Follow
Ahmed M. Azab
Title
Cited by
Cited by
Year
Hypersentry: enabling stealthy in-context measurement of hypervisor integrity
AM Azab, P Ning, Z Wang, X Jiang, X Zhang, NC Skalsky
Proceedings of the 17th ACM conference on Computer and communications …, 2010
4102010
Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world
AM Azab, P Ning, J Shah, Q Chen, R Bhutkar, G Ganesh, J Ma, W Shen
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
3592014
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
C Kil, EC Sezer, AM Azab, P Ning, X Zhang
2009 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2009
1912009
Sice: a hardware-level strongly isolated computing environment for x86 multi-core platforms
AM Azab, P Ning, X Zhang
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1862011
HIMA: A hypervisor-based integrity measurement agent
AM Azab, P Ning, EC Sezer, X Zhang
2009 Annual Computer Security Applications Conference, 461-470, 2009
1702009
SKEE: A lightweight Secure Kernel-level Execution Environment for ARM.
AM Azab, K Swidowski, R Bhutkar, J Ma, W Shen, R Wang, P Ning
NDSS 16, 21-24, 2016
1052016
{EASEAndroid}: Automatic Policy Analysis and Refinement for Security Enhanced Android via {Large-Scale}{Semi-Supervised} Learning
R Wang, W Enck, D Reeves, X Zhang, P Ning, D Xu, W Zhou, AM Azab
24th USENIX Security Symposium (USENIX Security 15), 351-366, 2015
862015
{PeX}: A permission check analysis framework for linux kernel
T Zhang, W Shen, D Lee, C Jung, AM Azab, R Wang
28th USENIX Security Symposium (USENIX Security 19), 1205-1220, 2019
682019
NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64
WS Yaohui Chen, Dongli Zhang, Ruowen Wang, Rui Qiao, Ahmed M. Azab, Long Lu ...
38th IEEE Symposium on Security and Privacy, 2017
55*2017
Methods and apparatus for protecting operating system data
Q Chen, A Azab, P Ning, G Ganesh
US Patent 9,772,953, 2017
382017
PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks
PN Quan Chen, Ahmed M Azab, Guruprasad Ganesh
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
372017
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android
YC Ruowen Wang, Ahmed M Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen ...
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
372017
Seer: practical memory virus scanning as a service
J Gionta, A Azab, W Enck, P Ning, X Zhang
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
222014
Methods, systems, and computer readable medium for active monitoring, memory protection and integrity verification of target devices
A Azab, P Ning
US Patent 9,483,635, 2016
162016
Method and apparatus for protecting kernel control-flow integrity using static binary instrumentation
J Gleeson, A Azab, W Shen, R Bhutkar
US Patent 10,289,842, 2019
122019
Passive monitoring of virtual systems using agent-less, offline indexing
GS Ammons, AM Azab, V Bala, SS Duri, TW Mummert, DC Reimer, ...
US Patent App. 13/527,948, 2013
112013
A lightweight framework for fine-grained lifecycle control of android applications
Y Shao, R Wang, X Chen, AM Azab, ZM Mao
Proceedings of the Fourteenth EuroSys Conference 2019, 1-14, 2019
102019
{DACSA}: A Decoupled Architecture for Cloud Security Analysis
J Gionta, A Azab, W Enck, P Ning, X Zhang
7th Workshop on Cyber Security Experimentation and Test (CSET 14), 2014
72014
Apparatus and method for protection of critical embedded system components via hardware-isolated secure element-based monitor
P Ning, SE McLaughlin, MC Grace, AM Azab, R Bhutkar, W Shen, X Chen, ...
US Patent 10,402,561, 2019
62019
KALD: Detecting Direct Pointer Disclosure Vulnerabilities
B Belleville, W Shen, S Volckaert, AM Azab, M Franz
IEEE Transactions on Dependable and Secure Computing 18 (3), 1369-1377, 2019
52019
The system can't perform the operation now. Try again later.
Articles 1–20