Seguir
Nahid Farhady Ghalaty
Nahid Farhady Ghalaty
Security ML Engineer
Dirección de correo verificada de vt.edu - Página principal
Título
Citado por
Citado por
Año
Differential fault intensity analysis
NF Ghalaty, B Yuce, M Taha, P Schaumont
2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 49-58, 2014
1552014
Software fault resistance is futile: Effective single-glitch attacks
B Yuce, NF Ghalaty, H Santapuri, C Deshpande, C Patrick, P Schaumont
2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 47-58, 2016
762016
Lightweight fault attack resistance in software using intra-instruction redundancy
C Patrick, B Yuce, NF Ghalaty, P Schaumont
Selected Areas in Cryptography–SAC 2016: 23rd International Conference, St …, 2017
562017
Detection of adversary lateral movement in multi-domain IIOT environments
A Hassanzadeh, A Benameur, RL Burkett, A Krishak, CA Chen, ...
US Patent 10,812,499, 2020
502020
Digital fingerprints for low-cost platforms using MEMS sensors
A Aysu, NF Ghalaty, Z Franklin, MP Yali, P Schaumont
Proceedings of the Workshop on Embedded Systems Security, 1-6, 2013
492013
Differential fault intensity analysis on PRESENT and LED block ciphers
NF Ghalaty, B Yuce, P Schaumont
Constructive Side-Channel Analysis and Secure Design: 6th International …, 2015
462015
FAME: Fault-attack aware microprocessor extensions for hardware fault detection and software fault response
B Yuce, NF Ghalaty, C Deshpande, C Patrick, L Nazhandali, ...
Proceedings of the Hardware and Architectural Support for Security and …, 2016
362016
TVVF: Estimating the vulnerability of hardware cryptosystems against timing violation attacks
B Yuce, NF Ghalaty, P Schaumont
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
362015
Analyzing the efficiency of biased-fault based attacks
NF Ghalaty, B Yuce, P Schaumont
IEEE Embedded Systems Letters 8 (2), 33-36, 2016
332016
Improving fault attacks on embedded software using RISC pipeline characterization
B Yuce, NF Ghalaty, P Schaumont
2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 97-108, 2015
332015
Analyzing and eliminating the causes of fault sensitivity analysis
NF Ghalaty, A Aysu, P Schaumont
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014
252014
Email security platform
E Devlin, A Cruz, NF Ghalaty, V Pham
US Patent 11,438,370, 2022
212022
CAMFAS: A compiler approach to mitigate fault attacks via enhanced SIMDization
Z Chen, J Shen, A Nicolau, A Veidenbaum, NF Ghalaty, R Cammarota
2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 57-64, 2017
202017
A configurable and lightweight timing monitor for fault attack detection
C Deshpande, B Yuce, NF Ghalaty, D Ganta, P Schaumont, L Nazhandali
2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 461-466, 2016
172016
EHR-Safe: generating high-fidelity and privacy-preserving synthetic electronic health records
J Yoon, M Mizrahi, NF Ghalaty, T Jarvinen, AS Ravi, P Brune, F Kong, ...
NPJ Digital Medicine 6 (1), 141, 2023
142023
Microprocessor fault detection and response system
B Yuce, NF Ghalaty, PR Schaumont
US Patent 10,452,493, 2019
122019
Analyzing the fault injection sensitivity of secure embedded software
B Yuce, NF Ghalaty, C Deshpande, H Santapuri, C Patrick, L Nazhandali, ...
ACM Transactions on Embedded Computing Systems (TECS) 16 (4), 1-25, 2017
112017
A Systematic Approach to Fault Attack Resistant Design
NF Ghalaty, B Yuce, P Schaumont
Fundamentals of IP and SoC Security, 223-245, 2017
102017
Software-based control flow error detection and correction using branch triplication
NF Ghalaty, M Fazeli, HI Rad, SG Miremadi
2011 IEEE 17th International On-Line Testing Symposium, 214-217, 2011
92011
A cache-assisted scratchpad memory for multiple-bit-error correction
H Farbeh, NS Mirzadeh, NF Ghalaty, SG Miremadi, M Fazeli, H Asadi
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 24 (11 …, 2016
82016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20