Seguir
Ahmad Atamli
Título
Citado por
Citado por
Año
Threat-based security analysis for the internet of things
AW Atamli, A Martin
2014 International workshop on secure internet of things, 35-43, 2014
2472014
Audroid: Preventing attacks on audio channels in mobile devices
G Petracca, Y Sun, T Jaeger, A Atamli
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
942015
{AWare}: Preventing Abuse of {Privacy-Sensitive} Sensors via Operation Bindings
G Petracca, AA Reineh, Y Sun, J Grossklags, T Jaeger
26th USENIX security symposium (USENIX Security 17), 379-396, 2017
462017
Analysis of trusted execution environment usage in samsung KNOX
A Atamli-Reineh, R Borgaonkar, RA Balisane, G Petracca, A Martin
Proceedings of the 1st Workshop on System Software for Trusted Execution, 1-6, 2016
262016
Towards a usable framework for modelling security and privacy risks in the smart home
JRC Nurse, A Atamli, A Martin
Human Aspects of Information Security, Privacy, and Trust: 4th International …, 2016
242016
Securing application with software partitioning: a case study using SGX
AA Reineh, AA Martin
International Conference on Security and Privacy 164, 2015
22*2015
A framework for application partitioning using trusted execution environments
A Atamli‐Reineh, A Paverd, G Petracca, A Martin
Concurrency and Computation: Practice and Experience 29 (23), e4130, 2017
132017
{EnTrust}: Regulating Sensor Access by Cooperating Programs via Delegation Graphs
G Petracca, Y Sun, AA Reineh, P McDaniel, J Grossklags, T Jaeger
28th USENIX Security Symposium (USENIX Security 19), 567-584, 2019
122019
IO-Trust: an out-of-band trusted memory acquisition for intrusion detection and forensics investigations in cloud IOMMU based systems
A Atamli, G Petracca, J Crowcroft
Proceedings of the 14th International Conference on Availability …, 2019
72019
Aware: Controlling app access to I/O devices on mobile platforms
G Petracca, A Atamli, Y Sun, J Grossklags, T Jaeger
arXiv preprint arXiv:1604.02171, 2016
72016
Preserving confidentiality of tenants in cloud environment when deploying security services
A Atamli, R Ailabouni, A Saleh, A Levanon, T Nguyen, M Overby
US Patent 12,032,680, 2024
52024
One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices
M Chilese, R Mitev, M Orenbach, R Thorburn, A Atamli, AR Sadeghi
arXiv preprint arXiv:2403.07465, 2024
52024
Enabling secure and usable mobile application: revealing the nuts and bolts of software TPM in todays mobile devices
AA Reineh, G Petracca, J Uusilehto, A Martin
arXiv preprint arXiv:1606.02995, 2016
42016
Live system call trace reconstruction on Linux
T Nguyen, M Orenbach, A Atamli
Forensic Science International: Digital Investigation 42, 301398, 2022
32022
Forensic analysis of Tor in Windows environment: A case study
VM Angeli, A Atamli, E Karafili
Proceedings of the 17th International Conference on Availability …, 2022
22022
Architectures for Enhancing Authentication Privacy and Security Using Trusted Computing
RA Balisane, R Borgaonkar, A Atamli-Reineh, A Martin
Proceedings of the 2nd Workshop on System Software for Trusted Execution, 1-7, 2017
22017
Nurse, Ahmed Atamli, Andrew Martin, Towards Usable Framework for Modelling Security Privacy Risk in smart home
RC Jason
4th International Conference on Human Aspects of Information Security …, 2016
22016
Trustworthy and Secure Service-Oriented Architecture for the Internet of Things
AA Reineh, AJ Paverd, AP Martin
The 4th International Conference on the Internet of Things (IoT 2014), 2014
22014
GNS: Graph-based Network-on-Chip Shield for Early Defense Against Malicious Nodes in MPSoC
H Wang, J Ren, B Halak, A Atamli
IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 2024
12024
DL2Fence: Integrating deep learning and frame fusion for enhanced detection and localization of refined denial-of-service in large-scale NoCs
H Wang, B Halak, J Ren, A Atamli
Proceedings of the 61st ACM/IEEE Design Automation Conference, 1-6, 2024
12024
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20