Skip to main content
Menu

Publications

Showing 50 publications by Amro Awad

SEFsim: A Statistically-Guided Fast DRAM Simulator

Adak D, Lee H, Feinberg B, Voskuilen G, Hughes C et al. (2024), 00, 304-306

BibTeX View PDF
@inproceedings{sefsimastatisti-2024/5,
  title={SEFsim: A Statistically-Guided Fast DRAM Simulator},
  author={Adak D, Lee H, Feinberg B, Voskuilen G, Hughes C et al.},
  booktitle={2024 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)},
  pages={304-306},
  year = "2024"
}

Salus: Efficient Security Support for CXL-Expanded GPU Memory

Abdullah R, Lee H, Zhou H & Awad A (2024), 00, 1-15

BibTeX View PDF
@inproceedings{salusefficients-2024/3,
  title={Salus: Efficient Security Support for CXL-Expanded GPU Memory},
  author={Abdullah R, Lee H, Zhou H & Awad A},
  booktitle={2024 IEEE International Symposium on High-Performance Computer Architecture (HPCA)},
  pages={1-15},
  year = "2024"
}

THEMIS: Time, Heterogeneity, and Energy Minded Scheduling for Fair Multi-Tenant Use in FPGAs

Karabulut E, Malik AA, Awad A & Aysu A (2024), CoRR, abs/2404.00507

BibTeX View PDF
@article{themistimeheter-2024/,
  title={THEMIS: Time, Heterogeneity, and Energy Minded Scheduling for Fair Multi-Tenant Use in FPGAs},
  author={Karabulut E, Malik AA, Awad A & Aysu A},
  journal={CoRR},
  volume={abs/2404.00507},
  year = "2024"
}

Security in High Performance Computing (S-HPC)

Marquez A, Guo Y, Peisert S, Barker KJ, Abu-Ghazaleh NB et al. (2023), ACM International Conference Proceeding Series, 1849

BibTeX
@article{securityinhighp-2023/11,
  title={Security in High Performance Computing (S-HPC)},
  author={Marquez A, Guo Y, Peisert S, Barker KJ, Abu-Ghazaleh NB et al.},
  journal={ACM International Conference Proceeding Series},
  pages={1849},
  year = "2023"
}

ERAS: A Flexible and Scalable Framework for Seamless Integration of RTL Models with Structural Simulation Toolkit

Nema S, Chunduru SK, Kodigal C, Voskuilen G, Rodrigues AF et al. (2023), 00, 196-200

BibTeX View PDF
@inproceedings{erasaflexiblean-2023/10,
  title={ERAS: A Flexible and Scalable Framework for Seamless Integration of RTL Models with Structural Simulation Toolkit},
  author={Nema S, Chunduru SK, Kodigal C, Voskuilen G, Rodrigues AF et al.},
  booktitle={2023 IEEE International Symposium on Workload Characterization (IISWC)},
  pages={196-200},
  year = "2023"
}

CryptoMMU: Enabling Scalable and Secure Access Control of Third-Party Accelerators

Alam F, Lee H, Bhattacharjee A & Awad A (2023), 32-48

BibTeX View PDF
@inproceedings{cryptommuenabli-2023/10,
  title={CryptoMMU: Enabling Scalable and Secure Access Control of Third-Party Accelerators},
  author={Alam F, Lee H, Bhattacharjee A & Awad A},
  booktitle={56th Annual IEEE/ACM International Symposium on Microarchitecture},
  pages={32-48},
  year = "2023"
}

HMT: A Hardware-centric Hybrid Bonsai Merkle Tree Algorithm for High-performance Authentication

Shadab RM, Zou Y, Gandham S, Awad A & Lin M (2023), ACM Transactions on Embedded Computing Systems, 22(4), 1-28

BibTeX View PDF
@article{hmtahardwarecen-2023/7,
  title={HMT: A Hardware-centric Hybrid Bonsai Merkle Tree Algorithm for High-performance Authentication},
  author={Shadab RM, Zou Y, Gandham S, Awad A & Lin M},
  journal={ACM Transactions on Embedded Computing Systems},
  volume={22},
  pages={1-28},
  publisher={Association for Computing Machinery (ACM)},
  year = "2023"
}

SS-AXI: Secure and Safe Access Control Mechanism for Multi-Tenant Cloud FPGAs

Karabulut E, Awad A & Aysu A (2023), 00, 1-5

BibTeX View PDF
@inproceedings{ssaxisecureands-2023/5,
  title={SS-AXI: Secure and Safe Access Control Mechanism for Multi-Tenant Cloud FPGAs},
  author={Karabulut E, Awad A & Aysu A},
  booktitle={2023 IEEE International Symposium on Circuits and Systems (ISCAS)},
  pages={1-5},
  year = "2023"
}

Thoth: Bridging the Gap Between Persistently Secure Memories and Memory Interfaces of Emerging NVMs

Han X, Tuck J & Awad A (2023), 00, 94-107

BibTeX View PDF
@inproceedings{thothbridgingth-2023/3,
  title={Thoth: Bridging the Gap Between Persistently Secure Memories and Memory Interfaces of Emerging NVMs},
  author={Han X, Tuck J & Awad A},
  booktitle={2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA)},
  pages={94-107},
  year = "2023"
}

Plutus: Bandwidth-Efficient Memory Security for GPUs

Abdullah R, Zhou H & Awad A (2023), 00, 543-555

BibTeX View PDF
@inproceedings{plutusbandwidth-2023/3,
  title={Plutus: Bandwidth-Efficient Memory Security for GPUs},
  author={Abdullah R, Zhou H & Awad A},
  booktitle={2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA)},
  pages={543-555},
  year = "2023"
}

D-Shield: Enabling Processor-side Encryption and Integrity Verification for Secure NVMe Drives

Chowdhuryy HI, Jung M, Yao F & Awad A (2023), 00, 908-921

BibTeX View PDF
@inproceedings{dshieldenabling-2023/3,
  title={D-Shield: Enabling Processor-side Encryption and Integrity Verification for Secure NVMe Drives},
  author={Chowdhuryy HI, Jung M, Yao F & Awad A},
  booktitle={2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA)},
  pages={908-921},
  year = "2023"
}

Understanding and Characterizing Side Channels Exploiting Phase-Change Memories

Chowdhuryy HI, Ewetz R, Awad A & Yao F (2023), IEEE Micro, 43(5), 8-15

BibTeX View PDF
@article{understandingan-2023/1,
  title={Understanding and Characterizing Side Channels Exploiting Phase-Change Memories},
  author={Chowdhuryy HI, Ewetz R, Awad A & Yao F},
  journal={IEEE Micro},
  volume={43},
  pages={8-15},
  publisher={Institute of Electrical and Electronics Engineers (IEEE)},
  year = "2023"
}

ATHENA: Enabling Codesign for Next-Generation AI/ML Architectures

Plagge M, Feinberg B, McFarland J, Rothganger F, Agarwal S et al. (2022), 00, 13-23

BibTeX View PDF
@inproceedings{athenaenablingc-2022/12,
  title={ATHENA: Enabling Codesign for Next-Generation AI/ML Architectures},
  author={Plagge M, Feinberg B, McFarland J, Rothganger F, Agarwal S et al.},
  booktitle={2022 IEEE International Conference on Rebooting Computing (ICRC)},
  pages={13-23},
  year = "2022"
}

PR Crisis

Karabulut E, Yuvarajappa C, Shaik MI, Potluri S, Awad A et al. (2022), 101-106

BibTeX View PDF
@inproceedings{prcrisis-2022/11,
  title={PR Crisis},
  author={Karabulut E, Yuvarajappa C, Shaik MI, Potluri S, Awad A et al.},
  booktitle={Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security},
  pages={101-106},
  year = "2022"
}

Horus: Persistent Security for Extended Persistence-Domain Memory Systems

Han X, Tuck J & Awad A (2022), 1255-1269

BibTeX View PDF
@inproceedings{horuspersistent-2022/10,
  title={Horus: Persistent Security for Extended Persistence-Domain Memory Systems},
  author={Han X, Tuck J & Awad A},
  booktitle={2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO)},
  pages={1255-1269},
  year = "2022"
}

Towards resilient analog in-memory deep learning via data layout re-organization

Rashed MRH, Awad A, Jha SK & Ewetz R (2022), 859-864

BibTeX View PDF
@inproceedings{towardsresilien-2022/7,
  title={Towards resilient analog in-memory deep learning via data layout re-organization},
  author={Rashed MRH, Awad A, Jha SK & Ewetz R},
  booktitle={Proceedings of the 59th ACM/IEEE Design Automation Conference},
  pages={859-864},
  year = "2022"
}

High-Fidelity Model Extraction Attacks via Remote Power Monitors

Dubey A, Karabulut E, Awad A & Aysu A (2022), 00, 328-331

BibTeX View PDF
@inproceedings{highfidelitymod-2022/6,
  title={High-Fidelity Model Extraction Attacks via Remote Power Monitors},
  author={Dubey A, Karabulut E, Awad A & Aysu A},
  booktitle={2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS)},
  pages={328-331},
  year = "2022"
}

Minerva: Rethinking Secure Architectures for the Era of Fabric-Attached Memory Architectures

Alwadi M, Wang R, Mohaisen D, Hughes C, Hammond SD et al. (2022), 00, 258-268

BibTeX View PDF
@inproceedings{minervarethinki-2022/6,
  title={Minerva: Rethinking Secure Architectures for the Era of Fabric-Attached Memory Architectures},
  author={Alwadi M, Wang R, Mohaisen D, Hughes C, Hammond SD et al.},
  booktitle={2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS)},
  pages={258-268},
  year = "2022"
}

Eris: Fault Injection and Tracking Framework for Reliability Analysis of Open-Source Hardware

Nema S, Kirschner J, Adak D, Agarwal S, Feinberg B et al. (2022), 00, 210-220

BibTeX View PDF
@inproceedings{erisfaultinject-2022/5,
  title={Eris: Fault Injection and Tracking Framework for Reliability Analysis of Open-Source Hardware},
  author={Nema S, Kirschner J, Adak D, Agarwal S, Feinberg B et al.},
  booktitle={2022 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)},
  pages={210-220},
  year = "2022"
}

Understanding Internet of Things malware by analyzing endpoints in their static artifacts

Choi J, Anwar A, Alabduljabbar A, Alasmary H, Spaulding J et al. (2022), Computer Networks, 206, 108768

BibTeX View PDF
@article{understandingin-2022/4,
  title={Understanding Internet of Things malware by analyzing endpoints in their static artifacts},
  author={Choi J, Anwar A, Alabduljabbar A, Alasmary H, Spaulding J et al.},
  journal={Computer Networks},
  volume={206},
  pages={108768},
  publisher={Elsevier},
  year = "2022"
}

Adaptive Security Support for Heterogeneous Memory on GPUs

Yuan S, Awad A, Yudha AWB, Solihin Y & Zhou H (2022), 00, 213-228

BibTeX View PDF
@inproceedings{adaptivesecurit-2022/4,
  title={Adaptive Security Support for Heterogeneous Memory on GPUs},
  author={Yuan S, Awad A, Yudha AWB, Solihin Y & Zhou H},
  booktitle={2022 IEEE International Symposium on High-Performance Computer Architecture (HPCA)},
  pages={213-228},
  year = "2022"
}

Filesystem Encryption or Direct-Access for NVM Filesystems? Let???s Have Both!

Abu Zubair K, Mohaisen D & Awad A (2022), 00, 490-502

BibTeX View PDF
@inproceedings{filesystemencry-2022/4,
  title={Filesystem Encryption or Direct-Access for NVM Filesystems? Let???s Have Both!},
  author={Abu Zubair K, Mohaisen D & Awad A},
  booktitle={2022 IEEE International Symposium on High-Performance Computer Architecture (HPCA)},
  pages={490-502},
  year = "2022"
}

Transpose-xen

McFarland J & Awad A (2022), 3-12

BibTeX View PDF
@inproceedings{transposexen-2022/4,
  title={Transpose-xen},
  author={McFarland J & Awad A},
  booktitle={Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing},
  pages={3-12},
  year = "2022"
}

A Keylogging Inference Attack on Air-Tapping Keyboards in Virtual Environments

Meteriz-Y??ld??ran ??, Y??ld??ran NF, Awad A & Mohaisen D (2022), 00, 765-774

BibTeX View PDF
@inproceedings{akeylogginginfe-2022/3,
  title={A Keylogging Inference Attack on Air-Tapping Keyboards in Virtual Environments},
  author={Meteriz-Y??ld??ran ??, Y??ld??ran NF, Awad A & Mohaisen D},
  booktitle={2022 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)},
  pages={765-774},
  year = "2022"
}

HMT: A Hardware-Centric Hybrid Bonsai Merkle Tree Algorithm for High-Performance Authentication

Shadab RM, Zou Y, Gandham S, Awad A & Lin M (2022), 52-52

BibTeX View PDF
@inproceedings{hmtahardwarecen-2022/2,
  title={HMT: A Hardware-Centric Hybrid Bonsai Merkle Tree Algorithm for High-Performance Authentication},
  author={Shadab RM, Zou Y, Gandham S, Awad A & Lin M},
  booktitle={Proceedings of the 2022 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays},
  pages={52-52},
  year = "2022"
}

ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation

Alasmary H, Anwar A, Abusnaina A, Alabduljabbar A, Abuhamad M et al. (2022), IEEE Internet of Things Journal, 9(4), 2485-2496

BibTeX View PDF
@article{shellcoreautoma-2022/1,
  title={ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation},
  author={Alasmary H, Anwar A, Abusnaina A, Alabduljabbar A, Abuhamad M et al.},
  journal={IEEE Internet of Things Journal},
  volume={9},
  pages={2485-2496},
  publisher={Institute of Electrical and Electronics Engineers (IEEE)},
  year = "2022"
}

DirectNVM: Hardware-accelerated NVMe SSDs for High-performance Embedded Computing

Zou Y, Awad A & Lin M (2022), ACM Transactions on Embedded Computing Systems, 21(1), 1-24

BibTeX View PDF
@article{directnvmhardwa-2022/1,
  title={DirectNVM: Hardware-accelerated NVMe SSDs for High-performance Embedded Computing},
  author={Zou Y, Awad A & Lin M},
  journal={ACM Transactions on Embedded Computing Systems},
  volume={21},
  pages={1-24},
  publisher={Association for Computing Machinery (ACM)},
  year = "2022"
}

ARES: Persistently Secure Non-Volatile Memory with Processor-transparent and Hardware-friendly Integrity Verification and Metadata Recovery

Zou Y, Abu Zubair K, Alwadi M, Shadab RM, Gandham S et al. (2022), ACM Transactions on Embedded Computing Systems, 21(1), 1-32

BibTeX View PDF
@article{arespersistentl-2022/1,
  title={ARES: Persistently Secure Non-Volatile Memory with Processor-transparent and Hardware-friendly Integrity Verification and Metadata Recovery},
  author={Zou Y, Abu Zubair K, Alwadi M, Shadab RM, Gandham S et al.},
  journal={ACM Transactions on Embedded Computing Systems},
  volume={21},
  pages={1-32},
  publisher={Association for Computing Machinery (ACM)},
  year = "2022"
}

HMT: A Hardware-Centric Hybrid Bonsai Merkle Tree Algorithm for High-Performance Authentication

Shadab RM, Zou Y, Gandham S, Awad A & Lin M (2022), CoRR, abs/2204.08976

BibTeX View PDF
@article{hmtahardwarecen-2022/,
  title={HMT: A Hardware-Centric Hybrid Bonsai Merkle Tree Algorithm for High-Performance Authentication},
  author={Shadab RM, Zou Y, Gandham S, Awad A & Lin M},
  journal={CoRR},
  volume={abs/2204.08976},
  year = "2022"
}

FAT-PIM: Low-Cost Error Detection for Processing-In-Memory

Zubair KA, Jha SK, Mohaisen D, Hughes C & Awad A (2022), CoRR, abs/2207.12231

BibTeX View PDF
@article{fatpimlowcoster-2022/,
  title={FAT-PIM: Low-Cost Error Detection for Processing-In-Memory},
  author={Zubair KA, Jha SK, Mohaisen D, Hughes C & Awad A},
  journal={CoRR},
  volume={abs/2207.12231},
  year = "2022"
}

HERMES: Hardware-Efficient Speculative Dataflow Architecture for Bonsai Merkle Tree-Based Memory Authentication

Zou Y, Awad A & Lin M (2021), 00, 203-213

BibTeX View PDF
@inproceedings{hermeshardwaree-2021/12,
  title={HERMES: Hardware-Efficient Speculative Dataflow Architecture for Bonsai Merkle Tree-Based Memory Authentication},
  author={Zou Y, Awad A & Lin M},
  booktitle={2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)},
  pages={203-213},
  year = "2021"
}

Punchcard: A Practical Red-Zone Based Scheme for Low-Overhead Heap Protection

Zhang C, Awad A, Hou R & Alwadi M (2021), 00, 405-414

BibTeX View PDF
@inproceedings{punchcardapract-2021/12,
  title={Punchcard: A Practical Red-Zone Based Scheme for Low-Overhead Heap Protection},
  author={Zhang C, Awad A, Hou R & Alwadi M},
  booktitle={2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)},
  pages={405-414},
  year = "2021"
}

LADDER: Architecting Content and Location-aware Writes for Crossbar Resistive Memories

Chowdhuryy HI, Rashed MRH, Awad A, Ewetz R & Yao F (2021), 117-130

BibTeX View PDF
@inproceedings{ladderarchitect-2021/10,
  title={LADDER: Architecting Content and Location-aware Writes for Crossbar Resistive Memories},
  author={Chowdhuryy HI, Rashed MRH, Awad A, Ewetz R & Yao F},
  booktitle={MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture},
  pages={117-130},
  year = "2021"
}

Soteria: Towards Resilient Integrity-Protected and Encrypted Non-Volatile Memories

Abu Zubair K, Gurumurthi S, Sridharan V & Awad A (2021), 1214-1226

BibTeX View PDF
@inproceedings{soteriatowardsr-2021/10,
  title={Soteria: Towards Resilient Integrity-Protected and Encrypted Non-Volatile Memories},
  author={Abu Zubair K, Gurumurthi S, Sridharan V & Awad A},
  booktitle={MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture},
  pages={1214-1226},
  year = "2021"
}

Dolos: Improving the Performance of Persistent Applications in ADR-Supported Secure Memory

Han X, Tuck J & Awad A (2021), 1241-1253

BibTeX View PDF
@inproceedings{dolosimprovingt-2021/10,
  title={Dolos: Improving the Performance of Persistent Applications in ADR-Supported Secure Memory},
  author={Han X, Tuck J & Awad A},
  booktitle={MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture},
  pages={1241-1253},
  year = "2021"
}

ProMT

Alwadi M, Mohaisen A & Awad A (2021), 479-490

BibTeX View PDF
@inproceedings{promt-2021/6,
  title={ProMT},
  author={Alwadi M, Mohaisen A & Awad A},
  booktitle={Proceedings of the ACM International Conference on Supercomputing},
  pages={479-490},
  year = "2021"
}

NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks

Wang X, Zhao B, Hou R, Awad A, Tian Z et al. (2021), 776-789

BibTeX View PDF
@inproceedings{nasguardanovela-2021/6,
  title={NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks},
  author={Wang X, Zhao B, Hou R, Awad A, Tian Z et al.},
  booktitle={2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture (ISCA)},
  pages={776-789},
  year = "2021"
}

Resilient and Secure Hardware Devices Using ASL

Alasad Q, Lin J, Yuan J-S, Fan D & Awad A (2021), ACM Journal on Emerging Technologies in Computing Systems, 17(2), 1-26

BibTeX View PDF
@article{resilientandsec-2021/4,
  title={Resilient and Secure Hardware Devices Using ASL},
  author={Alasad Q, Lin J, Yuan J-S, Fan D & Awad A},
  journal={ACM Journal on Emerging Technologies in Computing Systems},
  volume={17},
  pages={1-26},
  publisher={Association for Computing Machinery (ACM)},
  year = "2021"
}

VR-Spy: A Side-Channel Attack on Virtual Key-Logging in VR Headsets

Al Arafat A, Guo Z & Awad A (2021), 00, 564-572

BibTeX View PDF
@inproceedings{vrspyasidechann-2021/4,
  title={VR-Spy: A Side-Channel Attack on Virtual Key-Logging in VR Headsets},
  author={Al Arafat A, Guo Z & Awad A},
  booktitle={2021 IEEE Virtual Reality and 3D User Interfaces (VR)},
  pages={564-572},
  year = "2021"
}

Stealth-Persist: Architectural Support for Persistent Applications in Hybrid Memory Systems

Alwadi M, Kommareddy VR, Hughes C, Hammond SD & Awad A (2021), 00, 139-152

BibTeX View PDF
@inproceedings{stealthpersista-2021/3,
  title={Stealth-Persist: Architectural Support for Persistent Applications in Hybrid Memory Systems},
  author={Alwadi M, Kommareddy VR, Hughes C, Hammond SD & Awad A},
  booktitle={2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA)},
  pages={139-152},
  year = "2021"
}

DeACT: Architecture-Aware Virtual Memory Support for Fabric Attached Memory Systems

Kommareddy VR, Hughes C, Hammond SD & Awad A (2021), 00, 453-466

BibTeX View PDF
@inproceedings{deactarchitectu-2021/3,
  title={DeACT: Architecture-Aware Virtual Memory Support for Fabric Attached Memory Systems},
  author={Kommareddy VR, Hughes C, Hammond SD & Awad A},
  booktitle={2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA)},
  pages={453-466},
  year = "2021"
}

PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter

Yuan F, Wang K, Hou R, Li X, Li P et al. (2021), 00, 1697-1702

BibTeX View PDF
@inproceedings{pipomonitormiti-2021/2,
  title={PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter},
  author={Yuan F, Wang K, Hou R, Li X, Li P et al.},
  booktitle={2021 Design, Automation & Test in Europe Conference & Exhibition (DATE)},
  pages={1697-1702},
  year = "2021"
}

Seeds of SEED: R-SAW: New Side Channels Exploiting Read Asymmetry in MLC Phase Change Memories

Chowdhuryy HI, Ewetz R, Awad A & Yao F (2021), 00, 22-28

BibTeX View PDF
@inproceedings{seedsofseedrsaw-2021/1,
  title={Seeds of SEED: R-SAW: New Side Channels Exploiting Read Asymmetry in MLC Phase Change Memories},
  author={Chowdhuryy HI, Ewetz R, Awad A & Yao F},
  booktitle={2021 International Symposium on Secure and Private Execution Environment Design (SEED)},
  pages={22-28},
  year = "2021"
}

Caching Techniques for Security Metadata in Integrity-Protected Fabric-Attached Memories

Al-Wadi M & Awad A (2021), EAI Endorsed Trans. Security Safety, 7, e1-e1

BibTeX View PDF
@article{cachingtechniqu-2021/,
  title={Caching Techniques for Security Metadata in Integrity-Protected Fabric-Attached Memories},
  author={Al-Wadi M & Awad A},
  journal={EAI Endorsed Trans. Security Safety},
  volume={7},
  number={24},
  pages={e1-e1},
  year = "2021"
}

Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts

Anwar A, Choi J, Alabduljabbar A, Alasmary H, Spaulding J et al. (2021), CoRR, abs/2103.14217

BibTeX
@article{understandingin-2021/,
  title={Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts},
  author={Anwar A, Choi J, Alabduljabbar A, Alasmary H, Spaulding J et al.},
  journal={CoRR},
  volume={abs/2103.14217},
  year = "2021"
}

ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation

Alasmary H, Anwar A, Abusnaina A, Alabduljabbar A, Abuhamad M et al. (2021), CoRR, abs/2103.14221

BibTeX
@article{shellcoreautoma-2021/,
  title={ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation},
  author={Alasmary H, Anwar A, Abusnaina A, Alabduljabbar A, Abuhamad M et al.},
  journal={CoRR},
  volume={abs/2103.14221},
  year = "2021"
}

Guest Editors' Introduction to the Special Issue on Hardware Security

Awad A & Wang R (2020), IEEE Transactions on Computers, 69(11), 1556-1557

BibTeX View PDF
@article{guesteditorsint-2020/11,
  title={Guest Editors' Introduction to the Special Issue on Hardware Security},
  author={Awad A & Wang R},
  journal={IEEE Transactions on Computers},
  volume={69},
  pages={1556-1557},
  publisher={Institute of Electrical and Electronics Engineers (IEEE)},
  year = "2020"
}

PreFAM: Understanding the Impact of Prefetching in Fabric-Attached Memory Architectures

Kommareddy VR, Kotra J, Hughes C, Hammond SD & Awad A (2020), 323-334

BibTeX View PDF
@inproceedings{prefamunderstan-2020/9,
  title={PreFAM: Understanding the Impact of Prefetching in Fabric-Attached Memory Architectures},
  author={Kommareddy VR, Kotra J, Hughes C, Hammond SD & Awad A},
  booktitle={The International Symposium on Memory Systems},
  pages={323-334},
  year = "2020"
}

MRIMA: An MRAM-Based In-Memory Accelerator

Angizi S, He Z, Awad A & Fan D (2020), IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39(5), 1123-1136

BibTeX View PDF
@article{mrimaanmrambase-2020/5,
  title={MRIMA: An MRAM-Based In-Memory Accelerator},
  author={Angizi S, He Z, Awad A & Fan D},
  journal={IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems},
  volume={39},
  pages={1123-1136},
  publisher={Institute of Electrical and Electronics Engineers (IEEE)},
  year = "2020"
}

Lelantus: Fine-Granularity Copy-On-Write Operations for Secure Non-Volatile Memories

Zhou J, Awad A & Wang J (2020), 597-609

BibTeX View PDF
@inproceedings{lelantusfinegra-2020/5,
  title={Lelantus: Fine-Granularity Copy-On-Write Operations for Secure Non-Volatile Memories},
  author={Zhou J, Awad A & Wang J},
  booktitle={2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA)},
  pages={597-609},
  year = "2020"
}