Safe and Secure Hardware (SSH) Team
COMELEC Department Telecom-ParisDr Maria Mushtaq is an Associate Professor in the Safe and Secure Hardware (SSH) Team at COMELEC Department, Telecom Paris, France. She earned her PhD from Université Bretagne Sud, France (2016-2019), focusing on "Software-based Detection and Mitigation of Microarchitectural Attacks on Intel's x86 Architecture", followed by a prestigious CNRS Excellence PostDoc position at LIRMM, Université de Montpellier (2019-2021). Her research interests lie in Microarchitectural security, Side-channel attacks & mitigations and AI-driven vulnerability assessment mechanisms for embedded systems.
We organize our work across the following themes.
Developing and validating secure software modules, such as OS-level security primitives that protect against hardware vulnerabilities
Cryptanalysis & Software Security ComponentsCache/branch leaks, transient execution, timing channels, and robust countermeasures.
Virtual Platforms for Security Assessments Virtual prototyping to test security vulnerabilities without physical hardware.
AI-based Hardware Security – Leveraging artificial intelligence techniques to detect, predict, and mitigate hardware vulnerabilities.
Research: Hardware security, microarchitectural leakage, formal verification, and secure SoC design.
Highlights
Selected recent papers. For a full list, see Google Scholar.
@INPROCEEDINGS{10871078, author={Awais, Muhammad and Mushtaq, Maria and Naviner, Lirida and Bruguier, Florent and Yahya, Jawad Haj and Benoit, Pascal}, booktitle={2024 International Workshop on Rapid System Prototyping (RSP)}, title={Decoding Attack Behaviors by Analyzing Patterns in Instruction-Based Attacks using gem5}, year={2024}, volume={}, number={}, pages={1-6}, keywords={Reduced instruction set computing;Embedded systems;Hardware security;Conferences;Vectors;Pattern recognition;Decoding;Reliability;Optimization;Hardware Security;Embedded Systems;Hardware Attacks;Attacks Simulation;Attacks Patterns}, doi={10.1109/RSP64122.2024.10871078}}
@INPROCEEDINGS{10871078, author={Awais, Muhammad and Mushtaq, Maria and Naviner, Lirida and Bruguier, Florent and Yahya, Jawad Haj and Benoit, Pascal}, booktitle={2024 International Workshop on Rapid System Prototyping (RSP)}, title={Decoding Attack Behaviors by Analyzing Patterns in Instruction-Based Attacks using gem5}, year={2024}, volume={}, number={}, pages={1-6}, keywords={Reduced instruction set computing;Embedded systems;Hardware security;Conferences;Vectors;Pattern recognition;Decoding;Reliability;Optimization;Hardware Security;Embedded Systems;Hardware Attacks;Attacks Simulation;Attacks Patterns}, doi={10.1109/RSP64122.2024.10871078}}
@INPROCEEDINGS{10871078, author={Awais, Muhammad and Mushtaq, Maria and Naviner, Lirida and Bruguier, Florent and Yahya, Jawad Haj and Benoit, Pascal}, booktitle={2024 International Workshop on Rapid System Prototyping (RSP)}, title={Decoding Attack Behaviors by Analyzing Patterns in Instruction-Based Attacks using gem5}, year={2024}, volume={}, number={}, pages={1-6}, keywords={Reduced instruction set computing;Embedded systems;Hardware security;Conferences;Vectors;Pattern recognition;Decoding;Reliability;Optimization;Hardware Security;Embedded Systems;Hardware Attacks;Attacks Simulation;Attacks Patterns}, doi={10.1109/RSP64122.2024.10871078}}
@INPROCEEDINGS{10871078, author={Awais, Muhammad and Mushtaq, Maria and Naviner, Lirida and Bruguier, Florent and Yahya, Jawad Haj and Benoit, Pascal}, booktitle={2024 International Workshop on Rapid System Prototyping (RSP)}, title={Decoding Attack Behaviors by Analyzing Patterns in Instruction-Based Attacks using gem5}, year={2024}, volume={}, number={}, pages={1-6}, keywords={Reduced instruction set computing;Embedded systems;Hardware security;Conferences;Vectors;Pattern recognition;Decoding;Reliability;Optimization;Hardware Security;Embedded Systems;Hardware Attacks;Attacks Simulation;Attacks Patterns}, doi={10.1109/RSP64122.2024.10871078}}
@INPROCEEDINGS{10871078, author={Awais, Muhammad and Mushtaq, Maria and Naviner, Lirida and Bruguier, Florent and Yahya, Jawad Haj and Benoit, Pascal}, booktitle={2024 International Workshop on Rapid System Prototyping (RSP)}, title={Decoding Attack Behaviors by Analyzing Patterns in Instruction-Based Attacks using gem5}, year={2024}, volume={}, number={}, pages={1-6}, keywords={Reduced instruction set computing;Embedded systems;Hardware security;Conferences;Vectors;Pattern recognition;Decoding;Reliability;Optimization;Hardware Security;Embedded Systems;Hardware Attacks;Attacks Simulation;Attacks Patterns}, doi={10.1109/RSP64122.2024.10871078}}
@INPROCEEDINGS{10871078, author={Awais, Muhammad and Mushtaq, Maria and Naviner, Lirida and Bruguier, Florent and Yahya, Jawad Haj and Benoit, Pascal}, booktitle={2024 International Workshop on Rapid System Prototyping (RSP)}, title={Decoding Attack Behaviors by Analyzing Patterns in Instruction-Based Attacks using gem5}, year={2024}, volume={}, number={}, pages={1-6}, keywords={Reduced instruction set computing;Embedded systems;Hardware security;Conferences;Vectors;Pattern recognition;Decoding;Reliability;Optimization;Hardware Security;Embedded Systems;Hardware Attacks;Attacks Simulation;Attacks Patterns}, doi={10.1109/RSP64122.2024.10871078}}
@INPROCEEDINGS{10871078, author={Awais, Muhammad and Mushtaq, Maria and Naviner, Lirida and Bruguier, Florent and Yahya, Jawad Haj and Benoit, Pascal}, booktitle={2024 International Workshop on Rapid System Prototyping (RSP)}, title={Decoding Attack Behaviors by Analyzing Patterns in Instruction-Based Attacks using gem5}, year={2024}, volume={}, number={}, pages={1-6}, keywords={Reduced instruction set computing;Embedded systems;Hardware security;Conferences;Vectors;Pattern recognition;Decoding;Reliability;Optimization;Hardware Security;Embedded Systems;Hardware Attacks;Attacks Simulation;Attacks Patterns}, doi={10.1109/RSP64122.2024.10871078}}
@INPROCEEDINGS{10871078, author={Awais, Muhammad and Mushtaq, Maria and Naviner, Lirida and Bruguier, Florent and Yahya, Jawad Haj and Benoit, Pascal}, booktitle={2024 International Workshop on Rapid System Prototyping (RSP)}, title={Decoding Attack Behaviors by Analyzing Patterns in Instruction-Based Attacks using gem5}, year={2024}, volume={}, number={}, pages={1-6}, keywords={Reduced instruction set computing;Embedded systems;Hardware security;Conferences;Vectors;Pattern recognition;Decoding;Reliability;Optimization;Hardware Security;Embedded Systems;Hardware Attacks;Attacks Simulation;Attacks Patterns}, doi={10.1109/RSP64122.2024.10871078}}
@INPROCEEDINGS{10871078, author={Awais, Muhammad and Mushtaq, Maria and Naviner, Lirida and Bruguier, Florent and Yahya, Jawad Haj and Benoit, Pascal}, booktitle={2024 International Workshop on Rapid System Prototyping (RSP)}, title={Decoding Attack Behaviors by Analyzing Patterns in Instruction-Based Attacks using gem5}, year={2024}, volume={}, number={}, pages={1-6}, keywords={Reduced instruction set computing;Embedded systems;Hardware security;Conferences;Vectors;Pattern recognition;Decoding;Reliability;Optimization;Hardware Security;Embedded Systems;Hardware Attacks;Attacks Simulation;Attacks Patterns}, doi={10.1109/RSP64122.2024.10871078}}
@INPROCEEDINGS{10871078, author={Awais, Muhammad and Mushtaq, Maria and Naviner, Lirida and Bruguier, Florent and Yahya, Jawad Haj and Benoit, Pascal}, booktitle={2024 International Workshop on Rapid System Prototyping (RSP)}, title={Decoding Attack Behaviors by Analyzing Patterns in Instruction-Based Attacks using gem5}, year={2024}, volume={}, number={}, pages={1-6}, keywords={Reduced instruction set computing;Embedded systems;Hardware security;Conferences;Vectors;Pattern recognition;Decoding;Reliability;Optimization;Hardware Security;Embedded Systems;Hardware Attacks;Attacks Simulation;Attacks Patterns}, doi={10.1109/RSP64122.2024.10871078}}
Highlights
Reach out for collaborations, positions, or media.