关注
Ahmed M. Azab
Ahmed M. Azab
在 fb.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Hypersentry: enabling stealthy in-context measurement of hypervisor integrity
AM Azab, P Ning, Z Wang, X Jiang, X Zhang, NC Skalsky
Proceedings of the 17th ACM conference on Computer and communications …, 2010
4142010
Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world
AM Azab, P Ning, J Shah, Q Chen, R Bhutkar, G Ganesh, J Ma, W Shen
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
3802014
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
C Kil, EC Sezer, AM Azab, P Ning, X Zhang
2009 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2009
1922009
Sice: a hardware-level strongly isolated computing environment for x86 multi-core platforms
AM Azab, P Ning, X Zhang
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1912011
HIMA: A hypervisor-based integrity measurement agent
AM Azab, P Ning, EC Sezer, X Zhang
2009 Annual Computer Security Applications Conference, 461-470, 2009
1762009
SKEE: A lightweight Secure Kernel-level Execution Environment for ARM.
AM Azab, K Swidowski, R Bhutkar, J Ma, W Shen, R Wang, P Ning
NDSS 16, 21-24, 2016
1142016
{EASEAndroid}: Automatic Policy Analysis and Refinement for Security Enhanced Android via {Large-Scale}{Semi-Supervised} Learning
R Wang, W Enck, D Reeves, X Zhang, P Ning, D Xu, W Zhou, AM Azab
24th USENIX Security Symposium (USENIX Security 15), 351-366, 2015
902015
{PeX}: A permission check analysis framework for linux kernel
T Zhang, W Shen, D Lee, C Jung, AM Azab, R Wang
28th USENIX Security Symposium (USENIX Security 19), 1205-1220, 2019
732019
NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64
WS Yaohui Chen, Dongli Zhang, Ruowen Wang, Rui Qiao, Ahmed M. Azab, Long Lu ...
38th IEEE Symposium on Security and Privacy, 2017
55*2017
Methods and apparatus for protecting operating system data
Q Chen, A Azab, P Ning, G Ganesh
US Patent 9,772,953, 2017
452017
PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks
PN Quan Chen, Ahmed M Azab, Guruprasad Ganesh
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
432017
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android
YC Ruowen Wang, Ahmed M Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen ...
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
372017
Seer: practical memory virus scanning as a service
J Gionta, A Azab, W Enck, P Ning, X Zhang
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
232014
Methods, systems, and computer readable medium for active monitoring, memory protection and integrity verification of target devices
A Azab, P Ning
US Patent 9,483,635, 2016
162016
Apparatus and method for transparent, secure element-based mediation of on-board diagnostic operations
P Ning, SE McLaughlin, MC Grace, AM Azab, R Bhutkar, W Shen, X Chen, ...
US Patent 10,320,745, 2019
112019
Passive monitoring of virtual systems using agent-less, offline indexing
GS Ammons, AM Azab, V Bala, SS Duri, TW Mummert, DC Reimer, ...
US Patent App. 13/527,948, 2013
112013
A lightweight framework for fine-grained lifecycle control of android applications
Y Shao, R Wang, X Chen, AM Azab, ZM Mao
Proceedings of the Fourteenth EuroSys Conference 2019, 1-14, 2019
102019
Apparatus and method for protection of critical embedded system components via hardware-isolated secure element-based monitor
P Ning, SE McLaughlin, MC Grace, AM Azab, R Bhutkar, W Shen, X Chen, ...
US Patent 10,402,561, 2019
72019
{DACSA}: A Decoupled Architecture for Cloud Security Analysis
J Gionta, A Azab, W Enck, P Ning, X Zhang
7th Workshop on Cyber Security Experimentation and Test (CSET 14), 2014
72014
KALD: Detecting Direct Pointer Disclosure Vulnerabilities
B Belleville, W Shen, S Volckaert, AM Azab, M Franz
IEEE Transactions on Dependable and Secure Computing 18 (3), 1369-1377, 2019
52019
系统目前无法执行此操作,请稍后再试。
文章 1–20