Showing 50 publications by Amro Awad
SEFsim: A Statistically-Guided Fast DRAM Simulator
Adak D, Lee H, Feinberg B, Voskuilen G, Hughes C et al. (2024), 00, 304-306
BibTeX
@inproceedings{sefsimastatisti-2024/5,
title={SEFsim: A Statistically-Guided Fast DRAM Simulator},
author={Adak D, Lee H, Feinberg B, Voskuilen G, Hughes C et al.},
booktitle={2024 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)},
pages={304-306},
year = "2024"
}
Salus: Efficient Security Support for CXL-Expanded GPU Memory
Abdullah R, Lee H, Zhou H & Awad A (2024), 00, 1-15
THEMIS: Time, Heterogeneity, and Energy Minded Scheduling for Fair Multi-Tenant Use in FPGAs
Karabulut E, Malik AA, Awad A & Aysu A (2024), CoRR, abs/2404.00507
Security in High Performance Computing (S-HPC)
Marquez A, Guo Y, Peisert S, Barker KJ, Abu-Ghazaleh NB et al. (2023), ACM International Conference Proceeding Series, 1849
BibTeX
@article{securityinhighp-2023/11,
title={Security in High Performance Computing (S-HPC)},
author={Marquez A, Guo Y, Peisert S, Barker KJ, Abu-Ghazaleh NB et al.},
journal={ACM International Conference Proceeding Series},
pages={1849},
year = "2023"
}
ERAS: A Flexible and Scalable Framework for Seamless Integration of RTL Models with Structural Simulation Toolkit
Nema S, Chunduru SK, Kodigal C, Voskuilen G, Rodrigues AF et al. (2023), 00, 196-200
BibTeX
@inproceedings{erasaflexiblean-2023/10,
title={ERAS: A Flexible and Scalable Framework for Seamless Integration of RTL Models with Structural Simulation Toolkit},
author={Nema S, Chunduru SK, Kodigal C, Voskuilen G, Rodrigues AF et al.},
booktitle={2023 IEEE International Symposium on Workload Characterization (IISWC)},
pages={196-200},
year = "2023"
}
CryptoMMU: Enabling Scalable and Secure Access Control of Third-Party Accelerators
Alam F, Lee H, Bhattacharjee A & Awad A (2023), 32-48
HMT: A Hardware-centric Hybrid Bonsai Merkle Tree Algorithm for High-performance Authentication
Shadab RM, Zou Y, Gandham S, Awad A & Lin M (2023), ACM Transactions on Embedded Computing Systems, 22(4), 1-28
BibTeX
@article{hmtahardwarecen-2023/7,
title={HMT: A Hardware-centric Hybrid Bonsai Merkle Tree Algorithm for High-performance Authentication},
author={Shadab RM, Zou Y, Gandham S, Awad A & Lin M},
journal={ACM Transactions on Embedded Computing Systems},
volume={22},
pages={1-28},
publisher={Association for Computing Machinery (ACM)},
year = "2023"
}
SS-AXI: Secure and Safe Access Control Mechanism for Multi-Tenant Cloud FPGAs
Karabulut E, Awad A & Aysu A (2023), 00, 1-5
Thoth: Bridging the Gap Between Persistently Secure Memories and Memory Interfaces of Emerging NVMs
Han X, Tuck J & Awad A (2023), 00, 94-107
BibTeX
@inproceedings{thothbridgingth-2023/3,
title={Thoth: Bridging the Gap Between Persistently Secure Memories and Memory Interfaces of Emerging NVMs},
author={Han X, Tuck J & Awad A},
booktitle={2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA)},
pages={94-107},
year = "2023"
}
Plutus: Bandwidth-Efficient Memory Security for GPUs
Abdullah R, Zhou H & Awad A (2023), 00, 543-555
D-Shield: Enabling Processor-side Encryption and Integrity Verification for Secure NVMe Drives
Chowdhuryy HI, Jung M, Yao F & Awad A (2023), 00, 908-921
BibTeX
@inproceedings{dshieldenabling-2023/3,
title={D-Shield: Enabling Processor-side Encryption and Integrity Verification for Secure NVMe Drives},
author={Chowdhuryy HI, Jung M, Yao F & Awad A},
booktitle={2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA)},
pages={908-921},
year = "2023"
}
Understanding and Characterizing Side Channels Exploiting Phase-Change Memories
Chowdhuryy HI, Ewetz R, Awad A & Yao F (2023), IEEE Micro, 43(5), 8-15
BibTeX
@article{understandingan-2023/1,
title={Understanding and Characterizing Side Channels Exploiting Phase-Change Memories},
author={Chowdhuryy HI, Ewetz R, Awad A & Yao F},
journal={IEEE Micro},
volume={43},
pages={8-15},
publisher={Institute of Electrical and Electronics Engineers (IEEE)},
year = "2023"
}
ATHENA: Enabling Codesign for Next-Generation AI/ML Architectures
Plagge M, Feinberg B, McFarland J, Rothganger F, Agarwal S et al. (2022), 00, 13-23
BibTeX
@inproceedings{athenaenablingc-2022/12,
title={ATHENA: Enabling Codesign for Next-Generation AI/ML Architectures},
author={Plagge M, Feinberg B, McFarland J, Rothganger F, Agarwal S et al.},
booktitle={2022 IEEE International Conference on Rebooting Computing (ICRC)},
pages={13-23},
year = "2022"
}
PR Crisis
Karabulut E, Yuvarajappa C, Shaik MI, Potluri S, Awad A et al. (2022), 101-106
Horus: Persistent Security for Extended Persistence-Domain Memory Systems
Han X, Tuck J & Awad A (2022), 1255-1269
Towards resilient analog in-memory deep learning via data layout re-organization
Rashed MRH, Awad A, Jha SK & Ewetz R (2022), 859-864
High-Fidelity Model Extraction Attacks via Remote Power Monitors
Dubey A, Karabulut E, Awad A & Aysu A (2022), 00, 328-331
BibTeX
@inproceedings{highfidelitymod-2022/6,
title={High-Fidelity Model Extraction Attacks via Remote Power Monitors},
author={Dubey A, Karabulut E, Awad A & Aysu A},
booktitle={2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS)},
pages={328-331},
year = "2022"
}
Minerva: Rethinking Secure Architectures for the Era of Fabric-Attached Memory Architectures
Alwadi M, Wang R, Mohaisen D, Hughes C, Hammond SD et al. (2022), 00, 258-268
BibTeX
@inproceedings{minervarethinki-2022/6,
title={Minerva: Rethinking Secure Architectures for the Era of Fabric-Attached Memory Architectures},
author={Alwadi M, Wang R, Mohaisen D, Hughes C, Hammond SD et al.},
booktitle={2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS)},
pages={258-268},
year = "2022"
}
Eris: Fault Injection and Tracking Framework for Reliability Analysis of Open-Source Hardware
Nema S, Kirschner J, Adak D, Agarwal S, Feinberg B et al. (2022), 00, 210-220
BibTeX
@inproceedings{erisfaultinject-2022/5,
title={Eris: Fault Injection and Tracking Framework for Reliability Analysis of Open-Source Hardware},
author={Nema S, Kirschner J, Adak D, Agarwal S, Feinberg B et al.},
booktitle={2022 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)},
pages={210-220},
year = "2022"
}
Understanding Internet of Things malware by analyzing endpoints in their static artifacts
Choi J, Anwar A, Alabduljabbar A, Alasmary H, Spaulding J et al. (2022), Computer Networks, 206, 108768
BibTeX
@article{understandingin-2022/4,
title={Understanding Internet of Things malware by analyzing endpoints in their static artifacts},
author={Choi J, Anwar A, Alabduljabbar A, Alasmary H, Spaulding J et al.},
journal={Computer Networks},
volume={206},
pages={108768},
publisher={Elsevier},
year = "2022"
}
Adaptive Security Support for Heterogeneous Memory on GPUs
Yuan S, Awad A, Yudha AWB, Solihin Y & Zhou H (2022), 00, 213-228
Filesystem Encryption or Direct-Access for NVM Filesystems? Let???s Have Both!
Abu Zubair K, Mohaisen D & Awad A (2022), 00, 490-502
BibTeX
@inproceedings{filesystemencry-2022/4,
title={Filesystem Encryption or Direct-Access for NVM Filesystems? Let???s Have Both!},
author={Abu Zubair K, Mohaisen D & Awad A},
booktitle={2022 IEEE International Symposium on High-Performance Computer Architecture (HPCA)},
pages={490-502},
year = "2022"
}
A Keylogging Inference Attack on Air-Tapping Keyboards in Virtual Environments
Meteriz-Y??ld??ran ??, Y??ld??ran NF, Awad A & Mohaisen D (2022), 00, 765-774
BibTeX
@inproceedings{akeylogginginfe-2022/3,
title={A Keylogging Inference Attack on Air-Tapping Keyboards in Virtual Environments},
author={Meteriz-Y??ld??ran ??, Y??ld??ran NF, Awad A & Mohaisen D},
booktitle={2022 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)},
pages={765-774},
year = "2022"
}
HMT: A Hardware-Centric Hybrid Bonsai Merkle Tree Algorithm for High-Performance Authentication
Shadab RM, Zou Y, Gandham S, Awad A & Lin M (2022), 52-52
BibTeX
@inproceedings{hmtahardwarecen-2022/2,
title={HMT: A Hardware-Centric Hybrid Bonsai Merkle Tree Algorithm for High-Performance Authentication},
author={Shadab RM, Zou Y, Gandham S, Awad A & Lin M},
booktitle={Proceedings of the 2022 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays},
pages={52-52},
year = "2022"
}
ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation
Alasmary H, Anwar A, Abusnaina A, Alabduljabbar A, Abuhamad M et al. (2022), IEEE Internet of Things Journal, 9(4), 2485-2496
BibTeX
@article{shellcoreautoma-2022/1,
title={ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation},
author={Alasmary H, Anwar A, Abusnaina A, Alabduljabbar A, Abuhamad M et al.},
journal={IEEE Internet of Things Journal},
volume={9},
pages={2485-2496},
publisher={Institute of Electrical and Electronics Engineers (IEEE)},
year = "2022"
}
DirectNVM: Hardware-accelerated NVMe SSDs for High-performance Embedded Computing
Zou Y, Awad A & Lin M (2022), ACM Transactions on Embedded Computing Systems, 21(1), 1-24
BibTeX
@article{directnvmhardwa-2022/1,
title={DirectNVM: Hardware-accelerated NVMe SSDs for High-performance Embedded Computing},
author={Zou Y, Awad A & Lin M},
journal={ACM Transactions on Embedded Computing Systems},
volume={21},
pages={1-24},
publisher={Association for Computing Machinery (ACM)},
year = "2022"
}
ARES: Persistently Secure Non-Volatile Memory with Processor-transparent and Hardware-friendly Integrity Verification and Metadata Recovery
Zou Y, Abu Zubair K, Alwadi M, Shadab RM, Gandham S et al. (2022), ACM Transactions on Embedded Computing Systems, 21(1), 1-32
BibTeX
@article{arespersistentl-2022/1,
title={ARES: Persistently Secure Non-Volatile Memory with Processor-transparent and Hardware-friendly Integrity Verification and Metadata Recovery},
author={Zou Y, Abu Zubair K, Alwadi M, Shadab RM, Gandham S et al.},
journal={ACM Transactions on Embedded Computing Systems},
volume={21},
pages={1-32},
publisher={Association for Computing Machinery (ACM)},
year = "2022"
}
HMT: A Hardware-Centric Hybrid Bonsai Merkle Tree Algorithm for High-Performance Authentication
Shadab RM, Zou Y, Gandham S, Awad A & Lin M (2022), CoRR, abs/2204.08976
FAT-PIM: Low-Cost Error Detection for Processing-In-Memory
Zubair KA, Jha SK, Mohaisen D, Hughes C & Awad A (2022), CoRR, abs/2207.12231
HERMES: Hardware-Efficient Speculative Dataflow Architecture for Bonsai Merkle Tree-Based Memory Authentication
Zou Y, Awad A & Lin M (2021), 00, 203-213
BibTeX
@inproceedings{hermeshardwaree-2021/12,
title={HERMES: Hardware-Efficient Speculative Dataflow Architecture for Bonsai Merkle Tree-Based Memory Authentication},
author={Zou Y, Awad A & Lin M},
booktitle={2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)},
pages={203-213},
year = "2021"
}
Punchcard: A Practical Red-Zone Based Scheme for Low-Overhead Heap Protection
Zhang C, Awad A, Hou R & Alwadi M (2021), 00, 405-414
BibTeX
@inproceedings{punchcardapract-2021/12,
title={Punchcard: A Practical Red-Zone Based Scheme for Low-Overhead Heap Protection},
author={Zhang C, Awad A, Hou R & Alwadi M},
booktitle={2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)},
pages={405-414},
year = "2021"
}
LADDER: Architecting Content and Location-aware Writes for Crossbar Resistive Memories
Chowdhuryy HI, Rashed MRH, Awad A, Ewetz R & Yao F (2021), 117-130
BibTeX
@inproceedings{ladderarchitect-2021/10,
title={LADDER: Architecting Content and Location-aware Writes for Crossbar Resistive Memories},
author={Chowdhuryy HI, Rashed MRH, Awad A, Ewetz R & Yao F},
booktitle={MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture},
pages={117-130},
year = "2021"
}
Soteria: Towards Resilient Integrity-Protected and Encrypted Non-Volatile Memories
Abu Zubair K, Gurumurthi S, Sridharan V & Awad A (2021), 1214-1226
BibTeX
@inproceedings{soteriatowardsr-2021/10,
title={Soteria: Towards Resilient Integrity-Protected and Encrypted Non-Volatile Memories},
author={Abu Zubair K, Gurumurthi S, Sridharan V & Awad A},
booktitle={MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture},
pages={1214-1226},
year = "2021"
}
Dolos: Improving the Performance of Persistent Applications in ADR-Supported Secure Memory
Han X, Tuck J & Awad A (2021), 1241-1253
BibTeX
@inproceedings{dolosimprovingt-2021/10,
title={Dolos: Improving the Performance of Persistent Applications in ADR-Supported Secure Memory},
author={Han X, Tuck J & Awad A},
booktitle={MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture},
pages={1241-1253},
year = "2021"
}
NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks
Wang X, Zhao B, Hou R, Awad A, Tian Z et al. (2021), 776-789
BibTeX
@inproceedings{nasguardanovela-2021/6,
title={NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks},
author={Wang X, Zhao B, Hou R, Awad A, Tian Z et al.},
booktitle={2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture (ISCA)},
pages={776-789},
year = "2021"
}
Resilient and Secure Hardware Devices Using ASL
Alasad Q, Lin J, Yuan J-S, Fan D & Awad A (2021), ACM Journal on Emerging Technologies in Computing Systems, 17(2), 1-26
BibTeX
@article{resilientandsec-2021/4,
title={Resilient and Secure Hardware Devices Using ASL},
author={Alasad Q, Lin J, Yuan J-S, Fan D & Awad A},
journal={ACM Journal on Emerging Technologies in Computing Systems},
volume={17},
pages={1-26},
publisher={Association for Computing Machinery (ACM)},
year = "2021"
}
VR-Spy: A Side-Channel Attack on Virtual Key-Logging in VR Headsets
Al Arafat A, Guo Z & Awad A (2021), 00, 564-572
Stealth-Persist: Architectural Support for Persistent Applications in Hybrid Memory Systems
Alwadi M, Kommareddy VR, Hughes C, Hammond SD & Awad A (2021), 00, 139-152
BibTeX
@inproceedings{stealthpersista-2021/3,
title={Stealth-Persist: Architectural Support for Persistent Applications in Hybrid Memory Systems},
author={Alwadi M, Kommareddy VR, Hughes C, Hammond SD & Awad A},
booktitle={2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA)},
pages={139-152},
year = "2021"
}
DeACT: Architecture-Aware Virtual Memory Support for Fabric Attached Memory Systems
Kommareddy VR, Hughes C, Hammond SD & Awad A (2021), 00, 453-466
BibTeX
@inproceedings{deactarchitectu-2021/3,
title={DeACT: Architecture-Aware Virtual Memory Support for Fabric Attached Memory Systems},
author={Kommareddy VR, Hughes C, Hammond SD & Awad A},
booktitle={2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA)},
pages={453-466},
year = "2021"
}
PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter
Yuan F, Wang K, Hou R, Li X, Li P et al. (2021), 00, 1697-1702
BibTeX
@inproceedings{pipomonitormiti-2021/2,
title={PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter},
author={Yuan F, Wang K, Hou R, Li X, Li P et al.},
booktitle={2021 Design, Automation & Test in Europe Conference & Exhibition (DATE)},
pages={1697-1702},
year = "2021"
}
Seeds of SEED: R-SAW: New Side Channels Exploiting Read Asymmetry in MLC Phase Change Memories
Chowdhuryy HI, Ewetz R, Awad A & Yao F (2021), 00, 22-28
BibTeX
@inproceedings{seedsofseedrsaw-2021/1,
title={Seeds of SEED: R-SAW: New Side Channels Exploiting Read Asymmetry in MLC Phase Change Memories},
author={Chowdhuryy HI, Ewetz R, Awad A & Yao F},
booktitle={2021 International Symposium on Secure and Private Execution Environment Design (SEED)},
pages={22-28},
year = "2021"
}
Caching Techniques for Security Metadata in Integrity-Protected Fabric-Attached Memories
Al-Wadi M & Awad A (2021), EAI Endorsed Trans. Security Safety, 7, e1-e1
Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts
Anwar A, Choi J, Alabduljabbar A, Alasmary H, Spaulding J et al. (2021), CoRR, abs/2103.14217
BibTeX
@article{understandingin-2021/,
title={Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts},
author={Anwar A, Choi J, Alabduljabbar A, Alasmary H, Spaulding J et al.},
journal={CoRR},
volume={abs/2103.14217},
year = "2021"
}
ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation
Alasmary H, Anwar A, Abusnaina A, Alabduljabbar A, Abuhamad M et al. (2021), CoRR, abs/2103.14221
BibTeX
@article{shellcoreautoma-2021/,
title={ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation},
author={Alasmary H, Anwar A, Abusnaina A, Alabduljabbar A, Abuhamad M et al.},
journal={CoRR},
volume={abs/2103.14221},
year = "2021"
}
Guest Editors' Introduction to the Special Issue on Hardware Security
Awad A & Wang R (2020), IEEE Transactions on Computers, 69(11), 1556-1557
BibTeX
@article{guesteditorsint-2020/11,
title={Guest Editors' Introduction to the Special Issue on Hardware Security},
author={Awad A & Wang R},
journal={IEEE Transactions on Computers},
volume={69},
pages={1556-1557},
publisher={Institute of Electrical and Electronics Engineers (IEEE)},
year = "2020"
}
PreFAM: Understanding the Impact of Prefetching in Fabric-Attached Memory Architectures
Kommareddy VR, Kotra J, Hughes C, Hammond SD & Awad A (2020), 323-334
MRIMA: An MRAM-Based In-Memory Accelerator
Angizi S, He Z, Awad A & Fan D (2020), IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39(5), 1123-1136
BibTeX
@article{mrimaanmrambase-2020/5,
title={MRIMA: An MRAM-Based In-Memory Accelerator},
author={Angizi S, He Z, Awad A & Fan D},
journal={IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems},
volume={39},
pages={1123-1136},
publisher={Institute of Electrical and Electronics Engineers (IEEE)},
year = "2020"
}
Lelantus: Fine-Granularity Copy-On-Write Operations for Secure Non-Volatile Memories
Zhou J, Awad A & Wang J (2020), 597-609
BibTeX
@inproceedings{lelantusfinegra-2020/5,
title={Lelantus: Fine-Granularity Copy-On-Write Operations for Secure Non-Volatile Memories},
author={Zhou J, Awad A & Wang J},
booktitle={2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA)},
pages={597-609},
year = "2020"
}