دنبال کردن
Ahmad Atamli
عنوان
نقل شده توسط
نقل شده توسط
سال
Threat-based security analysis for the internet of things
AW Atamli, A Martin
2014 International workshop on secure internet of things, 35-43, 2014
2512014
Audroid: Preventing attacks on audio channels in mobile devices
G Petracca, Y Sun, T Jaeger, A Atamli
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
942015
{AWare}: Preventing Abuse of {Privacy-Sensitive} Sensors via Operation Bindings
G Petracca, AA Reineh, Y Sun, J Grossklags, T Jaeger
26th USENIX security symposium (USENIX Security 17), 379-396, 2017
492017
Analysis of trusted execution environment usage in samsung KNOX
A Atamli-Reineh, R Borgaonkar, RA Balisane, G Petracca, A Martin
Proceedings of the 1st Workshop on System Software for Trusted Execution, 1-6, 2016
282016
Towards a usable framework for modelling security and privacy risks in the smart home
JRC Nurse, A Atamli, A Martin
Human Aspects of Information Security, Privacy, and Trust: 4th International …, 2016
232016
Securing application with software partitioning: a case study using SGX
AA Reineh, AA Martin
International Conference on Security and Privacy 164, 2015
22*2015
A framework for application partitioning using trusted execution environments
A Atamli‐Reineh, A Paverd, G Petracca, A Martin
Concurrency and Computation: Practice and Experience 29 (23), e4130, 2017
142017
{EnTrust}: Regulating Sensor Access by Cooperating Programs via Delegation Graphs
G Petracca, Y Sun, AA Reineh, P McDaniel, J Grossklags, T Jaeger
28th USENIX Security Symposium (USENIX Security 19), 567-584, 2019
122019
Aware: Controlling app access to I/O devices on mobile platforms
G Petracca, A Atamli, Y Sun, J Grossklags, T Jaeger
arXiv preprint arXiv:1604.02171, 2016
82016
IO-Trust: an out-of-band trusted memory acquisition for intrusion detection and forensics investigations in cloud IOMMU based systems
A Atamli, G Petracca, J Crowcroft
Proceedings of the 14th International Conference on Availability …, 2019
72019
One for all and all for one: Gnn-based control-flow attestation for embedded devices
M Chilese, R Mitev, M Orenbach, R Thorburn, A Atamli, AR Sadeghi
2024 IEEE Symposium on Security and Privacy (SP), 3346-3364, 2024
62024
Live system call trace reconstruction on Linux
T Nguyen, M Orenbach, A Atamli
Forensic Science International: Digital Investigation 42, 301398, 2022
42022
Enabling secure and usable mobile application: revealing the nuts and bolts of software TPM in todays mobile devices
AA Reineh, G Petracca, J Uusilehto, A Martin
arXiv preprint arXiv:1606.02995, 2016
42016
Secure in-service firmware update
MH Sfadia, Y Itkin, A Atamli, A Shahar, Y Strassberg, L Itsik
US Patent 11,741,232, 2023
32023
GNS: Graph-based Network-on-Chip Shield for Early Defense Against Malicious Nodes in MPSoC
H Wang, J Ren, B Halak, A Atamli
IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 2024
22024
Forensic analysis of Tor in Windows environment: A case study
VM Angeli, A Atamli, E Karafili
Proceedings of the 17th International Conference on Availability …, 2022
22022
Architectures for Enhancing Authentication Privacy and Security Using Trusted Computing
RA Balisane, R Borgaonkar, A Atamli-Reineh, A Martin
Proceedings of the 2nd Workshop on System Software for Trusted Execution, 1-7, 2017
22017
Nurse, Ahmed Atamli, Andrew Martin, Towards Usable Framework for Modelling Security Privacy Risk in smart home
RC Jason
4th International Conference on Human Aspects of Information Security …, 2016
22016
Trustworthy and Secure Service-Oriented Architecture for the Internet of Things
AA Reineh, AJ Paverd, AP Martin
The 4th International Conference on the Internet of Things (IoT 2014), 2014
22014
DL2Fence: Integrating deep learning and frame fusion for enhanced detection and localization of refined denial-of-service in large-scale NoCs
H Wang, B Halak, J Ren, A Atamli
Proceedings of the 61st ACM/IEEE Design Automation Conference, 1-6, 2024
12024
سیستم در حال حاضر قادر به انجام عملکرد نیست. بعداً دوباره امتحان کنید.
مقاله‌ها 1–20