​
Login / Signup
Monjur Alam
Publication Activity (10 Years)
Years Active: 2007-2021
Publications (10 Years): 8
Top Topics
Buffer Overflow
Malware Detection
Mobile Platform
Technical Support
Top Venues
Int. J. Netw. Secur.
HOST
EuroS&P
IEEE Symposium on Security and Privacy
</>
Publications
</>
Monjur Alam
,
Baki Berkay Yilmaz
,
Frank Werner
,
Niels Samwel
,
Alenka G. Zajic
,
Daniel Genkin
,
Yuval Yarom
,
Milos Prvulovic
Nonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms.
EuroS&P
(2021)
Nader Sehatbakhsh
,
Alireza Nazari
,
Monjur Alam
,
Frank Werner
,
Yuanda Zhu
,
Alenka G. Zajic
,
Milos Prvulovic
REMOTE: Robust External Malware Detection Framework by Using Electromagnetic Signals.
IEEE Trans. Computers
69 (3) (2020)
Nader Sehatbakhsh
,
Monjur Alam
,
Alireza Nazari
,
Alenka G. Zajic
,
Milos Prvulovic
Syndrome: Spectral analysis for anomaly detection on medical IoT and embedded devices.
HOST
(2018)
Bharat Srinivasan
,
Athanasios Kountouras
,
Najmeh Miramirkhani
,
Monjur Alam
,
Nick Nikiforakis
,
Manos Antonakakis
,
Mustaque Ahamad
Exposing Search and Advertisement Abuse Tactics and Infrastructure of Technical Support Scammers.
WWW
(2018)
Monjur Alam
,
Haider Adnan Khan
,
Moumita Dey
,
Nishith Sinha
,
Robert Locke Callan
,
Alenka G. Zajic
,
Milos Prvulovic
One&Done: A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.
USENIX Security Symposium
(2018)
Alireza Nazari
,
Nader Sehatbakhsh
,
Monjur Alam
,
Alenka G. Zajic
,
Milos Prvulovic
EDDIE: EM-Based Detection of Deviations in Program Execution.
ISCA
(2017)
Bharat Srinivasan
,
Athanasios Kountouras
,
Najmeh Miramirkhani
,
Monjur Alam
,
Nick Nikiforakis
,
Manos Antonakakis
,
Mustaque Ahamad
By Hook or by Crook: Exposing the Diverse Abuse Tactics of Technical Support Scammers.
CoRR
(2017)
Chengyu Song
,
Hyungon Moon
,
Monjur Alam
,
Insu Yun
,
Byoungyoung Lee
,
Taesoo Kim
,
Wenke Lee
,
Yunheung Paek
HDFI: Hardware-Assisted Data-Flow Isolation.
IEEE Symposium on Security and Privacy
(2016)
Monjur Alam
,
Santosh Ghosh
,
Dipanwita Roy Chowdhury
,
Indranil Sengupta
First-order DPA Vulnerability of Rijndael: Security and Area-delay Optimization Trade-off.
Int. J. Netw. Secur.
15 (3) (2013)
Monjur Alam
,
Sonai Ray
Design of an Intelligent SHA-1 Based Cryptographic System: A CPSO Based Approach.
Int. J. Netw. Secur.
15 (6) (2013)
Sonai Ray
,
Monjur Alam
An Adaptive Hebbian Learning Based Neural Network Scheme to Solve Discrete Logarithm Problem.
IICAI
(2011)
Santosh Ghosh
,
Monjur Alam
,
Dipanwita Roy Chowdhury
,
Indranil Sengupta
Parallel crypto-devices for GF(p) elliptic curve multiplication resistant against side channel attacks.
Comput. Electr. Eng.
35 (2) (2009)
Monjur Alam
,
Santosh Ghosh
,
M. J. Mohan
,
Debdeep Mukhopadhyay
,
Dipanwita Roy Chowdhury
,
Indranil Sengupta
Effect of glitches against masked AES S-box implementation and countermeasure.
IET Inf. Secur.
3 (1) (2009)
Santosh Ghosh
,
Monjur Alam
,
Dipanwita Roy Chowdhury
,
Indranil Sengupta
A GF(p) elliptic curve group operator resistant against side channel attacks.
ACM Great Lakes Symposium on VLSI
(2008)
Monjur Alam
,
Santosh Ghosh
,
Dipanwita Roy Chowdhury
,
Indranil Sengupta
Single Chip Encryptor/Decryptor Core Implementation of AES Algorithm.
VLSI Design
(2008)
Monjur Alam
,
Sonai Ray
,
Debdeep Mukhopadhyay
,
Santosh Ghosh
,
Dipanwita Roy Chowdhury
,
Indranil Sengupta
An area optimized reconfigurable encryptor for AES-Rijndael.
DATE
(2007)
Santosh Ghosh
,
Monjur Alam
,
Indranil Sengupta
,
Dipanwita Roy Chowdhury
A Robust GF(p) Parallel Arithmetic Unit for Public Key Cryptography.
DSD
(2007)