AI-enhanced side-channel attack pipelines, combining hardware simulation, machine learning, and microarchitectural analysis for modern SoCs and CPUs.
I am a PhD researcher at Télécom Paris, working on AI-based automation of side-channel attacks and their analysis. My work explores how machine learning, hardware simulation, and microarchitectural modeling can advance modern hardware security.
Publications
M. Awais, Maria Mushtaq, Lirida NAVINER, Florent BRUGUIER, Javad Haj Yahya, Pascal
Boniot
Presented at IEEE/RSP Conference on Hardware Security, Regligh USA, 2024.
We introduce a fully automated attack pipeline that leverages machine learning and microarchitectural simulation (Gem5) to analyze power, EM, and cache-based side-channel leakages.
M. Awais, Maria Mushtaq, Lirida NAVINER, Florent BRUGUIER, Javad Haj Yahya, Pascal
Boniot
Published in 13th International Workshop on Security Proofs for Embedded Systems (PROOFs
2025), Kuala Lumpur, Malaysia, September 18, 2025.
This paper demonstrates timing variances in branch predictors, pipeline stalls, and cache hierarchies on RISC-V using Gem5, providing insights into microarchitectural leakage sources.
M. Awais, Mahreen Khan, Maria Mushtaq, Lirida NAVINER, Javad Haj Yahya, Florent
BRUGUIER, Ludovic Apvrille, Renaud Pacalet.
Published in 7th Computing, Communications and IoT Applications Conference (IEEE
ComComAp 2025), Madrid, Spain 2025.
This paper demonstrates timing variances in branch predictors, pipeline stalls, and cache hierarchies on RISC-V using Gem5, providing insights into microarchitectural leakage sources.
Overview
Side-channel attacks exploit indirect information leaked by hardware during computation, such as execution time, power consumption, electromagnetic emissions, or microarchitectural behavior. Instead of breaking cryptography mathematically, attackers observe how a device behaves while performing sensitive operations.
Research in hardware security aims to model, measure, and mitigate these leaks at multiple layers: circuit, microarchitecture, firmware, and software. This includes secure design of CPUs, accelerators, cryptographic engines, and embedded systems.
Taxonomy
Power analysis on IoT devices reveals data-dependent consumption patterns that attackers can exploit to extract cryptographic keys and sensitive operations. Measures dynamic power consumption of a IOT device during cryptographic operations to recover secret keys (SPA / DPA / CPA).
Gem5 Simulations IOTs Benchmark TestingExploit variations in execution time caused by data-dependent branches, memory accesses, or microarchitectural events.Abuse shared resources such as caches, branch predictors, or speculative execution units (e.g., cache-timing, Spectre-like attacks)
FLUSH + Reload Prime Probe Spectre Varient Attacks Constant-Time / Formal AnalysisOpcode-level profiling links specific instruction sequences to distinctive leakage patterns, enabling fine-grained attribution and optimization of side-channel attacks on modern processors. Analysis of OpCodes by doing the simulation on gem5 and the detailed analysis of the O3 pipline.
Cryptographic OpCodes / AES OpCode / hardware-level OpenSSLCustom ISA extensions in RISC-V enable controlled leakage points, making it possible to analyze, trigger, and evaluate side-channel vulnerabilities with fine-grained architectural visibility.“ISA-level CSR modifications expose microarchitectural behavior with high precision, enabling deeper analysis and exploitation of side-channel vulnerabilities
RISC-V ISA CSRsMitigation
Masking, hiding, constant-time implementations, and randomized encodings reduce correlation between leakage and secrets.
Cache partitioning, constant-latency memories, and flushing / fencing strategies for untrusted code and enclaves.
Side-channel–resistant logic styles, balanced routing, power-noise injection, and secure SoC/FPGA architectures.
Formal leakage models, leakage assessment, TVLA tests, and simulation (e.g., Gem5, RTL-level analysis) to quantify risk.
Identify attackers, capabilities (local/remote, physical access), and targeted assets.
Measure or simulate side-channel leakage on prototypes or models.
Integrate algorithmic and hardware-level protections; evaluate overhead.
Perform standardized tests (e.g., TVLA, certification labs) and iterate on design.
Research Focus
Designing and evaluating microarchitectural side-channel attacks on open ISAs (RISC-V) and commercial architectures (x86 / ARM) using simulation and real hardware.
Capturing and analyzing power/EM/timing traces to build datasets for statistical and machine learning–based side-channel analysis.
Building tools to evaluate countermeasures, automate experiments, and support secure-by-design hardware development.
Get in Touch
Welcome, and thank you for visiting—feel free to explore my work, connect with me, and collaborate on cutting-edge research in hardware security and side-channel analysis.