Works (24)

2022 article

A Keylogging Inference Attack on Air-Tapping Keyboards in Virtual Environments

2022 IEEE CONFERENCE ON VIRTUAL REALITY AND 3D USER INTERFACES (VR 2022).

By: U. Meteriz-Yildiran, N. Yildiran, A. Awad & D. Mohaisen

Source: Web Of Science
Added: August 15, 2022

2022 journal article

ARES: Persistently Secure Non-Volatile Memory with Processor-transparent and Hardware-friendly Integrity Verification and Metadata Recovery

ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS.

By: Y. Zou, K. Abu Zubair, M. Alwadi, R. Shadab, S. Gandham, A. Awad, M. Lin

Source: Web Of Science
Added: March 7, 2022

2022 article

Adaptive Security Support for Heterogeneous Memory on GPUs

2022 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2022).

By: S. Yuan, A. Awad, A. Yudha, Y. Solihin & H. Zhou

Source: Web Of Science
Added: August 29, 2022

2022 journal article

DirectNVM: Hardware-accelerated NVMe SSDs for High-performance Embedded Computing

ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS.

By: Y. Zou, A. Awad & M. Lin

Source: Web Of Science
Added: March 7, 2022

2022 article

Eris: Fault Injection and Tracking Framework for Reliability Analysis of Open-Source Hardware

2022 IEEE INTERNATIONAL SYMPOSIUM ON PERFORMANCE ANALYSIS OF SYSTEMS AND SOFTWARE (ISPASS 2022).

By: S. Nema, J. Kirschner, D. Adak, S. Agarwal, B. Feinberg, A. Rodrigues, M. Marinella, A. Awad

Source: Web Of Science
Added: September 26, 2022

2022 article

Filesystem Encryption or Direct-Access for NVM Filesystems? Let's Have Both!

2022 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2022).

By: K. Abu Zubair, D. Mohaisen & A. Awad

Source: Web Of Science
Added: August 29, 2022

2022 article

Minerva: Rethinking Secure Architectures for the Era of Fabric-Attached Memory Architectures

2022 IEEE 36TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS 2022).

By: M. Alwadi, R. Wang, D. Mohaisen, C. Hughes, S. Hammond & A. Awad

Source: Web Of Science
Added: September 29, 2022

2022 journal article

Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING.

By: M. Alwadi, K. Abu Zubair, D. Mohaisen & A. Awad

Source: Web Of Science
Added: March 28, 2022

2022 journal article

SHELLCORE: Automating Malicious IoT Software Detection Using Shell Commands Representation

IEEE INTERNET OF THINGS JOURNAL.

By: H. Alasmary, A. Anwar, A. Abusnaina, A. Alabduljabbar, M. Abuhamad, A. Wang, D. Nyang, A. Awad, D. Mohaisen

Source: Web Of Science
Added: February 21, 2022

2022 journal article

Understanding Internet of Things malware by analyzing endpoints in their static artifacts

COMPUTER NETWORKS.

By: J. Choi, A. Anwar, A. Alabduljabbar, H. Alasmary, J. Spaulding, A. Wang, S. Chen, D. Nyang, A. Awad, D. Mohaisen

Source: Web Of Science
Added: May 2, 2022

2021 article

DeACT: Architecture-Aware Virtual Memory Support for Fabric Attached Memory Systems

2021 27TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2021).

By: V. Kommareddy, C. Hughes, S. Hammond & A. Awad

Source: Web Of Science
Added: July 26, 2021

2021 article

HERMES: Hardware-Efficient Speculative Dataflow Architecture for Bonsai Merkle Tree-Based Memory Authentication

2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST).

By: Y. Zou, A. Awad & M. Lin

Source: Web Of Science
Added: June 13, 2022

2021 article

NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks

2021 ACM/IEEE 48TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2021).

By: X. Wang, B. Zhao, R. Hou, A. Awad, Z. Tian & D. Meng

Source: Web Of Science
Added: October 26, 2021

2021 article

PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter

PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021).

By: F. Yuan, K. Wang, R. Hou, X. Li, P. Li, L. Zhao, J. Ying, A. Awad, D. Meng

Source: Web Of Science
Added: July 18, 2022

2021 journal article

Resilient and Secure Hardware Devices Using ASL

ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 17(2).

By: Q. Alasad, J. Lin, J. Yuan, D. Fan & A. Awad

Source: Web Of Science
Added: May 24, 2021

2021 article

Seeds of SEED: R-SAW: New Side Channels Exploiting Read Asymmetry in MLC Phase Change Memories

2021 INTERNATIONAL SYMPOSIUM ON SECURE AND PRIVATE EXECUTION ENVIRONMENT DESIGN (SEED 2021).

By: M. Chowdhuryy, R. Ewetz, A. Awad & F. Yao

Source: Web Of Science
Added: June 20, 2022

2021 article

Stealth-Persist: Architectural Support for Persistent Applications in Hybrid Memory Systems

2021 27TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2021).

By: M. Alwadi, V. Kommareddy, C. Hughes, S. Hammond & A. Awad

Source: Web Of Science
Added: July 26, 2021

2021 article

VR-Spy: A Side-Channel Attack on Virtual Key-Logging in VR Headsets

2021 IEEE VIRTUAL REALITY AND 3D USER INTERFACES (VR).

By: A. Al Arafat, Z. Guo & A. Awad

Source: Web Of Science
Added: August 23, 2021

2020 journal article

A Lightweight Memory Access Pattern Obfuscation Framework for NVM

IEEE COMPUTER ARCHITECTURE LETTERS, 19(2), 163–166.

By: Y. Che, Y. Yang, A. Awad & R. Wang

Source: Web Of Science
Added: January 19, 2021

2020 article

Guest Editors' Introduction to the Special Issue on Hardware Security

IEEE TRANSACTIONS ON COMPUTERS, Vol. 69, pp. 1556–1557.

By: A. Awad & R. Wang

Source: Web Of Science
Added: October 26, 2020

2016 journal article

Silent shredder: Zero-cost shredding for secure non-volatile main memory controllers

ACM SIGPLAN Notices, 51(4), 263–276.

By: A. Awad, P. Manadhata, S. Haber, Y. Solihin & W. Horne

Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

Silent shredder: Zero-cost shredding for secure non-volatile main memory controllers

Operating Systems Review, 50(2), 263–276.

By: A. Awad, P. Manadhata, S. Haber, Y. Solihin & W. Horne

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Non-volatile memory host controller interface performance analysis in high-performance I/O systems

Ieee international symposium on performance analysis of systems and, 145–154.

By: A. Awad, B. Kettering & Y. Solihin

Source: NC State University Libraries
Added: August 6, 2018

2014 conference paper

STM : Cloning the spatial and temporal memory access behavior

International symposium on high-performance computer, 237–247.

By: A. Awad & Y. Solihin

Source: NC State University Libraries
Added: August 6, 2018