default search action
Amro Awad
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Arsalan Ali Malik, Emre Karabulut, Amro Awad, Aydin Aysu:
Enabling Secure and Efficient Sharing of Accelerators in Expeditionary Systems. J. Hardw. Syst. Secur. 8(2): 94-112 (2024) - [j18]Kazi Abu Zubair, Rahaf Abdullah, David Mohaisen, Amro Awad:
RC-NVM: Recovery-Aware Reliability-Security Co-Design for Non-Volatile Memories. IEEE Trans. Dependable Secur. Comput. 21(4): 1817-1830 (2024) - [j17]Rakin Muhammad Shadab, Yu Zou, Sanjay Gandham, Amro Awad, Mingjie Lin:
A Secure Computing System With Hardware-Efficient Lazy Bonsai Merkle Tree for FPGA-Attached Embedded Memory. IEEE Trans. Dependable Secur. Comput. 21(4): 3262-3279 (2024) - [c52]Rahaf Abdullah, Hyokeun Lee, Huiyang Zhou, Amro Awad:
Salus: Efficient Security Support for CXL-Expanded GPU Memory. HPCA 2024: 1-15 - [c51]Debpratim Adak, Hyokeun Lee, Ben Feinberg, Gwendolyn Voskuilen, Clayton Hughes, Huiyang Zhou, Amro Awad:
SEFsim: A Statistically-Guided Fast DRAM Simulator. ISPASS 2024: 304-306 - [i9]Emre Karabulut, Arsalan Ali Malik, Amro Awad, Aydin Aysu:
THEMIS: Time, Heterogeneity, and Energy Minded Scheduling for Fair Multi-Tenant Use in FPGAs. CoRR abs/2404.00507 (2024) - 2023
- [j16]Md Hafizul Islam Chowdhuryy, Rickard Ewetz, Amro Awad, Fan Yao:
Understanding and Characterizing Side Channels Exploiting Phase-Change Memories. IEEE Micro 43(5): 8-15 (2023) - [j15]Rakin Muhammad Shadab, Yu Zou, Sanjay Gandham, Amro Awad, Mingjie Lin:
HMT: A Hardware-centric Hybrid Bonsai Merkle Tree Algorithm for High-performance Authentication. ACM Trans. Embed. Comput. Syst. 22(4): 64:1-64:28 (2023) - [c50]Xijing Han, James Tuck, Amro Awad:
Thoth: Bridging the Gap Between Persistently Secure Memories and Memory Interfaces of Emerging NVMs. HPCA 2023: 94-107 - [c49]Rahaf Abdullah, Huiyang Zhou, Amro Awad:
Plutus: Bandwidth-Efficient Memory Security for GPUs. HPCA 2023: 543-555 - [c48]Md Hafizul Islam Chowdhuryy, Myoungsoo Jung, Fan Yao, Amro Awad:
D-Shield: Enabling Processor-side Encryption and Integrity Verification for Secure NVMe Drives. HPCA 2023: 908-921 - [c47]Shubham Nema, Shiva Kaushik Chunduru, Charan Kodigal, Gwendolyn Voskuilen, Arun F. Rodrigues, K. Scott Hemmert, Ben Feinberg, Hyokeun Lee, Amro Awad, Clayton Hughes:
ERAS: A Flexible and Scalable Framework for Seamless Integration of RTL Models with Structural Simulation Toolkit. IISWC 2023: 196-200 - [c46]Emre Karabulut, Amro Awad, Aydin Aysu:
SS-AXI: Secure and Safe Access Control Mechanism for Multi-Tenant Cloud FPGAs. ISCAS 2023: 1-5 - [c45]Faiz Alam, Hyokeun Lee, Abhishek Bhattacharjee, Amro Awad:
CryptoMMU: Enabling Scalable and Secure Access Control of Third-Party Accelerators. MICRO 2023: 32-48 - 2022
- [j14]Jinchun Choi, Afsah Anwar, Abdulrahman Alabduljabbar, Hisham Alasmary, Jeffrey Spaulding, An Wang, Songqing Chen, DaeHun Nyang, Amro Awad, David Mohaisen:
Understanding Internet of Things malware by analyzing endpoints in their static artifacts. Comput. Networks 206: 108768 (2022) - [j13]Hisham Alasmary, Afsah Anwar, Ahmed Abusnaina, Abdulrahman Alabduljabbar, Mohammed Abuhamad, An Wang, Daehun Nyang, Amro Awad, David Mohaisen:
ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation. IEEE Internet Things J. 9(4): 2485-2496 (2022) - [j12]Mazen Al-Wadi, Kazi Abu Zubair, David Mohaisen, Amro Awad:
Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM. IEEE Trans. Dependable Secur. Comput. 19(2): 1049-1063 (2022) - [j11]Yu Zou, Amro Awad, Mingjie Lin:
DirectNVM: Hardware-accelerated NVMe SSDs for High-performance Embedded Computing. ACM Trans. Embed. Comput. Syst. 21(1): 9:1-9:24 (2022) - [j10]Yu Zou, Kazi Abu Zubair, Mazen Al-Wadi, Rakin Muhammad Shadab, Sanjay Gandham, Amro Awad, Mingjie Lin:
ARES: Persistently Secure Non-Volatile Memory with Processor-transparent and Hardware-friendly Integrity Verification and Metadata Recovery. ACM Trans. Embed. Comput. Syst. 21(1): 11:1-11:32 (2022) - [c44]Anuj Dubey, Emre Karabulut, Amro Awad, Aydin Aysu:
High-Fidelity Model Extraction Attacks via Remote Power Monitors. AICAS 2022: 328-331 - [c43]Emre Karabulut, Chandu Yuvarajappa, Mohammed Iliyas Shaik, Seetal Potluri, Amro Awad, Aydin Aysu:
PR Crisis: Analyzing and Fixing Partial Reconfiguration in Multi-Tenant Cloud FPGAs. ASHES@CCS 2022: 101-106 - [c42]Muhammad Rashedul Haq Rashed, Amro Awad, Sumit Kumar Jha, Rickard Ewetz:
Towards resilient analog in-memory deep learning via data layout re-organization. DAC 2022: 859-864 - [c41]Rakin Muhammad Shadab, Yu Zou, Sanjay Gandham, Amro Awad, Mingjie Lin:
HMT: A Hardware-Centric Hybrid Bonsai Merkle Tree Algorithm for High-Performance Authentication. FPGA 2022: 52 - [c40]Shougang Yuan, Amro Awad, Ardhi Wiratama Baskara Yudha, Yan Solihin, Huiyang Zhou:
Adaptive Security Support for Heterogeneous Memory on GPUs. HPCA 2022: 213-228 - [c39]Kazi Abu Zubair, David Mohaisen, Amro Awad:
Filesystem Encryption or Direct-Access for NVM Filesystems? Let's Have Both! HPCA 2022: 490-502 - [c38]Mark Plagge, Ben Feinberg, John McFarland, Fred Rothganger, Sapan Agarwal, Amro Awad, Clayton Hughes, Suma George Cardwell:
ATHENA: Enabling Codesign for Next-Generation AI/ML Architectures. ICRC 2022: 13-23 - [c37]Mazen Al-Wadi, Rujia Wang, David Mohaisen, Clayton Hughes, Simon David Hammond, Amro Awad:
Minerva: Rethinking Secure Architectures for the Era of Fabric-Attached Memory Architectures. IPDPS 2022: 258-268 - [c36]Shubham Nema, Justin Kirschner, Debpratim Adak, Sapan Agarwal, Ben Feinberg, Arun F. Rodrigues, Matthew J. Marinella, Amro Awad:
Eris: Fault Injection and Tracking Framework for Reliability Analysis of Open-Source Hardware. ISPASS 2022: 210-220 - [c35]Xijing Han, James Tuck, Amro Awad:
Horus: Persistent Security for Extended Persistence-Domain Memory Systems. MICRO 2022: 1255-1269 - [c34]John McFarland, Amro Awad:
Transpose-xen: virtualized mixed-criticality through dynamic allocation. SAC 2022: 3-12 - [c33]Ülkü Meteriz-Yildiran, Necip Fazil Yildiran, Amro Awad, David Mohaisen:
A Keylogging Inference Attack on Air-Tapping Keyboards in Virtual Environments. VR 2022: 765-774 - [i8]Rakin Muhammad Shadab, Yu Zou, Sanjay Gandham, Amro Awad, Mingjie Lin:
HMT: A Hardware-Centric Hybrid Bonsai Merkle Tree Algorithm for High-Performance Authentication. CoRR abs/2204.08976 (2022) - [i7]Kazi Abu Zubair, Sumit Kumar Jha, David Mohaisen, Clayton Hughes, Amro Awad:
FAT-PIM: Low-Cost Error Detection for Processing-In-Memory. CoRR abs/2207.12231 (2022) - 2021
- [j9]Qutaiba Alasad, Jie Lin, Jiann-Shuin Yuan, Deliang Fan, Amro Awad:
Resilient and Secure Hardware Devices Using ASL. ACM J. Emerg. Technol. Comput. Syst. 17(2): 11:1-11:26 (2021) - [j8]Mazen Al-Wadi, Amro Awad:
Caching Techniques for Security Metadata in Integrity-Protected Fabric-Attached Memories. EAI Endorsed Trans. Security Safety 7(24): e1 (2021) - [j7]Mao Ye, Kazi Abu Zubair, Aziz Mohaisen, Amro Awad:
Towards Low-Cost Mechanisms to Enable Restoration of Encrypted Non-Volatile Memories. IEEE Trans. Dependable Secur. Comput. 18(4): 1850-1867 (2021) - [c32]Fengkai Yuan, Kai Wang, Rui Hou, Xiaoxin Li, Peinan Li, Lutan Zhao, Jiameng Ying, Amro Awad, Dan Meng:
PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter. DATE 2021: 1697-1702 - [c31]Yu Zou, Amro Awad, Mingjie Lin:
HERMES: Hardware-Efficient Speculative Dataflow Architecture for Bonsai Merkle Tree-Based Memory Authentication. HOST 2021: 203-213 - [c30]Mazen Al-Wadi, Vamsee Reddy Kommareddy, Clayton Hughes, Simon David Hammond, Amro Awad:
Stealth-Persist: Architectural Support for Persistent Applications in Hybrid Memory Systems. HPCA 2021: 139-152 - [c29]Vamsee Reddy Kommareddy, Clayton Hughes, Simon David Hammond, Amro Awad:
DeACT: Architecture-Aware Virtual Memory Support for Fabric Attached Memory Systems. HPCA 2021: 453-466 - [c28]Chaochao Zhang, Amro Awad, Rui Hou, Mazen Al-Wadi:
Punchcard: A Practical Red-Zone Based Scheme for Low-Overhead Heap Protection. HPCC/DSS/SmartCity/DependSys 2021: 405-414 - [c27]Mazen Al-Wadi, Aziz Mohaisen, Amro Awad:
ProMT: optimizing integrity tree updates for write-intensive pages in secure NVMs. ICS 2021: 479-490 - [c26]Xingbin Wang, Boyan Zhao, Rui Hou, Amro Awad, Zhihong Tian, Dan Meng:
NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks. ISCA 2021: 776-789 - [c25]Md Hafizul Islam Chowdhuryy, Muhammad Rashedul Haq Rashed, Amro Awad, Rickard Ewetz, Fan Yao:
LADDER: Architecting Content and Location-aware Writes for Crossbar Resistive Memories. MICRO 2021: 117-130 - [c24]Kazi Abu Zubair, Sudhanva Gurumurthi, Vilas Sridharan, Amro Awad:
Soteria: Towards Resilient Integrity-Protected and Encrypted Non-Volatile Memories. MICRO 2021: 1214-1226 - [c23]Xijing Han, James Tuck, Amro Awad:
Dolos: Improving the Performance of Persistent Applications in ADR-Supported Secure Memory. MICRO 2021: 1241-1253 - [c22]Md Hafizul Islam Chowdhuryy, Rickard Ewetz, Amro Awad, Fan Yao:
Seeds of SEED: R-SAW: New Side Channels Exploiting Read Asymmetry in MLC Phase Change Memories. SEED 2021: 22-28 - [c21]Abdullah Al Arafat, Zhishan Guo, Amro Awad:
VR-Spy: A Side-Channel Attack on Virtual Key-Logging in VR Headsets. VR 2021: 564-572 - [i6]Afsah Anwar, Jinchun Choi, Abdulrahman Alabduljabbar, Hisham Alasmary, Jeffrey Spaulding, An Wang, Songqing Chen, DaeHun Nyang, Amro Awad, David Mohaisen:
Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts. CoRR abs/2103.14217 (2021) - [i5]Hisham Alasmary, Afsah Anwar, Ahmed Abusnaina, Abdulrahman Alabduljabbar, Mohammad Abuhamad, An Wang, DaeHun Nyang, Amro Awad, David Mohaisen:
ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation. CoRR abs/2103.14221 (2021) - 2020
- [j6]Yuezhi Che, Yuanzhou Yang, Amro Awad, Rujia Wang:
A Lightweight Memory Access Pattern Obfuscation Framework for NVM. IEEE Comput. Archit. Lett. 19(2): 163-166 (2020) - [j5]Amro Awad, Rujia Wang:
Guest Editors' Introduction to the Special Issue on Hardware Security. IEEE Trans. Computers 69(11): 1556-1557 (2020) - [j4]Shaahin Angizi, Zhezhi He, Amro Awad, Deliang Fan:
MRIMA: An MRAM-Based In-Memory Accelerator. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(5): 1123-1136 (2020) - [c20]Jian Zhou, Amro Awad, Jun Wang:
Lelantus: Fine-Granularity Copy-On-Write Operations for Secure Non-Volatile Memories. ISCA 2020: 597-609 - [c19]Vamsee Reddy Kommareddy, Jagadish Kotra, Clayton Hughes, Simon David Hammond, Amro Awad:
PreFAM: Understanding the Impact of Prefetching in Fabric-Attached Memory Architectures. MEMSYS 2020: 323-334 - [c18]Zhishan Guo, Kecheng Yang, Fan Yao, Amro Awad:
Inter-task cache interference aware partitioned real-time scheduling. SAC 2020: 218-226 - [i4]Vamsee Reddy Kommareddy, Clayton Hughes, Simon David Hammond, Amro Awad:
DeACT: Architecture-Aware Virtual Memory Support for Fabric Attached Memory Systems. CoRR abs/2008.00171 (2020) - [i3]Fengkai Yuan, Kai Wang, Rui Hou, Xiaoxin Li, Peinan Li, Lutan Zhao, Jiameng Ying, Amro Awad, Dan Meng:
PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter. CoRR abs/2012.01046 (2020)
2010 – 2019
- 2019
- [j3]Vamsee Reddy Kommareddy, Baogang Zhang, Fan Yao, Rickard Ewetz, Amro Awad:
Are Crossbar Memories Secure? New Security Vulnerabilities in Crossbar Memories. IEEE Comput. Archit. Lett. 18(2): 174-177 (2019) - [j2]Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, Ahmed Abusnaina, Amro Awad, DaeHun Nyang, Aziz Mohaisen:
Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach. IEEE Internet Things J. 6(5): 8977-8988 (2019) - [c17]Hussein Elnawawy, Rangeen Basu Roy Chowdhury, Amro Awad, Gregory T. Byrd:
Diligent TLBs: a mechanism for exploiting heterogeneity in TLB miss behavior. ICS 2019: 195-205 - [c16]Amro Awad, Mao Ye, Yan Solihin, Laurent Njilla, Kazi Abu Zubair:
Triad-NVM: persistency for integrity-protected and encrypted non-volatile memories. ISCA 2019: 104-115 - [c15]Kazi Abu Zubair, Amro Awad:
Anubis: ultra-low overhead and recovery time for secure non-volatile memories. ISCA 2019: 157-168 - [c14]Andrew Hughes, Amro Awad:
Quantifying Performance Determinism in Virtualized Mixed-Criticality Systems. ISORC 2019: 181-184 - [c13]Vamsee Reddy Kommareddy, Clayton Hughes, Simon D. Hammond, Amro Awad:
Investigating Fairness in Disaggregated Non-Volatile Memories. ISVLSI 2019: 104-110 - [c12]Amro Awad, Suboh Suboh, Mao Ye, Kazi Abu Zubair, Mazen Al-Wadi:
Persistently-Secure Processors: Challenges and Opportunities for Securing Non-Volatile Memories. ISVLSI 2019: 610-614 - [c11]Vamsee Reddy Kommareddy, Simon David Hammond, Clayton Hughes, Ahmad Samih, Amro Awad:
Page migration support for disaggregated non-volatile memories. MEMSYS 2019: 417-427 - [i2]Mazen Al-Wadi, Aziz Mohaisen, Amro Awad:
Phoenix: Towards Persistently Secure, Recoverable, and NVM Friendly Tree of Counters. CoRR abs/1911.01922 (2019) - 2018
- [c10]Mao Ye, Clayton Hughes, Amro Awad:
Osiris: A Low-Cost Mechanism to Enable Restoration of Secure Non-Volatile Memories. MICRO 2018: 403-415 - [c9]Vamsee Reddy Kommareddy, Amro Awad, Clayton Hughes, Simon David Hammond:
Exploring Allocation Policies in Disaggregated Non-Volatile Memories. MCHPC@SC 2018: 58-66 - [i1]Amro Awad, Laurent Njilla, Mao Ye:
Triad-NVM: Persistent-Security for Integrity-Protected and Encrypted Non-Volatile Memories (NVMs). CoRR abs/1810.09438 (2018) - 2017
- [c8]Amro Awad, Arkaprava Basu, Sergey Blagodurov, Yan Solihin, Gabriel H. Loh:
Avoiding TLB Shootdowns Through Self-Invalidating TLB Entries. PACT 2017: 273-287 - [c7]Amro Awad, Yipeng Wang, Deborah Shands, Yan Solihin:
ObfusMem: A Low-Overhead Access Obfuscation for Trusted Memories. ISCA 2017: 107-119 - [c6]Yipeng Wang, Amro Awad, Yan Solihin:
Clone morphing: Creating new workload behavior from existing applications. ISPASS 2017: 97-108 - [c5]Amro Awad, Simon D. Hammond, Clay Hughes, Arun Rodrigues, K. Scott Hemmert, Robert J. Hoekstra:
Performance analysis for using non-volatile memory DIMMs: opportunities and challenges. MEMSYS 2017: 411-420 - 2016
- [j1]Amro Awad, Ganesh Balakrishnan, Yipeng Wang, Yan Solihin:
Accurate Cloning of the Memory Access Behavior. IPSJ Trans. Syst. LSI Des. Methodol. 9: 49-60 (2016) - [c4]Amro Awad, Pratyusa K. Manadhata, Stuart Haber, Yan Solihin, William G. Horne:
Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main Memory Controllers. ASPLOS 2016: 263-276 - [c3]Amro Awad, Sergey Blagodurov, Yan Solihin:
Write-Aware Management of NVM-based Memory Extensions. ICS 2016: 9:1-9:12 - 2015
- [c2]Amro Awad, Brett Kettering, Yan Solihin:
Non-volatile memory host controller interface performance analysis in high-performance I/O systems. ISPASS 2015: 145-154 - 2014
- [c1]Amro Awad, Yan Solihin:
STM: Cloning the spatial and temporal memory access behavior. HPCA 2014: 237-247
Coauthor Index
aka: Clayton Hughes
aka: Aziz Mohaisen
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint