Seguir
Ghada Dessouky
Ghada Dessouky
TU Darmstadt | Google
Dirección de correo verificada de trust.tu-darmstadt.de - Página principal
Título
Citado por
Citado por
Año
LO-FAT: Low-overhead Control Flow Attestation in Hardware
G Dessouky, S Zeitouni, T Nyman, A Paverd, L Davi, P Koeberl, N Asokan, ...
Proceedings of the 54th Annual Design Automation Conference 2017, 24, 2017
1522017
{CURE}: A security architecture with {CUstomizable} and resilient enclaves
R Bahmani, F Brasser, G Dessouky, P Jauernig, M Klimmek, AR Sadeghi, ...
30th USENIX Security Symposium (USENIX Security 21), 1073-1090, 2021
1252021
HardFails: Insights into Software-Exploitable Hardware Bugs
G Dessouky, D Gens, P Haney, G Persyn, A Kanuparthi, H Khattri, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 213-230, 2019
1232019
Atrium: Runtime Attestation Resilient under Memory Attacks
S Zeitouni, G Dessouky, O Arias, D Sullivan, A Ibrahim, Y Jin, AR Sadeghi
Proceedings of the 36th International Conference on Computer-Aided Design …, 2017
1212017
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
ARS Ghada Dessouky, Tommaso Frassetto
29th USENIX Security Symposium (USENIX Security'20), 2020
1142020
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution
G Dessouky, T Abera, A Ibrahim, AR Sadeghi
2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 2018
1092018
Automated Synthesis of Optimized Circuits for Secure Computation
D Demmler, G Dessouky, F Koushanfar, AR Sadeghi, T Schneider, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1012015
Pushing the Communication Barrier in Secure Computation using Lookup Tables
G Dessouky, F Koushanfar, AR Sadeghi, T Schneider, S Zeitouni, ...
NDSS, 2017
792017
GarbledCPU: a MIPS Processor for Secure Computation in Hardware
EM Songhori, T Schneider, S Zeitouni, AR Sadeghi, G Dessouky, ...
2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2016
402016
Towards Systematic Design of Collective Remote Attestation Protocols
IDO Nunes, G Dessouky, A Ibrahim, N Rattanavipanon, AR Sadeghi, ...
Proceedings of the 39th IEEE International Conference on Distributed …, 2019
312019
Hardscope: Thwarting DOP with hardware-assisted run-time scope enforcement
T Nyman, G Dessouky, S Zeitouni, A Lehikoinen, A Paverd, N Asokan, ...
arXiv preprint arXiv:1705.10295, 2017
262017
SoK: Secure FPGA multi-tenancy in the cloud: Challenges and opportunities
G Dessouky, AR Sadeghi, S Zeitouni
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 487-506, 2021
252021
Adaptive Dynamic On-chip Memory Management for FPGA-based Reconfigurable Architectures
G Dessouky, MJ Klaiber, DG Bailey, S Simon
Field Programmable Logic and Applications (FPL), 2014 24th International …, 2014
252014
Chunked-cache: On-demand and scalable cache isolation for security architectures
G Dessouky, A Gruler, P Mahmoody, AR Sadeghi, E Stapf
arXiv preprint arXiv:2110.08139, 2021
212021
HardScope: Hardening embedded systems against data-oriented attacks
T Nyman, G Dessouky, S Zeitouni, A Lehikoinen, A Paverd, N Asokan, ...
Proceedings of the 56th Annual Design Automation Conference 2019, 1-6, 2019
182019
Litehax: lightweight hardware-assisted attestation of program execution. In 2018 IEEE
G Dessouky, T Abera, A Ibrahim, AR Sadeghi
ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 0
13
SoK: On the security challenges and risks of multi-tenant FPGAs in the cloud
S Zeitouni, G Dessouky, AR Sadeghi
arXiv preprint arXiv:2009.13914, 2020
92020
SAFE: A secure and efficient long-term distributed storage system
J Buchmann, G Dessouky, T Frassetto, Á Kiss, AR Sadeghi, T Schneider, ...
Proceedings of the 8th International Workshop on Security in Blockchain and …, 2020
62020
Enclave computing on RISC-V: A brighter future for security?
G Dessouky, AR Sadeghi, E Stapf
1st International Workshop on Secure RISC-V Architecture Design Exploration …, 2020
62020
With great complexity comes great vulnerability: from stand-alone fixes to reconfigurable security
G Dessouky, T Frassetto, P Jauernig, AR Sadeghi, E Stapf
IEEE Security & Privacy 18 (5), 57-66, 2020
52020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20