Amro Awad
Cited by
Cited by
Analyzing and detecting emerging Internet of Things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
Silent shredder: Zero-cost shredding for secure non-volatile main memory controllers
A Awad, P Manadhata, S Haber, Y Solihin, W Horne
ACM SIGPLAN Notices 51 (4), 263-276, 2016
MRIMA: An MRAM-based in-memory accelerator
S Angizi, Z He, A Awad, D Fan
IEEE Transactions on Computer-Aided Design of Integrated Circuits and†…, 2019
Obfusmem: A low-overhead access obfuscation for trusted memories
A Awad, Y Wang, D Shands, Y Solihin
Proceedings of the 44th Annual International Symposium on Computer†…, 2017
Triad-NVM: persistency for integrity-protected and encrypted non-volatile memories
A Awad, M Ye, Y Solihin, L Njilla, K Abu Zubair
International Symposium in Computer Architecture (ISCA), 104-115, 2019
Osiris: A Low-Cost Mechanism to Enable Restoration of Secure Non-Volatile Memories
M Ye, C Hughes, A Awad
Proceedings of the 51st Annual IEEE/ACM International Symposium on†…, 2018
Anubis: Low-overhead and practical recovery time for secure non-volatile memories
KA Zubair, A Awad
International Symposium in Computer Architecture (ISCA), 157-168, 2019
Avoiding TLB shootdowns through self-invalidating TLB entries
A Awad, A Basu, S Blagodurov, Y Solihin, GH Loh
2017 26th International Conference on Parallel Architectures and Compilation†…, 2017
Non-Volatile Memory Host Controller Interface Performance Analysis in High-Performance I/O Systems
A Awad, B Kettering, Y Solihin
2015 IEEE International Symposium on Performance Analysis of Systems and†…, 2015
Write-Aware Management of NVM-Based Memory Extensions
A Awad, S Blagodurov, Y Solihin
International Conference on Supercomputing (ICS), 2016
Stm: Cloning the spatial and temporal memory access behavior
A Awad, Y Solihin
High Performance Computer Architecture (HPCA), 2014 IEEE 20th International†…, 2014
Vr-spy: A side-channel attack on virtual key-logging in vr headsets
A Al Arafat, Z Guo, A Awad
2021 IEEE Virtual Reality and 3D User Interfaces (VR), 564-572, 2021
Phoenix: Towards ultra-low overhead, recoverable, and persistently secure nvm
M Alwadi, KA Zubair, D Mohaisen, A Awad
IEEE Transactions on Dependable and Secure Computing 19 (2), 1049-1063, 2020
A keylogging inference attack on air-tapping keyboards in virtual environments
‹ Meteriz-Yıldıran, NF Yıldıran, A Awad, D Mohaisen
2022 IEEE Conference on Virtual Reality and 3D User Interfaces (VR), 765-774, 2022
Page migration support for disaggregated non-volatile memories
VR Kommareddy, SD Hammond, C Hughes, A Samih, A Awad
Proceedings of the International Symposium on Memory Systems, 417-427, 2019
Inter-task cache interference aware partitioned real-time scheduling
Z Guo, K Yang, F Yao, A Awad
Proceedings of the 35th annual ACM symposium on applied computing, 218-226, 2020
Persistently-secure processors: Challenges and opportunities for securing non-volatile memories
A Awad, S Suboh, M Ye, KA Zubair, M Al-Wadi
2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 610-614, 2019
DeACT: Architecture-Aware Virtual Memory Support for Fabric Attached Memory Systems
VR Kommareddy, C Hughes, SD Hammond, A Awad
2021 IEEE International Symposium on High-Performance Computer Architecture†…, 2021
Towards low-cost mechanisms to enable restoration of encrypted non-volatile memories
M Ye, KA Zubair, A Mohaisen, A Awad
IEEE Transactions on Dependable and Secure Computing 18 (4), 1850-1867, 2019
Adaptive extension of leases for entries in a translation lookaside buffer
A Awad, S Blagodurov, A Basu, MH Oskin, GH Loh, AG Kegel, DS Christie, ...
US Patent 10,261,916, 2019
The system can't perform the operation now. Try again later.
Articles 1–20