Παρακολούθηση
Adil Ahmad
Adil Ahmad
Assistant Professor, Arizona State University
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα asu.edu - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
OBLIVIATE: A Data Oblivious Filesystem for Intel SGX.
A Ahmad, K Kim, MI Sarfaraz, B Lee
NDSS, 2018
1812018
Obfuscuro: A commodity obfuscation engine on intel sgx
A Ahmad, B Joe, Y Xiao, Y Zhang, I Shin, B Lee
Network and Distributed System Security Symposium, 2019
1022019
{SHARD}:{Fine-Grained} Kernel Specialization with {Context-Aware} Hardening
M Abubakar, A Ahmad, P Fonseca, D Xu
30th USENIX Security Symposium (USENIX Security 21), 2435-2452, 2021
422021
CHANCEL: Efficient Multi-client Isolation Under Adversarial Programs.
A Ahmad, J Kim, J Seo, I Shin, P Fonseca, B Lee
NDSS, 2021
332021
TRUSTORE: Side-Channel Resistant Storage for SGX using Intel Hybrid CPU-FPGA
H Oh, A Ahmad, S Park, B Lee, Y Paek
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
312020
Hardlog: Practical tamper-proof system auditing using a novel audit device
A Ahmad, S Lee, M Peinado
2022 IEEE Symposium on Security and Privacy (SP), 1791-1807, 2022
232022
Kard: lightweight data race detection with per-thread memory protection
A Ahmad, S Lee, P Fonseca, B Lee
Proceedings of the 26th ACM International Conference on Architectural …, 2021
232021
BlackMirror: Preventing Wallhacks in 3D Online FPS Games
S Park, A Ahmad, B Lee
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
222020
A tale of two trees: One writes, and other reads: Optimized oblivious accesses to bitcoin and other utxo-based blockchains
DV Le, LT Hurtado, A Ahmad, M Minaei, B Lee, A Kate
Proceedings on Privacy Enhancing Technologies 2020 (2), 2020
192020
Veil: A Protected Services Framework for Confidential Virtual Machines
A Ahmad, B Ou, C Liu, X Zhang, P Fonseca
Proceedings of the 28th ACM International Conference on Architectural …, 2023
42023
A Tale of Two Trees: One Writes, and Other Reads.{Optimized Oblivious Accesses to Large-Scale Blockchains}
DV Le, LT Hurtado, A Ahmad, M Minaei, B Lee, A Kate
arXiv preprint arXiv:1909.01531, 2019
42019
An Extensible Orchestration and Protection Framework for Confidential Cloud Computing
A Ahmad, A Schultz, P Fonseca, B Lee
4*
Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability
V Gandhi, S Banerjee, A Agrawal, A Ahmad, S Lee, M Peinado
32nd USENIX Security Symposium (USENIX Security 23), 391-408, 2023
32023
Detecting and Defending Against Certificate Attacks with Origin-Bound CAPTCHAs
A Ahmad, F Ahmad, L Wei, V Yegneswaran, F Zaffar
Security and Privacy in Communication Networks: 14th International …, 2018
12018
The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches
C Zhang, J Zeng, Y Zhang, A Ahmad, F Zhang, H Jin, Z Liang
arXiv preprint arXiv:2409.04484, 2024
2024
Data race detection with per-thread memory protection
S Lee, A Ahmad
US Patent App. 18/082,444, 2023
2023
Data race detection with per-thread memory protection
S Lee, A Ahmad
US Patent 11,556,395, 2023
2023
Defeating Critical Threats to Cloud User Data in Trusted Execution Environments
A Ahmad
Purdue University, 2022
2022
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–18