Monjur Alam
Monjur Alam
PhD , Computer Science, Georgia Institute of Technology
Verified email at
Cited by
Cited by
Eddie: Em-based detection of deviations in program execution
A Nazari, N Sehatbakhsh, M Alam, A Zajic, M Prvulovic
Proceedings of the 44th Annual International Symposium on Computer …, 2017
HDFI: Hardware-assisted data-flow isolation
C Song, H Moon, M Alam, I Yun, B Lee, T Kim, W Lee, Y Paek
2016 IEEE Symposium on Security and Privacy (SP), 1-17, 2016
Parallel crypto-devices for GF (p) elliptic curve multiplication resistant against side channel attacks
S Ghosh, M Alam, DR Chowdhury, IS Gupta
Computers & Electrical Engineering 35 (2), 329-338, 2009
One&Done: A Single-Decryption EM-Based Attack on OpenSSL’s Constant-Time Blinded {RSA}
M Alam, HA Khan, M Dey, N Sinha, R Callan, A Zajic, M Prvulovic
27th {USENIX} Security Symposium ({USENIX} Security 18), 585-602, 2018
Syndrome: Spectral analysis for anomaly detection on medical iot and embedded devices
N Sehatbakhsh, M Alam, A Nazari, A Zajic, M Prvulovic
2018 IEEE international symposium on hardware oriented security and trust …, 2018
A robust GF (p) parallel arithmetic unit for public key cryptography
S Ghosh, M Alam, IS Gupta, DR Chowdhury
10th Euromicro Conference on Digital System Design Architectures, Methods …, 2007
An area optimized reconfigurable encryptor for AES-Rijndael
M Alam, S Ray, D Mukhopadhayay, S Ghosh, D RoyChowdhury, ...
Proceedings of the conference on Design, automation and test in Europe, 1116 …, 2007
Effect of glitches against masked AES S-box implementation and countermeasure
M Alam, S Ghosh, MJ Mohan, D Mukhopadhyay, DR Chowdhury, ...
IET Information Security 3 (1), 34-44, 2009
Exposing search and advertisement abuse tactics and infrastructure of technical support scammers
B Srinivasan, A Kountouras, N Miramirkhani, M Alam, N Nikiforakis, ...
Proceedings of the 2018 World Wide Web Conference, 319-328, 2018
Single chip encryptor/decryptor core implementation of AES algorithm
M Alam, S Ghosh, DR Chowdhury, I Sengupta
21st International Conference on VLSI Design (VLSID 2008), 693-698, 2008
Detailed tracking of program control flow using analog side-channel signals: a promise for iot malware detection and a threat for many cryptographic implementations
HA Khan, M Alam, A Zajic, M Prvulovic
Cyber Sensing 2018 10630, 1063005, 2018
REMOTE: Robust external malware detection framework by using electromagnetic signals
N Sehatbakhsh, A Nazari, M Alam, F Werner, Y Zhu, A Zajic, M Prvulovic
IEEE Transactions on Computers 69 (3), 312-326, 2019
Design of an Intelligent SHA-1 Based Cryptographic System: A CPSO Based Approach.
M Alam, S Ray
IJ Network Security 15 (6), 465-470, 2013
A biomarker ensemble ranking framework for prioritizing depression candidate genes
AS Chowdhury, MM Alam, Y Zhang
2015 IEEE Conference on Computational Intelligence in Bioinformatics and …, 2015
Preventing the side-channel leakage of masked AES S-box
S Ghosh, M Alam, K Kumar, D Mukhopadhyay, DR Chowdhury
15th International Conference on Advanced Computing and Communications …, 2007
Effect of side channel attacks on RSA embedded devices
S Ghosh, M Alam, DR Chowdhury, IS Gupta
TENCON 2007-2007 IEEE Region 10 Conference, 1-4, 2007
Syndrome: Spectral analysis for anomaly detection on medical iot and embedded devicesexperimental demonstration
N Sehatbakhsh, H Hong, B Lazar, B Johnson-Smith, O Yilmaz, M Alam, ...
Hardware Demo at IEEE International Symposium on Hardware Oriented Security …, 2017
First-order DPA Vulnerability of Rijndael: Security and Area-delay Optimization Trade-off.
M Alam, S Ghosh, DR Chowdhury, I Sengupta
IJ Network Security 15 (3), 219-230, 2013
Leveraging electromagnetic emanations for iot security
N Sehatbakhsh&, R Callan, M Alam&, M Prvulovic&, A Zajic
Hardware Demo at IEEE International Symposium on Hardware Oriented Security …, 2017
A rewrite rule based model of bangla morphophonological change
M Choudhury, M Alam, S Sarkar, A Basu
Proc. of ICCPB, 64-71, 2006
The system can't perform the operation now. Try again later.
Articles 1–20