Ahmed M. Azab
Cited by
Cited by
Hypersentry: enabling stealthy in-context measurement of hypervisor integrity
AM Azab, P Ning, Z Wang, X Jiang, X Zhang, NC Skalsky
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world
AM Azab, P Ning, J Shah, Q Chen, R Bhutkar, G Ganesh, J Ma, W Shen
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Sice: a hardware-level strongly isolated computing environment for x86 multi-core platforms
AM Azab, P Ning, X Zhang
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
C Kil, EC Sezer, AM Azab, P Ning, X Zhang
2009 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2009
HIMA: A hypervisor-based integrity measurement agent
AM Azab, P Ning, EC Sezer, X Zhang
2009 Annual Computer Security Applications Conference, 461-470, 2009
SKEE: A lightweight Secure Kernel-level Execution Environment for ARM.
AM Azab, K Swidowski, R Bhutkar, J Ma, W Shen, R Wang, P Ning
NDSS 16, 21-24, 2016
{EASEAndroid}: Automatic Policy Analysis and Refinement for Security Enhanced Android via {Large-Scale}{Semi-Supervised} Learning
R Wang, W Enck, D Reeves, X Zhang, P Ning, D Xu, W Zhou, AM Azab
24th USENIX Security Symposium (USENIX Security 15), 351-366, 2015
NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64
WS Yaohui Chen, Dongli Zhang, Ruowen Wang, Rui Qiao, Ahmed M. Azab, Long Lu ...
38th IEEE Symposium on Security and Privacy, 2017
{PeX}: A Permission Check Analysis Framework for Linux Kernel
T Zhang, W Shen, D Lee, C Jung, AM Azab, R Wang
28th USENIX Security Symposium (USENIX Security 19), 1205-1220, 2019
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android
YC Ruowen Wang, Ahmed M Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen ...
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks
PN Quan Chen, Ahmed M Azab, Guruprasad Ganesh
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
Seer: practical memory virus scanning as a service
J Gionta, A Azab, W Enck, P Ning, X Zhang
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
Methods and apparatus for protecting operating system data
Q Chen, A Azab, P Ning, G Ganesh
US Patent 9,772,953, 2017
Methods, systems, and computer readable medium for active monitoring, memory protection and integrity verification of target devices
A Azab, P Ning
US Patent 9,483,635, 2016
Passive monitoring of virtual systems using agent-less, offline indexing
GS Ammons, AM Azab, V Bala, SS Duri, TW Mummert, DC Reimer, ...
US Patent App. 13/527,948, 2013
Method and apparatus for protecting kernel control-flow integrity using static binary instrumentation
J Gleeson, A Azab, W Shen, R Bhutkar
US Patent 10,289,842, 2019
{DACSA}: A Decoupled Architecture for Cloud Security Analysis
J Gionta, A Azab, W Enck, P Ning, X Zhang
7th Workshop on Cyber Security Experimentation and Test (CSET 14), 2014
A lightweight framework for fine-grained lifecycle control of android applications
Y Shao, R Wang, X Chen, AM Azab, ZM Mao
Proceedings of the Fourteenth EuroSys Conference 2019, 1-14, 2019
Apparatus and method for protection of critical embedded system components via hardware-isolated secure element-based monitor
P Ning, SE McLaughlin, MC Grace, AM Azab, R Bhutkar, W Shen, X Chen, ...
US Patent 10,402,561, 2019
KALD: Detecting Direct Pointer Disclosure Vulnerabilities
B Belleville, W Shen, S Volckaert, AM Azab, M Franz
IEEE Transactions on Dependable and Secure Computing 18 (3), 1369-1377, 2019
The system can't perform the operation now. Try again later.
Articles 1–20