Cache storage channels: Alias-driven attacks and verified countermeasures R Guanciale, H Nemati, C Baumann, M Dam 2016 IEEE Symposium on Security and Privacy (SP), 38-55, 2016 | 115 | 2016 |
Formal verification of information flow security for a simple ARM-based separation kernel M Dam, R Guanciale, N Khakpour, H Nemati, O Schwarz Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 114 | 2013 |
Osiris: Automated discovery of microarchitectural side channels D Weber, A Ibrahim, H Nemati, M Schwarz, C Rossow 30th USENIX Security Symposium (USENIX Security 21), 1415-1432, 2021 | 55 | 2021 |
Machine code verification of a tiny ARM hypervisor M Dam, R Guanciale, H Nemati Proceedings of the 3rd international workshop on Trustworthy embedded …, 2013 | 41 | 2013 |
Axiomatic hardware-software contracts for security N Mosier, H Lachnitt, H Nemati, C Trippel Proceedings of the 49th Annual International Symposium on Computer …, 2022 | 35 | 2022 |
Provably secure memory isolation for Linux on ARM R Guanciale, H Nemati, M Dam, C Baumann Journal of Computer Security 24 (6), 793-837, 2016 | 25 | 2016 |
Trustworthy virtualization of the ARMv7 memory subsystem H Nemati, R Guanciale, M Dam SOFSEM 2015: Theory and Practice of Computer Science: 41st International …, 2015 | 24 | 2015 |
Validation of abstract side-channel models for computer architectures H Nemati, P Buiras, A Lindner, R Guanciale, S Jacobs Computer Aided Verification: 32nd International Conference, CAV 2020, Los …, 2020 | 23 | 2020 |
Validation of side-channel models via observation refinement P Buiras, H Nemati, A Lindner, R Guanciale MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture …, 2021 | 22 | 2021 |
Confllvm: A compiler for enforcing data confidentiality in low-level code A Brahmakshatriya, P Kedia, DP McKee, D Garg, A Lal, A Rastogi, ... Proceedings of the Fourteenth EuroSys Conference 2019, 1-15, 2019 | 17 | 2019 |
Trustworthy prevention of code injection in linux on embedded devices H Chfouka, H Nemati, R Guanciale, M Dam, P Ekdahl Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 15 | 2015 |
Tcvisor: A hypervisor level secure storage M Rezaei, NS Moosavi, H Nemati, R Azmi 2010 International Conference for Internet Technology and Secured …, 2010 | 12 | 2010 |
On compositional information flow aware refinement C Baumann, M Dam, R Guanciale, H Nemati 2021 IEEE 34th Computer Security Foundations Symposium (CSF), 1-16, 2021 | 11 | 2021 |
Microarchitectural leakage templates and their application to cache-based side channels A Ibrahim, H Nemati, T Schlüter, NO Tippenhauer, C Rossow Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 10 | 2022 |
Input algebras R Gopinath, H Nemati, A Zeller 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 9 | 2021 |
Speculative leakage in ARM cortex-a53 H Nemati, R Guanciale, P Buiras, A Lindner arXiv preprint arXiv:2007.06865, 2020 | 9 | 2020 |
Hypervisor-based intrusion detection using artificial immune systems R Azmi, B Pishgoo, H Nemati 8th international Iranian ISC conference on information security and …, 2011 | 7 | 2011 |
Secure System Virtualization: End-to-End Verification of Memory Isolation H Nemati Royal Institute of Technology, Stockholm, Sweden, 2017 | 6 | 2017 |
Serberus: Protecting Cryptographic Code from Spectres at Compile-Time N Mosier, H Nemati, JC Mitchell, C Trippel arXiv preprint arXiv:2309.05174, 2023 | 5 | 2023 |
FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers T Schlüter, A Choudhari, L Hetterich, L Trampert, H Nemati, A Ibrahim, ... Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 3 | 2023 |