Amro Awad
Amro Awad
NC State
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Analyzing and detecting emerging Internet of Things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
Silent shredder: Zero-cost shredding for secure non-volatile main memory controllers
A Awad, P Manadhata, S Haber, Y Solihin, W Horne
ACM SIGPLAN Notices 51 (4), 263-276, 2016
Obfusmem: A low-overhead access obfuscation for trusted memories
A Awad, Y Wang, D Shands, Y Solihin
Proceedings of the 44th Annual International Symposium on Computer …, 2017
MRIMA: An MRAM-based in-memory accelerator
S Angizi, Z He, A Awad, D Fan
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2019
Triad-NVM: persistency for integrity-protected and encrypted non-volatile memories
A Awad, M Ye, Y Solihin, L Njilla, K Abu Zubair
International Symposium in Computer Architecture (ISCA), 104-115, 2019
Osiris: A Low-Cost Mechanism to Enable Restoration of Secure Non-Volatile Memories
M Ye, C Hughes, A Awad
Proceedings of the 51st Annual IEEE/ACM International Symposium on …, 2018
Anubis: Low-overhead and practical recovery time for secure non-volatile memories
KA Zubair, A Awad
International Symposium in Computer Architecture (ISCA), 157-168, 2019
Avoiding TLB shootdowns through self-invalidating TLB entries
A Awad, A Basu, S Blagodurov, Y Solihin, GH Loh
2017 26th International Conference on Parallel Architectures and Compilation …, 2017
Non-Volatile Memory Host Controller Interface Performance Analysis in High-Performance I/O Systems
A Awad, B Kettering, Y Solihin
2015 IEEE International Symposium on Performance Analysis of Systems and …, 2015
Stm: Cloning the spatial and temporal memory access behavior
A Awad, Y Solihin
High Performance Computer Architecture (HPCA), 2014 IEEE 20th International …, 2014
Write-Aware Management of NVM-Based Memory Extensions
A Awad, S Blagodurov, Y Solihin
International Conference on Supercomputing (ICS), 2016
Vr-spy: A side-channel attack on virtual key-logging in vr headsets
A Al Arafat, Z Guo, A Awad
2021 IEEE Virtual Reality and 3D User Interfaces (VR), 564-572, 2021
Phoenix: Towards ultra-low overhead, recoverable, and persistently secure nvm
M Alwadi, KA Zubair, D Mohaisen, A Awad
IEEE Transactions on Dependable and Secure Computing 19 (2), 1049-1063, 2020
Page migration support for disaggregated non-volatile memories
VR Kommareddy, SD Hammond, C Hughes, A Samih, A Awad
Proceedings of the International Symposium on Memory Systems, 417-427, 2019
Persistently-secure processors: Challenges and opportunities for securing non-volatile memories
A Awad, S Suboh, M Ye, KA Zubair, M Al-Wadi
2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 610-614, 2019
Inter-task cache interference aware partitioned real-time scheduling
Z Guo, K Yang, F Yao, A Awad
Proceedings of the 35th annual ACM symposium on applied computing, 218-226, 2020
A keylogging inference attack on air-tapping keyboards in virtual environments
Ü Meteriz-Yıldıran, NF Yıldıran, A Awad, D Mohaisen
2022 IEEE Conference on Virtual Reality and 3D User Interfaces (VR), 765-774, 2022
Towards low-cost mechanisms to enable restoration of encrypted non-volatile memories
M Ye, KA Zubair, A Mohaisen, A Awad
IEEE Transactions on Dependable and Secure Computing 18 (4), 1850-1867, 2019
Adaptive extension of leases for entries in a translation lookaside buffer
A Awad, S Blagodurov, A Basu, MH Oskin, GH Loh, AG Kegel, DS Christie, ...
US Patent 10,261,916, 2019
Stealth-persist: Architectural support for persistent applications in hybrid memory systems
M Alwadi, VR Kommareddy, C Hughes, SD Hammond, A Awad
2021 IEEE International Symposium on High-Performance Computer Architecture …, 2021
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20