Ahmed M. Azab
Title
Cited by
Cited by
Year
Hypersentry: enabling stealthy in-context measurement of hypervisor integrity
AM Azab, P Ning, Z Wang, X Jiang, X Zhang, NC Skalsky
Proceedings of the 17th ACM conference on Computer and communications …, 2010
3762010
Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world
AM Azab, P Ning, J Shah, Q Chen, R Bhutkar, G Ganesh, J Ma, W Shen
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
2682014
Sice: a hardware-level strongly isolated computing environment for x86 multi-core platforms
AM Azab, P Ning, X Zhang
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1702011
HIMA: A hypervisor-based integrity measurement agent
AM Azab, P Ning, EC Sezer, X Zhang
2009 Annual Computer Security Applications Conference, 461-470, 2009
1622009
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
C Kil, EC Sezer, AM Azab, P Ning, X Zhang
2009 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2009
1532009
Easeandroid: Automatic policy analysis and refinement for security enhanced android via large-scale semi-supervised learning
R Wang, W Enck, D Reeves, X Zhang, P Ning, D Xu, W Zhou, AM Azab
24th {USENIX} Security Symposium ({USENIX} Security 15), 351-366, 2015
672015
SKEE: A lightweight Secure Kernel-level Execution Environment for ARM.
AM Azab, K Swidowski, R Bhutkar, J Ma, W Shen, R Wang, P Ning
NDSS 16, 21-24, 2016
662016
NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64
WS Yaohui Chen, Dongli Zhang, Ruowen Wang, Rui Qiao, Ahmed M. Azab, Long Lu ...
38th IEEE Symposium on Security and Privacy, 2017
41*2017
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android
YC Ruowen Wang, Ahmed M Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen ...
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
232017
Pex: A permission check analysis framework for linux kernel
T Zhang, W Shen, D Lee, C Jung, AM Azab, R Wang
28th {USENIX} Security Symposium ({USENIX} Security 19), 1205-1220, 2019
182019
PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks
PN Quan Chen, Ahmed M Azab, Guruprasad Ganesh
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
172017
Seer: practical memory virus scanning as a service
J Gionta, A Azab, W Enck, P Ning, X Zhang
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
172014
Methods and apparatus for protecting operating system data
Q Chen, A Azab, P Ning, G Ganesh
US Patent 9,772,953, 2017
122017
Methods, systems, and computer readable medium for active monitoring, memory protection and integrity verification of target devices
A Azab, P Ning
US Patent 9,483,635, 2016
102016
Passive monitoring of virtual systems using agent-less, offline indexing
GS Ammons, AM Azab, V Bala, SS Duri, TW Mummert, DC Reimer, ...
US Patent App. 13/527,948, 2013
102013
{DACSA}: A Decoupled Architecture for Cloud Security Analysis
J Gionta, A Azab, W Enck, P Ning, X Zhang
7th Workshop on Cyber Security Experimentation and Test ({CSET} 14), 2014
72014
Method and apparatus for protecting kernel control-flow integrity using static binary instrumentation
J Gleeson, A Azab, W Shen, R Bhutkar
US Patent 10,289,842, 2019
52019
Apparatus and method for transparent, secure element-based mediation of on-board diagnostic operations
P Ning, SE Mclaughlin, MC Grace, AM Azab, R Bhutkar, W Shen, X Chen, ...
US Patent 10,320,745, 2019
42019
Apparatus and method for transparent, secure element-based mediation of on-board diagnostic operations
P Ning, SE Mclaughlin, MC Grace, AM Azab, R Bhutkar, W Shen, X Chen, ...
US Patent 10,320,745, 2019
42019
KALD: Detecting Direct Pointer Disclosure Vulnerabilities
B Belleville, W Shen, S Volckaert, AM Azab, M Franz
IEEE Transactions on Dependable and Secure Computing, 2019
22019
The system can't perform the operation now. Try again later.
Articles 1–20