Works (27)

Updated: April 11th, 2023 10:13

2022 article

A Keylogging Inference Attack on Air-Tapping Keyboards in Virtual Environments

2022 IEEE CONFERENCE ON VIRTUAL REALITY AND 3D USER INTERFACES (VR 2022), pp. 765–774.

By: U. Meteriz-Yildiran*, N. Yildiran*, A. Awad & D. Mohaisen*

author keywords: Security and privacy; Privacy protections; Human-entered computing; Text input; Human-centered computing; Ubiquitous and mobile devices
Source: Web Of Science
Added: August 15, 2022

2022 journal article

ARES: Persistently Secure Non-Volatile Memory with Processor-transparent and Hardware-friendly Integrity Verification and Metadata Recovery

ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 21(1).

By: Y. Zou*, K. Abu Zubair, M. Alwadi*, R. Shadab*, S. Gandham*, A. Awad, M. Lin*

Source: Web Of Science
Added: March 7, 2022

2022 article

Adaptive Security Support for Heterogeneous Memory on GPUs

2022 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2022), pp. 213–228.

By: S. Yuan, A. Awad, A. Yudha*, Y. Solihin* & H. Zhou

author keywords: GPUs; secure memory; heterogeneous memory; encryption; integrity check; security metadata cache
Sources: Web Of Science, ORCID
Added: August 29, 2022

2022 journal article

DirectNVM: Hardware-accelerated NVMe SSDs for High-performance Embedded Computing

ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 21(1).

By: Y. Zou*, A. Awad & M. Lin*

author keywords: NVMe; SSDs; FPGA; high-Throughput high-Performance computing
Source: Web Of Science
Added: March 7, 2022

2022 article

Eris: Fault Injection and Tracking Framework for Reliability Analysis of Open-Source Hardware

2022 IEEE INTERNATIONAL SYMPOSIUM ON PERFORMANCE ANALYSIS OF SYSTEMS AND SOFTWARE (ISPASS 2022), pp. 210–220.

By: S. Nema, J. Kirschner n, D. Adak, S. Agarwal*, B. Feinberg*, A. Rodrigues*, M. Marinella*, A. Awad

author keywords: Reliability; fault-injection; RISC-V; safety-critical; resilience; fault-tracking
Source: Web Of Science
Added: September 26, 2022

2022 article

Filesystem Encryption or Direct-Access for NVM Filesystems? Let's Have Both!

2022 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2022), pp. 490–502.

By: K. Abu Zubair, D. Mohaisen* & A. Awad

author keywords: Non-Volatile Memory; Direct-Access (DAX); Security; Privacy; Filesystem Encryption
Source: Web Of Science
Added: August 29, 2022

2022 article

High-Fidelity Model Extraction Attacks via Remote Power Monitors

2022 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE CIRCUITS AND SYSTEMS (AICAS 2022): INTELLIGENT TECHNOLOGY IN THE POST-PANDEMIC ERA, pp. 328–331.

By: A. Dubey, E. Karabulut, A. Awad & A. Aysu

author keywords: Neural networks; model stealing; time-to-digital converters; secure virtualization
Source: Web Of Science
Added: November 7, 2022

2022 article

Horus: Persistent Security for Extended Persistence-Domain Memory Systems

2022 55TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), pp. 1255–1269.

By: X. Han, J. Tuck & A. Awad

author keywords: Non-Volatile Memory; eADR; secure memory
Sources: Web Of Science, ORCID
Added: December 12, 2022

2022 article

Minerva: Rethinking Secure Architectures for the Era of Fabric-Attached Memory Architectures

2022 IEEE 36TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS 2022), pp. 258–268.

By: M. Alwadi*, R. Wang*, D. Mohaisen*, C. Hughes*, S. Hammond* & A. Awad

Source: Web Of Science
Added: September 29, 2022

2022 journal article

Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 19(2), 1049–1063.

By: M. Alwadi*, K. Abu Zubair, D. Mohaisen* & A. Awad

author keywords: Encryption; Nonvolatile memory; Metadata; Computer crashes; Computer architecture; Secure architectures; persistent memory; non-volatile memories; crash consistency; secure recovery
Source: Web Of Science
Added: March 28, 2022

2022 journal article

SHELLCORE: Automating Malicious IoT Software Detection Using Shell Commands Representation

IEEE INTERNET OF THINGS JOURNAL, 9(4), 2485–2496.

By: H. Alasmary*, A. Anwar*, A. Abusnaina*, A. Alabduljabbar*, M. Abuhamad*, A. Wang*, D. Nyang*, A. Awad, D. Mohaisen*

author keywords: Internet of Things (IoT) security; Linux shell commands; machine learning; malware detection
Source: Web Of Science
Added: February 21, 2022

2022 article

Transpose-Xen: Virtualized Mixed-Criticality through Dynamic Allocation

37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, pp. 3–12.

By: J. McFarland & A. Awad

author keywords: Hypervisor; Dynamic Allocation; Real-Time Scheduling; Cloud Computing
Source: Web Of Science
Added: April 4, 2023

2022 journal article

Understanding Internet of Things malware by analyzing endpoints in their static artifacts

COMPUTER NETWORKS, 206.

By: J. Choi, A. Anwar, A. Alabduljabbar, H. Alasmary, J. Spaulding, A. Wang, S. Chen, D. Nyang, A. Awad, D. Mohaisen

author keywords: Internet of Things; Endpoints; Malware
Source: Web Of Science
Added: May 2, 2022

2021 article

DeACT: Architecture-Aware Virtual Memory Support for Fabric Attached Memory Systems

2021 27TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2021), pp. 453–466.

By: V. Kommareddy*, C. Hughes*, S. Hammond* & A. Awad

author keywords: disaggregated fabric attached memory systems; virtual memory; security
Source: Web Of Science
Added: July 26, 2021

2021 article

HERMES: Hardware-Efficient Speculative Dataflow Architecture for Bonsai Merkle Tree-Based Memory Authentication

2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), pp. 203–213.

By: Y. Zou*, A. Awad & M. Lin*

Source: Web Of Science
Added: June 13, 2022

2021 article

NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks

2021 ACM/IEEE 48TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2021), pp. 776–789.

By: X. Wang*, B. Zhao*, R. Hou*, A. Awad, Z. Tian* & D. Meng*

author keywords: Robust NAS network; adversarial example; DNN accelerator
Source: Web Of Science
Added: October 26, 2021

2021 article

PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter

PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), pp. 1697–1702.

By: F. Yuan*, K. Wang*, R. Hou*, X. Li*, P. Li*, L. Zhao*, J. Ying*, A. Awad, D. Meng*

author keywords: cache side channels; Cuckoo filters; detection-based mitigation
Source: Web Of Science
Added: July 18, 2022

2021 journal article

Resilient and Secure Hardware Devices Using ASL

ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 17(2).

By: Q. Alasad*, J. Lin*, J. Yuan*, D. Fan* & A. Awad

author keywords: Hardware security; logic encryption; emerging devices; ASLD; reverse engineering attacks and defenses; side-channel analysis attacks and countermeasures
Source: Web Of Science
Added: May 24, 2021

2021 article

Seeds of SEED: R-SAW: New Side Channels Exploiting Read Asymmetry in MLC Phase Change Memories

2021 INTERNATIONAL SYMPOSIUM ON SECURE AND PRIVATE EXECUTION ENVIRONMENT DESIGN (SEED 2021), pp. 22–28.

By: M. Chowdhuryy*, R. Ewetz*, A. Awad & F. Yao*

Source: Web Of Science
Added: June 20, 2022

2021 article

Stealth-Persist: Architectural Support for Persistent Applications in Hybrid Memory Systems

2021 27TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2021), pp. 139–152.

By: M. Alwadi*, V. Kommareddy*, C. Hughes*, S. Hammond* & A. Awad

author keywords: persistent applications; hybrid memories
Source: Web Of Science
Added: July 26, 2021

2021 article proceedings

VR-Spy: A Side-Channel Attack on Virtual Key-Logging in VR Headsets

By: A. Arafat*, Z. Guo & A. Awad

Event: 2021 IEEE Virtual Reality and 3D User Interfaces (VR)

author keywords: Human-centered computing; Gesture Computing; Virtual Key-logging Attack; Channel State Information
Sources: Web Of Science, Crossref, ORCID
Added: August 23, 2021

2020 journal article

A Lightweight Memory Access Pattern Obfuscation Framework for NVM

IEEE COMPUTER ARCHITECTURE LETTERS, 19(2), 163–166.

By: Y. Che*, Y. Yang*, A. Awad & R. Wang*

author keywords: Non-volatile memory (NVM); main memory; memory obfuscation; wear-leveling
Source: Web Of Science
Added: January 19, 2021

2020 article

Guest Editors' Introduction to the Special Issue on Hardware Security

Awad, A., & Wang, R. (2020, November 1). IEEE TRANSACTIONS ON COMPUTERS, Vol. 69, pp. 1556–1557.

By: A. Awad & R. Wang*

author keywords: Special issues and sections; Hardware; Security; Computer architecture; System integration
Source: Web Of Science
Added: October 26, 2020

2016 article

Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main Memory Controllers

Awad, A., Manadhata, P., Haber, S., Solihin, Y., & Horne, W. (2016, April). ACM SIGPLAN NOTICES, Vol. 51, pp. 263–276.

By: A. Awad, P. Manadhata*, S. Haber*, Y. Solihin & W. Horne*

author keywords: Encryption; Hardware Security; Phase-Change Memory; Data Protection
Source: Web Of Science
Added: August 6, 2018

2016 conference paper

Silent shredder: Zero-cost shredding for secure non-volatile main memory controllers

Operating Systems Review, 50(2), 263–276.

By: A. Awad, P. Manadhata*, S. Haber*, Y. Solihin & W. Horne*

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Non-volatile memory host controller interface performance analysis in high-performance I/O systems

Ieee international symposium on performance analysis of systems and, 145–154.

By: A. Awad, B. Kettering* & Y. Solihin

Source: NC State University Libraries
Added: August 6, 2018

2014 conference paper

STM : Cloning the spatial and temporal memory access behavior

International symposium on high-performance computer, 237–247.

By: A. Awad & Y. Solihin

Source: NC State University Libraries
Added: August 6, 2018