Search Results - "Dessouky, Ghada"
-
1
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution
Published in 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) (01-11-2018)“…Unlike traditional processors, embedded Internet of Things (IoT) devices lack resources to incorporate protection against modern sophisticated attacks…”
Get full text
Conference Proceeding -
2
LO-FAT: Low-Overhead control Flow ATtestation in hardware
Published in 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC) (01-06-2017)“…Attacks targeting software on embedded systems are becoming increasingly prevalent. Remote attestation is a mechanism that allows establishing trust in…”
Get full text
Conference Proceeding -
3
INVITED: AI Utopia or Dystopia - On Securing AI Platforms
Published in 2020 57th ACM/IEEE Design Automation Conference (DAC) (01-07-2020)“…Today we are witnessing the widespread deployment of AI algorithms on many computing platforms already to provide various services, thus driving the growing…”
Get full text
Conference Proceeding -
4
HardScope: Hardening Embedded Systems Against Data-Oriented Attacks
Published in 2019 56th ACM/IEEE Design Automation Conference (DAC) (01-06-2019)“…Memory-unsafe programming languages like C and C++ leave many (embedded) systems vulnerable to attacks like control-flow hijacking. However, defenses against…”
Get full text
Conference Proceeding -
5
Towards Systematic Design of Collective Remote Attestation Protocols
Published in 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS) (01-07-2019)“…Networks of and embedded (IoT) devices are becoming increasingly popular, particularly, in settings such as smart homes, factories and vehicles. These networks…”
Get full text
Conference Proceeding -
6
CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems
Published in 2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) (01-11-2019)“…Real-time autonomous systems are becoming pervasive in many application domains such as vehicular ad-hoc networks, smart factories and delivery drones. The…”
Get full text
Conference Proceeding -
7
Distributed Memory Guard: Enabling Secure Enclave Computing in NoC-based Architectures
Published in 2021 58th ACM/IEEE Design Automation Conference (DAC) (05-12-2021)“…Emerging applications, like cloud services, are demanding more computational power, while also giving rise to various security and privacy challenges. Current…”
Get full text
Conference Proceeding -
8
GarbledCPU: A MIPS processor for secure computation in hardware
Published in 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC) (05-06-2016)“…We present GarbledCPU, the first framework that realizes a hardware-based general purpose sequential processor for secure computation. Our MIPS-based…”
Get full text
Conference Proceeding -
9
SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities
Published in 2021 IEEE European Symposium on Security and Privacy (EuroS&P) (01-09-2021)“…Field Programmable Gate Arrays (FPGAs) are increasingly deployed in datacenters due to their inherent flexibility over ASICs or GPUs that makes them an ideal…”
Get full text
Conference Proceeding -
10
SoK: On the Security Challenges and Risks of Multi-Tenant FPGAs in the Cloud
Published 29-09-2020“…In their continuous growth and penetration into new markets, Field Programmable Gate Arrays (FPGAs) have recently made their way into hardware acceleration of…”
Get full text
Journal Article -
11
ATRIUM: Runtime attestation resilient under memory attacks
Published in 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) (01-11-2017)“…Remote attestation is an important security service that allows a trusted party (verifier) to verify the integrity of a software running on a remote and…”
Get full text
Conference Proceeding -
12
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
Published 20-09-2019“…Modern multi-core processors share cache resources for maximum cache utilization and performance gains. However, this leaves the cache vulnerable to…”
Get full text
Journal Article -
13
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures
Published 15-10-2021“…Shared cache resources in multi-core processors are vulnerable to cache side-channel attacks. Recently proposed defenses have their own caveats:…”
Get full text
Journal Article -
14
CURE: A Security Architecture with CUstomizable and Resilient Enclaves
Published 29-10-2020“…Security architectures providing Trusted Execution Environments (TEEs) have been an appealing research subject for a wide range of computer systems, from…”
Get full text
Journal Article -
15
Adaptive Dynamic On-chip Memory Management for FPGA-based reconfigurable architectures
Published in 2014 24th International Conference on Field Programmable Logic and Applications (FPL) (01-09-2014)“…In this paper, an adaptive architecture for dynamic management and allocation of on-chip FPGA Block Random Access Memory (BRAM) resources is presented. This…”
Get full text
Conference Proceeding -
16
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs
Published 01-12-2018“…In this paper, we take a deep dive into microarchitectural security from a hardware designer's perspective by reviewing the existing approaches to detect…”
Get full text
Journal Article -
17
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement
Published 29-05-2017“…Widespread use of memory unsafe programming languages (e.g., C and C++) leaves many systems vulnerable to memory corruption attacks. A variety of defenses have…”
Get full text
Journal Article -
18
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware
Published 12-06-2017“…Attacks targeting software on embedded systems are becoming increasingly prevalent. Remote attestation is a mechanism that allows establishing trust in…”
Get full text
Journal Article -
19
Security & Privacy Week Interviews, Part 3
Published in IEEE security & privacy (01-01-2017)“…IEEE Security & Privacy met with several interesting speakers at Security & Privacy Week (SPW) 2016 in Darmstadt, Germany. This issue features Srdan Capkun,…”
Get full text
Magazine Article -
20
Security & Privacy Week Interviews, Part 2
Published in IEEE security & privacy (01-11-2016)“…IEEE Security & Privacy met with several interesting speakers at Security & Privacy Week (SPW) 2016 in Darmstadt, Germany. This issue features Susan Landau,…”
Get full text
Magazine Article