Analyzing and detecting emerging Internet of Things malware: A graph-based approach H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ... IEEE Internet of Things Journal 6 (5), 8977-8988, 2019 | 143 | 2019 |
Silent shredder: Zero-cost shredding for secure non-volatile main memory controllers A Awad, P Manadhata, S Haber, Y Solihin, W Horne ACM SIGPLAN Notices 51 (4), 263-276, 2016 | 119 | 2016 |
Obfusmem: A low-overhead access obfuscation for trusted memories A Awad, Y Wang, D Shands, Y Solihin Proceedings of the 44th Annual International Symposium on Computer …, 2017 | 103 | 2017 |
MRIMA: An MRAM-based in-memory accelerator S Angizi, Z He, A Awad, D Fan IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2019 | 102 | 2019 |
Triad-NVM: persistency for integrity-protected and encrypted non-volatile memories A Awad, M Ye, Y Solihin, L Njilla, K Abu Zubair International Symposium in Computer Architecture (ISCA), 104-115, 2019 | 85 | 2019 |
Osiris: A Low-Cost Mechanism to Enable Restoration of Secure Non-Volatile Memories M Ye, C Hughes, A Awad Proceedings of the 51st Annual IEEE/ACM International Symposium on …, 2018 | 82 | 2018 |
Anubis: Low-overhead and practical recovery time for secure non-volatile memories KA Zubair, A Awad International Symposium in Computer Architecture (ISCA), 157-168, 2019 | 80* | 2019 |
Avoiding TLB shootdowns through self-invalidating TLB entries A Awad, A Basu, S Blagodurov, Y Solihin, GH Loh 2017 26th International Conference on Parallel Architectures and Compilation …, 2017 | 54 | 2017 |
Write-Aware Management of NVM-Based Memory Extensions A Awad, S Blagodurov, Y Solihin International Conference on Supercomputing (ICS), 2016 | 41 | 2016 |
Non-Volatile Memory Host Controller Interface Performance Analysis in High-Performance I/O Systems A Awad, B Kettering, Y Solihin 2015 IEEE International Symposium on Performance Analysis of Systems and …, 2015 | 41 | 2015 |
Vr-spy: A side-channel attack on virtual key-logging in vr headsets A Al Arafat, Z Guo, A Awad 2021 IEEE Virtual Reality and 3D User Interfaces (VR), 564-572, 2021 | 40 | 2021 |
Stm: Cloning the spatial and temporal memory access behavior A Awad, Y Solihin High Performance Computer Architecture (HPCA), 2014 IEEE 20th International …, 2014 | 40 | 2014 |
Phoenix: Towards ultra-low overhead, recoverable, and persistently secure nvm M Alwadi, KA Zubair, D Mohaisen, A Awad IEEE Transactions on Dependable and Secure Computing 19 (2), 1049-1063, 2020 | 35* | 2020 |
A keylogging inference attack on air-tapping keyboards in virtual environments Ü Meteriz-Yıldıran, NF Yıldıran, A Awad, D Mohaisen 2022 IEEE Conference on Virtual Reality and 3D User Interfaces (VR), 765-774, 2022 | 23 | 2022 |
Page migration support for disaggregated non-volatile memories VR Kommareddy, SD Hammond, C Hughes, A Samih, A Awad Proceedings of the International Symposium on Memory Systems, 417-427, 2019 | 23 | 2019 |
Inter-task cache interference aware partitioned real-time scheduling Z Guo, K Yang, F Yao, A Awad Proceedings of the 35th annual ACM symposium on applied computing, 218-226, 2020 | 21 | 2020 |
Persistently-secure processors: Challenges and opportunities for securing non-volatile memories A Awad, S Suboh, M Ye, KA Zubair, M Al-Wadi 2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 610-614, 2019 | 21 | 2019 |
DeACT: Architecture-Aware Virtual Memory Support for Fabric Attached Memory Systems VR Kommareddy, C Hughes, SD Hammond, A Awad 2021 IEEE International Symposium on High-Performance Computer Architecture …, 2021 | 16 | 2021 |
Towards low-cost mechanisms to enable restoration of encrypted non-volatile memories M Ye, KA Zubair, A Mohaisen, A Awad IEEE Transactions on Dependable and Secure Computing 18 (4), 1850-1867, 2019 | 16 | 2019 |
Adaptive extension of leases for entries in a translation lookaside buffer A Awad, S Blagodurov, A Basu, MH Oskin, GH Loh, AG Kegel, DS Christie, ... US Patent 10,261,916, 2019 | 16 | 2019 |