关注
Adil Ahmad
Adil Ahmad
Assistant Professor, Arizona State University
在 asu.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
OBLIVIATE: A Data Oblivious Filesystem for Intel SGX.
A Ahmad, K Kim, MI Sarfaraz, B Lee
NDSS, 2018
1622018
Obfuscuro: A commodity obfuscation engine on intel sgx
A Ahmad, B Joe, Y Xiao, Y Zhang, I Shin, B Lee
Network and Distributed System Security Symposium, 2019
882019
{SHARD}:{Fine-Grained} Kernel Specialization with {Context-Aware} Hardening
M Abubakar, A Ahmad, P Fonseca, D Xu
30th USENIX Security Symposium (USENIX Security 21), 2435-2452, 2021
402021
TRUSTORE: Side-Channel Resistant Storage for SGX using Intel Hybrid CPU-FPGA
H Oh, A Ahmad, S Park, B Lee, Y Paek
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
292020
CHANCEL: Efficient Multi-client Isolation Under Adversarial Programs.
A Ahmad, J Kim, J Seo, I Shin, P Fonseca, B Lee
NDSS, 2021
252021
Hardlog: Practical tamper-proof system auditing using a novel audit device
A Ahmad, S Lee, M Peinado
2022 IEEE Symposium on Security and Privacy (SP), 1791-1807, 2022
192022
Kard: lightweight data race detection with per-thread memory protection
A Ahmad, S Lee, P Fonseca, B Lee
Proceedings of the 26th ACM International Conference on Architectural …, 2021
192021
A tale of two trees: One writes, and other reads: Optimized oblivious accesses to bitcoin and other utxo-based blockchains
DV Le, LT Hurtado, A Ahmad, M Minaei, B Lee, A Kate
Proceedings on Privacy Enhancing Technologies 2020 (2), 2020
182020
BlackMirror: Preventing Wallhacks in 3D Online FPS Games
S Park, A Ahmad, B Lee
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
172020
A Tale of Two Trees: One Writes, and Other Reads.{Optimized Oblivious Accesses to Large-Scale Blockchains}
DV Le, LT Hurtado, A Ahmad, M Minaei, B Lee, A Kate
arXiv preprint arXiv:1909.01531, 2019
42019
An Extensible Orchestration and Protection Framework for Confidential Cloud Computing
A Ahmad, A Schultz, P Fonseca, B Lee
2*
Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability
V Gandhi, S Banerjee, A Agrawal, A Ahmad, S Lee, M Peinado
32nd USENIX Security Symposium (USENIX Security 23), 391-408, 2023
12023
Data race detection with per-thread memory protection
S Lee, A Ahmad
US Patent App. 18/082,444, 2023
2023
Veil: A Protected Services Framework for Confidential Virtual Machines
A Ahmad, B Ou, C Liu, X Zhang, P Fonseca
Proceedings of the 28th ACM International Conference on Architectural …, 2023
2023
Data race detection with per-thread memory protection
S Lee, A Ahmad
US Patent 11,556,395, 2023
2023
Defeating Critical Threats to Cloud User Data in Trusted Execution Environments
A Ahmad
Purdue University, 2022
2022
Detecting and Defending Against Certificate Attacks with Origin-Bound CAPTCHAs
A Ahmad, F Ahmad, L Wei, V Yegneswaran, F Zaffar
Security and Privacy in Communication Networks: 14th International …, 2018
2018
系统目前无法执行此操作,请稍后再试。
文章 1–17