Main Organizer

Maria Mushtaq
Associate Professor, Télécom Paris, France
Maria MUSHTAQ is an Associate Professor at Telecom Paris in Safe and Secure Hardware group (SSH) of COMELEC Department. She received her PhD in Information Security from the University of South Brittany (UBS), France, in 2019. She has worked as a CNRS Postdoctoral Researcher at LIRMM, University of Montpellier (UM), France. She possesses expertise in microarchitectural vulnerability assessment and design & development of runtime mitigation solutions against side- and covert-channel information leakage in modern computing systems. Her research interests mainly focus on cryptanalysis, constructing and validating software security components, and constructing OS-based security primitives against various hardware vulnerabilities.
Scientific Committee

Michael SCHWARZ
Senior Researcher, CISPA Helmholtz Center for Information Security, Germany
Dr. Michael Schwarz is tenured faculty at CISPA with a focus on microarchitectural side-channel attacks and system security. He obtained his PhD with the title “Software-based Side-Channel Attacks and Defenses in Restricted Environments” in 2019 from Graz University of Technology (advised by Daniel Gruss). He holds two master’s degrees, one in computer science and one in software engineering with a strong focus on security. Michael is a regular speaker at both academic and hacker conferences (7 times Black Hat, CCC, Blue Hat, etc.). He was part of one of the research teams that found the Meltdown, Spectre, Fallout, and LVI vulnerabilities, as well as the ZombieLoad vulnerability. He was also part of the KAISER patch, the basis for Meltdown countermeasures now deployed in every modern operating system under names such as KPTI or KVA Shadow.

Yuval YAROM
Professor, Computer Science at Ruhr University Bochum (RUB), Germany
From April 2023, he has been a Professor of Computer Science at Ruhr University Bochum (RUB). Before joining RUB, he was an Associate Professor at the School of Computer and Mathematical Sciences at the University of Adelaide. He earned his Ph.D. in Computer Science from the University of Adelaide in 2014, and his M.Sc. in Computer Science and B.Sc. in Mathematics and Computer Science from the Hebrew University of Jerusalem in 1993 and 1990, respectively. In between, he served as the Vice President of Research at Memco Software and was a co-founder and Chief Technology Officer of Girafa.com.
His research explores the security of the interface between software and hardware. In particular, he is interested in the discrepancy between the way programmers perceive software execution and its actual execution in modern processors. His work focuses on identifying micro-architectural vulnerabilities, as well as developing exploitation and mitigation techniques.
Administrative Organizers

Lirida NIVINER
Associate Professor, Télécom Paris, France
Lirida Naviner (Senior Member, IEEE) received the B.Sc. and M.Sc. degrees from the Federal University of Paraiba (UFPB), Brazil, in 1988 and 1990, respectively, and the Ph.D. degree from the Ecole Nationale Supérieure des Télécommunications, France, in 1994. From 1994 to 1997, she was a Faculty Member with UFPB. Since 1998, she has been with the Electronics and Communications Department, Télécom ParisTech, where she is currently a Full Professor. She has led several academic and industrial research projects with national/international partners. She has authored/co-authored over 200 scientific articles and is an inventor of eight patents. She is a member of the startup incubator of ParisTech. She has been honored with the title Chevalier dans L’Ordre des Palmes Academiques by French Government

Chadi JABBOUR
Associate Professor, Télécom Paris, France
Chadi Jabbour received the M.Sc. degree from the Ecole Supérieure de physique et de chimie industrielles, France, in 2007, and the Ph.D. degree from Telecom Paristech, France, in 2010. From 2011 to 2014, he was with the Institute Mines Telecom, Telecom ParisTech, as a Research Engineer. From 2014 and 2015, he was a Visiting Fellow with Nokia Technologies, Berkeley, where he was involved in novel architecture design for RF-to-digital receivers. In 2015, he became an Associate Professor with Institute Mines Telecom. In 2021, he received his research habilitation from Institut Polytechnique de Paris and promoted to full professor in 2024. His research interests include A/D and D/A converters design and calibration, post and pre distortion for communication systems, energy harvesting and flexible receiver architectures.
Team

Muhammad AWAIS
Ph.D Student in Hardware Security – Télécom Paris
Muhammad Awais is a first-year PhD researcher at Télécom Paris, IP Paris, specializing in microarchitectural security. His research focuses on automating vulnerability assessments of side-channel attacks, their impact on modern processor architectures, and potential mitigation strategies. He completed his Master’s in Computer Engineering at FAST University, Islamabad, Pakistan, where he developed expertise in gem5 simulation, green computing, microarchitectural analysis, and embedded systems. With a strong background in hardware security and low-power architectures, Muhammad is passionate about advancing the field of microarchitectural security through innovative and efficient solutions.

Mahreen KHAN
Ph.D Student in Hardware Security – Télécom Paris
Mahreen Khan is a first-year PhD researcher at Télécom Paris, IP Paris, specializing in microarchitectural security. Her research focuses on side-channel attacks, their impact on modern processor architectures, and potential mitigation strategies. She completed her Master’s in Integrated Circuit Design at Télécom Paris, where she specialized in VLSI, digital/analog IC design, and hardware security. She developed expertise in semiconductor design, low-power architectures, and microarchitecture.

Nathanaël SIMON
Ph.D Student in Hardware Security – Télécom Paris
Nathanaël Simon is a first-year PhD researcher at Télécom Paris, IP Paris, specializing in micro-architectural security. His research focuses on automated vulnerability assessment for Timing-based Side Channel Attacks. He graduated from Télécom Paris in 2024 in computer science and cybersecurity, while being a research engineer at IRT-SystemX from 2022 to 2024, working on European physical cybersecurity projects, with academic and industrial teams.