Publications

publications in reversed chronological order.

2023

  1. From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake
    Daniel De Almeida Braga, Natalia Kulatova, Mohamed Sabt, Pierre-Alain Fouque, and Karthikeyan Bhargavan
    In EuroS&P, 2023.
    Propose patch to hostap.

2022

  1. WideLeak: How Over-the-Top Platforms Fail in Android
    Gwendal Patat, Mohamed Sabt, and Pierre-Alain Fouque
    In DSN, 2022.
    Awarded by Hall of Fame of Netflix.
  2. Exploring Widevine for Fun and Profit
    Gwendal Patat, Mohamed Sabt, and Pierre-Alain Fouque
    In SP Workshops, 2022.
    Awarded by Hall of Fame of Google.
  3. “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks
    Jan Jancar, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, and Yasemin Acar
    In SP, 2022.
    Also presented at Real World Crypto 2022.

2021

  1. Implementation of Lattice Trapdoors on Modules and Applications
    Pauline Bert, Gautier Eberhart, Lucas Prabel, Adeline Roux-Langlois, and Mohamed Sabt
    In PQCrypto, 2021.
  2. PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild
    Daniel De Almeida Braga, Pierre-Alain Fouque, and Mohamed Sabt
    In CCS, 2021.
    OpenSSL Contributor, and ProtonMail Bug Bounty Program.

2020

  1. Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild
    Daniel De Almeida Braga, Pierre-Alain Fouque, and Mohamed Sabt
    In ACSAC, 2020.
    Second place at the CSAW Europe applied research competition 2020.
  2. The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10
    Daniel De Almeida Braga, Pierre-Alain Fouque, and Mohamed Sabt
    IACR TCHES, 2020.
    SCP10 was fixed by GP (amendment).
  3. Please Remember Me: Security Analysis of U2F Remember Me Implementations in The Wild
    Gwendal Patat, and Mohamed Sabt
    In SSTIC, 2020.

2019

  1. Patent. Method for Securing Contactless Transactions
    Mohamed Sabt, Mouhannad Alattar, and Mohammed Achemlal
    In EPO: European Patent Office 2019.
    European publication number: EP/3238474.

2018

  1. Practical Implementation of Ring-SIS/LWE Based Signature and IBE
    Pauline Bert, Pierre-Alain Fouque, Adeline Roux-Langlois, and Mohamed Sabt
    In PQCrypto, 2018.

2017

  1. BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic
    Sébastien Canard, Aı̈da Diop, Nizar Kheir, Marie Paindavoine, and Mohamed Sabt
    In AsiaCCS, 2017.
    Associated patents: WO/2018/065707 and US/10812506.

2016

  1. Cryptanalysis of GlobalPlatform Secure Channel Protocols
    Mohamed Sabt, and Jacques Traoré
    In SSR, 2016.
  2. Breaking into the KeyStore: A Practical Forgery Attack Against Android KeyStore
    Mohamed Sabt, and Jacques Traoré
    In ESORICS, 2016.
    Public Outreach: ThreatPost Article.
  3. Patent. Method of Protecting a Mobile Terminal Against Attacks
    Mohamed Sabt, and Mohammed Achemlal
    In WIPO: World Intellectual Property Organization, 2016.
    International publication number: WO/2016/051059.

2015

  1. Trusted Execution Environment: What It is, and What It is Not
    Mohamed Sabt, Mohammed Achemlal, and Abdelmadjid Bouabdallah
    In TrustCom/BigDataSE/ISPA, 2015.
  2. The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation
    Mohamed Sabt, Mohammed Achemlal, and Abdelmadjid Bouabdallah
    In IFIP SEC, 2015.
  3. Towards Integrating Trusted Execution Environment into Embedded Autonomic Systems
    Mohamed Sabt, Mohammed Achemlal, and Abdelmadjid Bouabdallah
    In ICAC, 2015.
  4. Over-the-Internet: Efficient Remote Content Management for Secure Elements in Mobile Devices
    Mohamed Sabt, Mohammed Achemlal, and Abdelmadjid Bouabdallah
    In MOBISECSERV, 2015.