy since it does not depend on the memory subsystem like other cache or TLB based attacks.
Posted Content
Port Contention for Fun and Profit.
Alejandro Cabrera Aldaya,Billy Bob Brumley,Sohaib ul Hassan,Cesar Pereida García,Nicola Tuveri +4 more
TL;DR: In this paper, the authors explore SMT execution engine sharing as a side-channel leakage source, targeting ports to stacks of execution units to create a high-resolution timing sidechannel due to port contention.
Proceedings ArticleDOI
Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study
TL;DR: Li et al. as mentioned in this paper performed a security review of SM2, uncovering various deficiencies ranging from traditional software quality issues to side-channel risks, and proposed, implement, and empirically evaluate countermeasures.
Proceedings Article
Certified Side Channels.
Cesar Pereida García,Sohaib ul Hassan,Nicola Tuveri,Iaroslav Gridin,Alejandro Cabrera Aldaya,Billy Bob Brumley +5 more
TL;DR: It is demonstrated that the format in which private keys are persisted impacts Side Channel Analysis (SCA) security, and designed and implemented key recovery attacks utilizing signals ranging from electromagnetic (EM) emanations, to granular microarchitecture cache timings, to coarse traditional wall clock timings.
Posted Content
Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study.
TL;DR: A security review of public key cryptography suite SM2 is performed, uncovering various deficiencies ranging from traditional software quality issues to side-channel risks, and proposes, implement, and empirically evaluate countermeasures.