OBLIVIATE: A Data Oblivious Filesystem for Intel SGX. A Ahmad, K Kim, MI Sarfaraz, B Lee NDSS, 2018 | 181 | 2018 |
Obfuscuro: A commodity obfuscation engine on intel sgx A Ahmad, B Joe, Y Xiao, Y Zhang, I Shin, B Lee Network and Distributed System Security Symposium, 2019 | 102 | 2019 |
{SHARD}:{Fine-Grained} Kernel Specialization with {Context-Aware} Hardening M Abubakar, A Ahmad, P Fonseca, D Xu 30th USENIX Security Symposium (USENIX Security 21), 2435-2452, 2021 | 42 | 2021 |
CHANCEL: Efficient Multi-client Isolation Under Adversarial Programs. A Ahmad, J Kim, J Seo, I Shin, P Fonseca, B Lee NDSS, 2021 | 33 | 2021 |
TRUSTORE: Side-Channel Resistant Storage for SGX using Intel Hybrid CPU-FPGA H Oh, A Ahmad, S Park, B Lee, Y Paek Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 31 | 2020 |
Hardlog: Practical tamper-proof system auditing using a novel audit device A Ahmad, S Lee, M Peinado 2022 IEEE Symposium on Security and Privacy (SP), 1791-1807, 2022 | 23 | 2022 |
Kard: lightweight data race detection with per-thread memory protection A Ahmad, S Lee, P Fonseca, B Lee Proceedings of the 26th ACM International Conference on Architectural …, 2021 | 23 | 2021 |
BlackMirror: Preventing Wallhacks in 3D Online FPS Games S Park, A Ahmad, B Lee Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 22 | 2020 |
A tale of two trees: One writes, and other reads: Optimized oblivious accesses to bitcoin and other utxo-based blockchains DV Le, LT Hurtado, A Ahmad, M Minaei, B Lee, A Kate Proceedings on Privacy Enhancing Technologies 2020 (2), 2020 | 19 | 2020 |
Veil: A Protected Services Framework for Confidential Virtual Machines A Ahmad, B Ou, C Liu, X Zhang, P Fonseca Proceedings of the 28th ACM International Conference on Architectural …, 2023 | 4 | 2023 |
A Tale of Two Trees: One Writes, and Other Reads.{Optimized Oblivious Accesses to Large-Scale Blockchains} DV Le, LT Hurtado, A Ahmad, M Minaei, B Lee, A Kate arXiv preprint arXiv:1909.01531, 2019 | 4 | 2019 |
An Extensible Orchestration and Protection Framework for Confidential Cloud Computing A Ahmad, A Schultz, P Fonseca, B Lee | 4* | |
Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability V Gandhi, S Banerjee, A Agrawal, A Ahmad, S Lee, M Peinado 32nd USENIX Security Symposium (USENIX Security 23), 391-408, 2023 | 3 | 2023 |
Detecting and Defending Against Certificate Attacks with Origin-Bound CAPTCHAs A Ahmad, F Ahmad, L Wei, V Yegneswaran, F Zaffar Security and Privacy in Communication Networks: 14th International …, 2018 | 1 | 2018 |
The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches C Zhang, J Zeng, Y Zhang, A Ahmad, F Zhang, H Jin, Z Liang arXiv preprint arXiv:2409.04484, 2024 | | 2024 |
Data race detection with per-thread memory protection S Lee, A Ahmad US Patent App. 18/082,444, 2023 | | 2023 |
Data race detection with per-thread memory protection S Lee, A Ahmad US Patent 11,556,395, 2023 | | 2023 |
Defeating Critical Threats to Cloud User Data in Trusted Execution Environments A Ahmad Purdue University, 2022 | | 2022 |