Spectre returns! speculation attacks using the return stack buffer EM Koruyeh, KN Khasawneh, C Song, N Abu-Ghazaleh 12th USENIX Workshop on Offensive Technologies (WOOT 18), 2018 | 370 | 2018 |
Safespec: Banishing the spectre of a meltdown with leakage-free speculation KN Khasawneh, EM Koruyeh, C Song, D Evtyushkin, D Ponomarev, ... 2019 56th ACM/IEEE Design Automation Conference (DAC), 1-6, 2019 | 224* | 2019 |
Ensemble learning for low-level hardware-supported malware detection KN Khasawneh, M Ozsoy, C Donovick, N Abu-Ghazaleh, D Ponomarev International Symposium on Research in Attacks, Intrusions and Defenses …, 2015 | 117 | 2015 |
Hardware-based malware detection using low-level architectural features M Ozsoy, KN Khasawneh, C Donovick, I Gorelik, N Abu-Ghazaleh, ... IEEE Transactions on Computers 65 (11), 3332-3344, 2016 | 104 | 2016 |
Speccfi: Mitigating spectre attacks using cfi informed speculation EM Koruyeh, SHA Shirazi, KN Khasawneh, C Song, N Abu-Ghazaleh 2020 IEEE Symposium on Security and Privacy (SP), 39-53, 2020 | 87 | 2020 |
Ric: Relaxed inclusion caches for mitigating llc side-channel attacks M Kayaalp, KN Khasawneh, HA Esfeden, J Elwell, N Abu-Ghazaleh, ... Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017 | 83 | 2017 |
Constructing and characterizing covert channels on gpgpus H Naghibijouybari, KN Khasawneh, N Abu-Ghazaleh Proceedings of the 50th Annual IEEE/ACM International Symposium on …, 2017 | 71 | 2017 |
RHMD: Evasion-resilient hardware malware detectors KN Khasawneh, N Abu-Ghazaleh, D Ponomarev, L Yu Proceedings of the 50th Annual IEEE/ACM international symposium on …, 2017 | 71 | 2017 |
A review of in-memory computing architectures for machine learning applications S Bavikadi, PR Sutradhar, KN Khasawneh, A Ganguly, ... Proceedings of the 2020 on Great Lakes Symposium on VLSI, 89-94, 2020 | 56 | 2020 |
EnsembleHMD: Accurate hardware malware detectors with specialized ensemble classifiers KN Khasawneh, M Ozsoy, C Donovick, N Abu-Ghazaleh, D Ponomarev IEEE Transactions on Dependable and Secure Computing 17 (3), 620-633, 2018 | 49 | 2018 |
Defensive approximation: securing CNNs using approximate computing A Guesmi, I Alouani, KN Khasawneh, M Baklouti, T Frikha, M Abid, ... Proceedings of the 26th ACM international conference on architectural …, 2021 | 45 | 2021 |
Evolution of defenses against transient-execution attacks C Canella, SM Pudukotai Dinakarrao, D Gruss, KN Khasawneh Proceedings of the 2020 on Great Lakes Symposium on VLSI, 169-174, 2020 | 32 | 2020 |
The evolution of transient-execution attacks C Canella, KN Khasawneh, D Gruss Proceedings of the 2020 on Great Lakes Symposium on VLSI, 163-168, 2020 | 24 | 2020 |
Code-bridged classifier (cbc): A low or negative overhead defense for making a cnn classifier robust against adversarial attacks F Behnia, A Mirzaeian, M Sabokrou, S Manoj, T Mohsenin, ... 2020 21st International Symposium on Quality Electronic Design (ISQED), 27-32, 2020 | 21 | 2020 |
Lightweight implementation of the lowmc block cipher protected against side-channel attacks J Bahrami, VB Dang, A Abdulgadir, KN Khasawneh, JP Kaps, K Gaj Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware …, 2020 | 19 | 2020 |
Cloak & co-locate: Adversarial railroading of resource sharing-based attacks on the cloud HM Makrani, H Sayadi, N Nazari, KN Khasawneh, A Sasan, S Rafatirad, ... 2021 International Symposium on Secure and Private Execution Environment …, 2021 | 14 | 2021 |
Repttack: Exploiting cloud schedulers to guide co-location attacks C Fang, H Wang, N Nazari, B Omidi, A Sasan, KN Khasawneh, ... arXiv preprint arXiv:2110.00846, 2021 | 13 | 2021 |
Efficient hardware malware detectors that are resilient to adversarial evasion MS Islam, KN Khasawneh, N Abu-Ghazaleh, D Ponomarev, L Yu IEEE Transactions on Computers 71 (11), 2872-2887, 2021 | 13 | 2021 |
Nd-hmds: Non-differentiable hardware malware detectors against evasive transient execution attacks MS Islam, AP Kuruvila, K Basu, KN Khasawneh 2020 IEEE 38th International Conference on Computer Design (ICCD), 537-544, 2020 | 13 | 2020 |
Imitating functional operations for mitigating side-channel leakage A Dhavlle, S Rafatirad, K Khasawneh, H Homayoun, SMP Dinakarrao IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2021 | 12 | 2021 |