Search Results - "Dessouky, Ghada"

Refine Results
  1. 1

    LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution by Dessouky, Ghada, Abera, Tigist, Ibrahim, Ahmad, Sadeghi, Ahmad-Reza

    “…Unlike traditional processors, embedded Internet of Things (IoT) devices lack resources to incorporate protection against modern sophisticated attacks…”
    Get full text
    Conference Proceeding
  2. 2

    LO-FAT: Low-Overhead control Flow ATtestation in hardware by Dessouky, Ghada, Zeitouni, Shaza, Nyman, Thomas, Paverd, Andrew, Davi, Lucas, Koeberl, Patrick, Asokan, N., Sadeghi, Ahmad-Reza

    “…Attacks targeting software on embedded systems are becoming increasingly prevalent. Remote attestation is a mechanism that allows establishing trust in…”
    Get full text
    Conference Proceeding
  3. 3

    INVITED: AI Utopia or Dystopia - On Securing AI Platforms by Dessouky, Ghada, Jauernig, Patrick, Mentens, Nele, Sadeghi, Ahmad-Reza, Stapf, Emmanuel

    “…Today we are witnessing the widespread deployment of AI algorithms on many computing platforms already to provide various services, thus driving the growing…”
    Get full text
    Conference Proceeding
  4. 4

    HardScope: Hardening Embedded Systems Against Data-Oriented Attacks by Nyman, Thomas, Dessouky, Ghada, Zeitouni, Shaza, Lehikoinen, Aaro, Paverd, Andrew, Asokan, N., Sadeghi, Ahmad-Reza

    “…Memory-unsafe programming languages like C and C++ leave many (embedded) systems vulnerable to attacks like control-flow hijacking. However, defenses against…”
    Get full text
    Conference Proceeding
  5. 5

    Towards Systematic Design of Collective Remote Attestation Protocols by De Oliveira Nunes, Ivan, Dessouky, Ghada, Ibrahim, Ahmad, Rattanavipanon, Norrathep, Sadeghi, Ahmad-Reza, Tsudik, Gene

    “…Networks of and embedded (IoT) devices are becoming increasingly popular, particularly, in settings such as smart homes, factories and vehicles. These networks…”
    Get full text
    Conference Proceeding
  6. 6

    CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems by Dessouky, Ghada, Zeitouni, Shaza, Ibrahim, Ahmad, Davi, Lucas, Sadeghi, Ahmad-Reza

    “…Real-time autonomous systems are becoming pervasive in many application domains such as vehicular ad-hoc networks, smart factories and delivery drones. The…”
    Get full text
    Conference Proceeding
  7. 7

    Distributed Memory Guard: Enabling Secure Enclave Computing in NoC-based Architectures by Dessouky, Ghada, Isakov, Mihailo, Kinsy, Michel A., Mahmoody, Pouya, Mark, Miguel, Sadeghi, Ahmad-Reza, Stapf, Emmanuel, Zeitouni, Shaza

    “…Emerging applications, like cloud services, are demanding more computational power, while also giving rise to various security and privacy challenges. Current…”
    Get full text
    Conference Proceeding
  8. 8

    GarbledCPU: A MIPS processor for secure computation in hardware by Songhori, Ebrahim M., Schneider, Thomas, Zeitouni, Shaza, Sadeghi, Ahmad-Reza, Dessouky, Ghada, Koushanfar, Farinaz

    “…We present GarbledCPU, the first framework that realizes a hardware-based general purpose sequential processor for secure computation. Our MIPS-based…”
    Get full text
    Conference Proceeding
  9. 9

    SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities by Dessouky, Ghada, Sadeghi, Ahmad-Reza, Zeitouni, Shaza

    “…Field Programmable Gate Arrays (FPGAs) are increasingly deployed in datacenters due to their inherent flexibility over ASICs or GPUs that makes them an ideal…”
    Get full text
    Conference Proceeding
  10. 10

    SoK: On the Security Challenges and Risks of Multi-Tenant FPGAs in the Cloud by Zeitouni, Shaza, Dessouky, Ghada, Sadeghi, Ahmad-Reza

    Published 29-09-2020
    “…In their continuous growth and penetration into new markets, Field Programmable Gate Arrays (FPGAs) have recently made their way into hardware acceleration of…”
    Get full text
    Journal Article
  11. 11

    ATRIUM: Runtime attestation resilient under memory attacks by Zeitouni, Shaza, Dessouky, Ghada, Arias, Orlando, Sullivan, Dean, Ibrahim, Ahmad, Yier Jin, Sadeghi, Ahmad-Reza

    “…Remote attestation is an important security service that allows a trusted party (verifier) to verify the integrity of a software running on a remote and…”
    Get full text
    Conference Proceeding
  12. 12

    HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments by Dessouky, Ghada, Frassetto, Tommaso, Sadeghi, Ahmad-Reza

    Published 20-09-2019
    “…Modern multi-core processors share cache resources for maximum cache utilization and performance gains. However, this leaves the cache vulnerable to…”
    Get full text
    Journal Article
  13. 13

    Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures by Dessouky, Ghada, Gruler, Alexander, Mahmoody, Pouya, Sadeghi, Ahmad-Reza, Stapf, Emmanuel

    Published 15-10-2021
    “…Shared cache resources in multi-core processors are vulnerable to cache side-channel attacks. Recently proposed defenses have their own caveats:…”
    Get full text
    Journal Article
  14. 14

    CURE: A Security Architecture with CUstomizable and Resilient Enclaves by Bahmani, Raad, Brasser, Ferdinand, Dessouky, Ghada, Jauernig, Patrick, Klimmek, Matthias, Sadeghi, Ahmad-Reza, Stapf, Emmanuel

    Published 29-10-2020
    “…Security architectures providing Trusted Execution Environments (TEEs) have been an appealing research subject for a wide range of computer systems, from…”
    Get full text
    Journal Article
  15. 15

    Adaptive Dynamic On-chip Memory Management for FPGA-based reconfigurable architectures by Dessouky, Ghada, Klaiber, Michael J., Bailey, Donald G., Simon, Sven

    “…In this paper, an adaptive architecture for dynamic management and allocation of on-chip FPGA Block Random Access Memory (BRAM) resources is presented. This…”
    Get full text
    Conference Proceeding
  16. 16

    When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs by Dessouky, Ghada, Gens, David, Haney, Patrick, Persyn, Garrett, Kanuparthi, Arun, Khattri, Hareesh, Fung, Jason M, Sadeghi, Ahmad-Reza, Rajendran, Jeyavijayan

    Published 01-12-2018
    “…In this paper, we take a deep dive into microarchitectural security from a hardware designer's perspective by reviewing the existing approaches to detect…”
    Get full text
    Journal Article
  17. 17

    HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement by Nyman, Thomas, Dessouky, Ghada, Zeitouni, Shaza, Lehikoinen, Aaro, Paverd, Andrew, Asokan, N, Sadeghi, Ahmad-Reza

    Published 29-05-2017
    “…Widespread use of memory unsafe programming languages (e.g., C and C++) leaves many systems vulnerable to memory corruption attacks. A variety of defenses have…”
    Get full text
    Journal Article
  18. 18

    LO-FAT: Low-Overhead Control Flow ATtestation in Hardware by Dessouky, Ghada, Zeitouni, Shaza, Nyman, Thomas, Paverd, Andrew, Davi, Lucas, Koeberl, Patrick, Asokan, N, Sadeghi, Ahmad-Reza

    Published 12-06-2017
    “…Attacks targeting software on embedded systems are becoming increasingly prevalent. Remote attestation is a mechanism that allows establishing trust in…”
    Get full text
    Journal Article
  19. 19

    Security & Privacy Week Interviews, Part 3 by Sadeghi, Ahmad-Reza, Dessouky, Ghada

    Published in IEEE security & privacy (01-01-2017)
    “…IEEE Security & Privacy met with several interesting speakers at Security & Privacy Week (SPW) 2016 in Darmstadt, Germany. This issue features Srdan Capkun,…”
    Get full text
    Magazine Article
  20. 20

    Security & Privacy Week Interviews, Part 2 by Sadeghi, Ahmad-Reza, Dessouky, Ghada

    Published in IEEE security & privacy (01-11-2016)
    “…IEEE Security & Privacy met with several interesting speakers at Security & Privacy Week (SPW) 2016 in Darmstadt, Germany. This issue features Susan Landau,…”
    Get full text
    Magazine Article