Is this your profile?
Claim your Citation Index profile in order to display more information about you and gain access to Libraries services. Just create or connect your ORCID iD.
Create or connect your ORCID iD
Works (43)
2025 article
SpecMPK: Efficient In-Process Isolation with Speculative and Secure Permission Update Instruction
Adak, D., Zhou, H., Rotenberg, E., & Awad, A. (2025, March 1). 2025 IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE, HPCA, pp. 394–408.
2025 article
THEMIS: Time, Heterogeneity, and Energy Minded Scheduling for Fair Multi-Tenant Use in FPGAs
Karabulut, E., Malik, A. A., Awad, A., & Aysu, A. (2025, May 5). IEEE Transactions on Computers, Vol. 5.
2024 article
Delta Counter: Bandwidth-Efficient Encryption Counter Representation for Secure GPU Memory
Yuan, S., Awad, A., & Zhou, H. (2024, April 16). IEEE Transactions on Dependable and Secure Computing, Vol. 22, pp. 101–113.
2024 article
SEFsim: A Statistically-Guided Fast DRAM Simulator
Adak, D., Lee, H., Feinberg, B., Voskuilen, G., Hughes, C., Zhou, H., & Awad, A. (2024, May 5). PROCEEDINGS OF THE 2024 IEEE INTERNATIONAL SYMPOSIUM ON PERFORMANCE ANALYSIS OF SYSTEMS AND SOFTWARE, ISPASS 2024, pp. 304–306.
2024 article
Salus: Efficient Security Support for CXL-Expanded GPU Memory
Abdullah, R., Lee, H., Zhou, H., & Awad, A. (2024, March 2). 2024 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, HPCA 2024, pp. 233–248.
2023 article
A Secure Computing System With Hardware-Efficient Lazy Bonsai Merkle Tree for FPGA-Attached Embedded Memory
Shadab, R. M., Zou, Y., Gandham, S., Awad, A., & Lin, M. (2023, October 16). IEEE Transactions on Dependable and Secure Computing.
2023 article
CryptoMMU: Enabling Scalable and Secure Access Control of Third-Party Accelerators
Alam, F., Lee, H., Bhattacharjee, A., & Awad, A. (2023, October 28).
2023 article
D-Shield: Enabling Processor-side Encryption and Integrity Verification for Secure NVMe Drives
Chowdhuryy, M. H. I., Jung, M., Yao, F., & Awad, A. (2023, February 1).
2023 article
ERAS: A Flexible and Scalable Framework for Seamless Integration of RTL Models with Structural Simulation Toolkit
Nema, S., Chunduru, S. K., Kodigal, C., Voskuilen, G., Rodrigues, A. F., Hemmert, S., … Hughes, C. (2023, October 1).
2023 article
HMT: A Hardware-centric Hybrid Bonsai Merkle Tree Algorithm for High-performance Authentication
Shadab, R. M., Zou, Y., Gandham, S., Awad, A., & Lin, M. (2023, April 28). ACM Transactions on Embedded Computing Systems.
2023 article
Plutus: Bandwidth-Efficient Memory Security for GPUs
Abdullah, R., Zhou, H., & Awad, A. (2023, February 1). 2023 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, HPCA, pp. 543–555.
2023 article
RC-NVM: Recovery-Aware Reliability-Security Co-Design for Non-Volatile Memories
Zubair, K. A., Abdullah, R., Mohaisen, D., & Awad, A. (2023, July 3). IEEE Transactions on Dependable and Secure Computing.
2023 article
SS-AXI: Secure and Safe Access Control Mechanism for Multi-Tenant Cloud FPGAs
Karabulut, E., Awad, A., & Aysu, A. (2023, May 21). (Vol. 5). Vol. 5.
2023 article
Thoth: Bridging the Gap Between Persistently Secure Memories and Memory Interfaces of Emerging NVMs
Han, X., Tuck, J., & Awad, A. (2023, February 1). 2023 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, HPCA, pp. 94–107.
2022 article
A Keylogging Inference Attack on Air-Tapping Keyboards in Virtual Environments
Meteriz-Yildiran, U., Yildiran, N. F., Awad, A., & Mohaisen, D. (2022, March 1). 2022 IEEE Conference on Virtual Reality and 3D User Interfaces (VR).
2022 article
ARES: Persistently Secure Non-Volatile Memory with Processor-transparent and Hardware-friendly Integrity Verification and Metadata Recovery
Zou, Y., Zubair, K. A., Alwadi, M., Shadab, R. M., Gandham, S., Awad, A., & Lin, M. (2022, January 31). ACM Transactions on Embedded Computing Systems.
2022 article
ATHENA: Enabling Codesign for Next-Generation AI/ML Architectures
Plagge, M., Feinberg, B., McFarland, J., Rothganger, F., Agarwal, S., Awad, A., … Cardwell, S. G. (2022, December 1).
2022 article
Adaptive Security Support for Heterogeneous Memory on GPUs
Yuan, S., Awad, A., Yudha, A. W. B., Solihin, Y., & Zhou, H. (2022, April 1). 2022 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2022).
2022 article
DirectNVM: Hardware-accelerated NVMe SSDs for High-performance Embedded Computing
Zou, Y., Awad, A., & Lin, M. (2022, January 31). ACM Transactions on Embedded Computing Systems.
2022 article
Eris: Fault Injection and Tracking Framework for Reliability Analysis of Open-Source Hardware
Nema, S., Kirschner, J., Adak, D., Agarwal, S., Feinberg, B., Rodrigues, A. F., … Awad, A. (2022, May 1).
2022 article
Filesystem Encryption or Direct-Access for NVM Filesystems? Let’s Have Both!
Zubair, K. A., Mohaisen, D., & Awad, A. (2022, April 1).
2022 article
High-Fidelity Model Extraction Attacks via Remote Power Monitors
Dubey, A., Karabulut, E., Awad, A., & Aysu, A. (2022, June 13). 2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS).
2022 article
Horus: Persistent Security for Extended Persistence-Domain Memory Systems
Han, X., Tuck, J., & Awad, A. (2022, October 1). 2022 55TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), pp. 1255–1269.
2022 article
Minerva: Rethinking Secure Architectures for the Era of Fabric-Attached Memory Architectures
Alwadi, M., Wang, R., Mohaisen, D., Hughes, C., Hammond, S. D., & Awad, A. (2022, May 1). 2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS).
2022 article
Towards resilient analog in-memory deep learning via data layout re-organization
Rashed, M. R. H., Awad, A., Jha, S. K., & Ewetz, R. (2022, July 10). Proceedings of the 59th ACM/IEEE Design Automation Conference.
2022 article
Transpose-xen
McFarland, J., & Awad, A. (2022, April 25). Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing.
2022 article
Understanding Internet of Things malware by analyzing endpoints in their static artifacts
Choi, J., Anwar, A., Alabduljabbar, A., Alasmary, H., Spaulding, J., Wang, A., … Mohaisen, D. (2022, January 15). Computer Networks.
2021 article
DeACT: Architecture-Aware Virtual Memory Support for Fabric Attached Memory Systems
Kommareddy, V. R., Hughes, C., Hammond, S. D., & Awad, A. (2021, February 1).
2021 article
HERMES: Hardware-Efficient Speculative Dataflow Architecture for Bonsai Merkle Tree-Based Memory Authentication
Zou, Y., Awad, A., & Lin, M. (2021, December 12).
2021 article
NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks
Wang, X., Zhao, B., Hou, R., Awad, A., Tian, Z., & Meng, D. (2021, June 1).
2021 article
PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter
Yuan, F., Wang, K., Hou, R., Li, X., Li, P., Zhao, L., … Meng, D. (2021, February 1).
2021 article
Resilient and Secure Hardware Devices Using ASL
Alasad, Q., Lin, J., Yuan, J.-S., Fan, D., & Awad, A. (2021, January 6). ACM Journal on Emerging Technologies in Computing Systems.
2021 article
Seeds of SEED: R-SAW: New Side Channels Exploiting Read Asymmetry in MLC Phase Change Memories
Chowdhuryy, M. H. I., Ewetz, R., Awad, A., & Yao, F. (2021, September 1).
2021 article
ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation
Alasmary, H., Anwar, A., Abusnaina, A., Alabduljabbar, A., Abuhamad, M., Wang, A., … Mohaisen, D. (2021, June 4). IEEE Internet of Things Journal.
2021 article
Stealth-Persist: Architectural Support for Persistent Applications in Hybrid Memory Systems
Alwadi, M., Kommareddy, V. R., Hughes, C., Hammond, S. D., & Awad, A. (2021, February 1).
2021 article proceedings
VR-Spy: A Side-Channel Attack on Virtual Key-Logging in VR Headsets
Presented at the 2021 IEEE Virtual Reality and 3D User Interfaces (VR).
2020 article
A Lightweight Memory Access Pattern Obfuscation Framework for NVM
Che, Y., Yang, Y., Awad, A., & Wang, R. (2020, July 1). IEEE Computer Architecture Letters.
2020 article
Guest Editors' Introduction to the Special Issue on Hardware Security
Awad, A., & Wang, R. (2020, October 7). IEEE Transactions on Computers.
2020 article
Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM
Alwadi, M., Zubair, K., Mohaisen, D., & Awad, A. (2020, January 1). IEEE Transactions on Dependable and Secure Computing.
2016 article
Silent Shredder
Awad, A., Manadhata, P., Haber, S., Solihin, Y., & Horne, W. (2016, March 25). ACM SIGPLAN Notices.
2016 article
Silent Shredder
Awad, A., Manadhata, P., Haber, S., Solihin, Y., & Horne, W. (2016, March 25). ACM SIGOPS Operating Systems Review.
2015 article
Non-volatile memory host controller interface performance analysis in high-performance I/O systems
Awad, A., Kettering, B., & Solihin, Y. (2015, March 1).
2014 article
STM: Cloning the spatial and temporal memory access behavior
Awad, A., & Solihin, Y. (2014, February 1).