Ghada Dessouky
Title
Cited by
Cited by
Year
Automated Synthesis of Optimized Circuits for Secure Computation
D Demmler, G Dessouky, F Koushanfar, AR Sadeghi, T Schneider, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
672015
LO-FAT: Low-overhead Control Flow Attestation in Hardware
G Dessouky, S Zeitouni, T Nyman, A Paverd, L Davi, P Koeberl, N Asokan, ...
Proceedings of the 54th Annual Design Automation Conference 2017, 24, 2017
542017
Atrium: Runtime Attestation Resilient under Memory Attacks
S Zeitouni, G Dessouky, O Arias, D Sullivan, A Ibrahim, Y Jin, AR Sadeghi
Proceedings of the 36th International Conference on Computer-Aided Design …, 2017
442017
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution
G Dessouky, T Abera, A Ibrahim, AR Sadeghi
2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 2018
342018
Pushing the Communication Barrier in Secure Computation using Lookup Tables
G Dessouky, F Koushanfar, AR Sadeghi, T Schneider, S Zeitouni, ...
NDSS, 2017
312017
GarbledCPU: a MIPS Processor for Secure Computation in Hardware
EM Songhori, T Schneider, S Zeitouni, AR Sadeghi, G Dessouky, ...
2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2016
192016
Hardscope: Thwarting DOP with hardware-assisted run-time scope enforcement
T Nyman, G Dessouky, S Zeitouni, A Lehikoinen, A Paverd, N Asokan, ...
arXiv preprint arXiv:1705.10295, 2017
172017
Adaptive Dynamic On-chip Memory Management for FPGA-based Reconfigurable Architectures
G Dessouky, MJ Klaiber, DG Bailey, S Simon
Field Programmable Logic and Applications (FPL), 2014 24th International …, 2014
172014
Towards Systematic Design of Collective Remote Attestation Protocols
IDO Nunes, G Dessouky, A Ibrahim, N Rattanavipanon, AR Sadeghi, ...
Proceedings of the 39th IEEE International Conference on Distributed …, 2019
142019
HardFails: Insights into Software-Exploitable Hardware Bugs
G Dessouky, D Gens, P Haney, G Persyn, A Kanuparthi, H Khattri, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 213-230, 2019
132019
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
ARS Ghada Dessouky, Tommaso Frassetto
29th USENIX Security Symposium (USENIX Security'20), 2020
82020
When a patch is not enough-hardfails: Software-exploitable hardware bugs
G Dessouky, D Gens, P Haney, G Persyn, A Kanuparthi, H Khattri, ...
arXiv preprint arXiv:1812.00197, 2018
42018
Hardscope: Hardening embedded systems against data-oriented attacks
T Nyman, G Dessouky, S Zeitouni, A Lehikoinen, A Paverd, N Asokan, ...
2019 56th ACM/IEEE Design Automation Conference (DAC), 1-6, 2019
32019
Poster: Exploiting dynamic partial reconfiguration for improved resistance against power analysis attacks on FPGAs
G Dessouky, AR Sadeghi
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
22016
CURE: A Security Architecture with CUstomizable and Resilient Enclaves
R Bahmani, F Brasser, G Dessouky, P Jauernig, M Klimmek, AR Sadeghi, ...
arXiv preprint arXiv:2010.15866, 2020
2020
SAFE: A Secure and Efficient Long-Term Distributed Storage System
J Buchmann, G Dessouky, T Frassetto, Á Kiss, AR Sadeghi, T Schneider, ...
Proceedings of the 8th International Workshop on Security in Blockchain and …, 2020
2020
SoK: On the Security Challenges and Risks of Multi-Tenant FPGAs in the Cloud
S Zeitouni, G Dessouky, AR Sadeghi
arXiv preprint arXiv:2009.13914, 2020
2020
AI Utopia or Dystopia-On Securing AI Platforms
G Dessouky, P Jauernig, N Mentens, AR Sadeghi, E Stapf
2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020
2020
With Great Complexity Comes Great Vulnerability: Challenges of Secure Processor Design
G Dessouky, T Frassetto, P Jauernig, AR Sadeghi
IEEE Security & Privacy, 2020
2020
With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security
G Dessouky, T Frassetto, P Jauernig, AR Sadeghi, E Stapf
IEEE Security & Privacy 18 (5), 57-66, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20