Hypersentry: enabling stealthy in-context measurement of hypervisor integrity AM Azab, P Ning, Z Wang, X Jiang, X Zhang, NC Skalsky Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 414 | 2010 |
Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world AM Azab, P Ning, J Shah, Q Chen, R Bhutkar, G Ganesh, J Ma, W Shen Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 380 | 2014 |
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence C Kil, EC Sezer, AM Azab, P Ning, X Zhang 2009 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2009 | 192 | 2009 |
Sice: a hardware-level strongly isolated computing environment for x86 multi-core platforms AM Azab, P Ning, X Zhang Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 191 | 2011 |
HIMA: A hypervisor-based integrity measurement agent AM Azab, P Ning, EC Sezer, X Zhang 2009 Annual Computer Security Applications Conference, 461-470, 2009 | 176 | 2009 |
SKEE: A lightweight Secure Kernel-level Execution Environment for ARM. AM Azab, K Swidowski, R Bhutkar, J Ma, W Shen, R Wang, P Ning NDSS 16, 21-24, 2016 | 114 | 2016 |
{EASEAndroid}: Automatic Policy Analysis and Refinement for Security Enhanced Android via {Large-Scale}{Semi-Supervised} Learning R Wang, W Enck, D Reeves, X Zhang, P Ning, D Xu, W Zhou, AM Azab 24th USENIX Security Symposium (USENIX Security 15), 351-366, 2015 | 90 | 2015 |
{PeX}: A permission check analysis framework for linux kernel T Zhang, W Shen, D Lee, C Jung, AM Azab, R Wang 28th USENIX Security Symposium (USENIX Security 19), 1205-1220, 2019 | 73 | 2019 |
NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64 WS Yaohui Chen, Dongli Zhang, Ruowen Wang, Rui Qiao, Ahmed M. Azab, Long Lu ... 38th IEEE Symposium on Security and Privacy, 2017 | 55* | 2017 |
Methods and apparatus for protecting operating system data Q Chen, A Azab, P Ning, G Ganesh US Patent 9,772,953, 2017 | 45 | 2017 |
PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks PN Quan Chen, Ahmed M Azab, Guruprasad Ganesh Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 43 | 2017 |
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android YC Ruowen Wang, Ahmed M Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen ... Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 37 | 2017 |
Seer: practical memory virus scanning as a service J Gionta, A Azab, W Enck, P Ning, X Zhang Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 23 | 2014 |
Methods, systems, and computer readable medium for active monitoring, memory protection and integrity verification of target devices A Azab, P Ning US Patent 9,483,635, 2016 | 16 | 2016 |
Apparatus and method for transparent, secure element-based mediation of on-board diagnostic operations P Ning, SE McLaughlin, MC Grace, AM Azab, R Bhutkar, W Shen, X Chen, ... US Patent 10,320,745, 2019 | 11 | 2019 |
Passive monitoring of virtual systems using agent-less, offline indexing GS Ammons, AM Azab, V Bala, SS Duri, TW Mummert, DC Reimer, ... US Patent App. 13/527,948, 2013 | 11 | 2013 |
A lightweight framework for fine-grained lifecycle control of android applications Y Shao, R Wang, X Chen, AM Azab, ZM Mao Proceedings of the Fourteenth EuroSys Conference 2019, 1-14, 2019 | 10 | 2019 |
Apparatus and method for protection of critical embedded system components via hardware-isolated secure element-based monitor P Ning, SE McLaughlin, MC Grace, AM Azab, R Bhutkar, W Shen, X Chen, ... US Patent 10,402,561, 2019 | 7 | 2019 |
{DACSA}: A Decoupled Architecture for Cloud Security Analysis J Gionta, A Azab, W Enck, P Ning, X Zhang 7th Workshop on Cyber Security Experimentation and Test (CSET 14), 2014 | 7 | 2014 |
KALD: Detecting Direct Pointer Disclosure Vulnerabilities B Belleville, W Shen, S Volckaert, AM Azab, M Franz IEEE Transactions on Dependable and Secure Computing 18 (3), 1369-1377, 2019 | 5 | 2019 |