Skip to main content

Showing 1–4 of 4 results for author: Hassan, S U

.
  1. arXiv:2312.10647  [pdf, other

    cs.RO eess.SY

    Single-Stage Optimization of Open-loop Stable Limit Cycles with Smooth, Symbolic Derivatives

    Authors: Muhammad Saud Ul Hassan, Christian Hubicki

    Abstract: Open-loop stable limit cycles are foundational to the dynamics of legged robots. They impart a self-stabilizing character to the robot's gait, thus alleviating the need for compute-heavy feedback-based gait correction. This paper proposes a general approach to rapidly generate limit cycles with explicit stability constraints for a given dynamical system. In particular, we pose the problem of open-… ▽ More

    Submitted 17 December, 2023; originally announced December 2023.

    Comments: 7 pages, 7 figures

  2. Déjà Vu: Side-Channel Analysis of Mozilla's NSS

    Authors: Sohaib ul Hassan, Iaroslav Gridin, Ignacio M. Delgado-Lozano, Cesar Pereida García, Jesús-Javier Chi-Domínguez, Alejandro Cabrera Aldaya, Billy Bob Brumley

    Abstract: Recent work on Side Channel Analysis (SCA) targets old, well-known vulnerabilities, even previously exploited, reported, and patched in high-profile cryptography libraries. Nevertheless, researchers continue to find and exploit the same vulnerabilities in old and new products, highlighting a big issue among vendors: effectively tracking and fixing security vulnerabilities when disclosure is not do… ▽ More

    Submitted 13 August, 2020; originally announced August 2020.

    Comments: To appear at ACM CCS 2020

  3. arXiv:1909.01785  [pdf, other

    cs.CR

    Certified Side Channels

    Authors: Cesar Pereida García, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin, Alejandro Cabrera Aldaya, Billy Bob Brumley

    Abstract: We demonstrate that the format in which private keys are persisted impacts Side Channel Analysis (SCA) security. Surveying several widely deployed software libraries, we investigate the formats they support, how they parse these keys, and what runtime decisions they make. We uncover a combination of weaknesses and vulnerabilities, in extreme cases inducing completely disjoint multi-precision arith… ▽ More

    Submitted 1 April, 2020; v1 submitted 4 September, 2019; originally announced September 2019.

    Comments: Accepted to USENIX Security Symposium 2020

  4. A Bibliometric Analysis of Publications in Computer Networking Research

    Authors: Waleed Iqbal, Junaid Qadir, Gareth Tyson, Adnan Noor Mian, Saeed Ul Hassan, Jon Crowcroft

    Abstract: This study uses the article content and metadata of four important computer networking periodicals-IEEE Communications Surveys and Tutorials (COMST), IEEE/ACM Transactions on Networking (TON), ACM Special Interest Group on Data Communications (SIGCOMM), and IEEE International Conference on Computer Communications (INFOCOM)-obtained using ACM, IEEE Xplore, Scopus and CrossRef, for an 18-year period… ▽ More

    Submitted 4 March, 2019; originally announced March 2019.

    Comments: 36 Pages, Currently submitted to Springer Scientometrics Journal 2019

    MSC Class: 62-07

    Journal ref: Scientometrics 2019