Ahmed M. Azab
Cited by
Cited by
Hypersentry: enabling stealthy in-context measurement of hypervisor integrity
AM Azab, P Ning, Z Wang, X Jiang, X Zhang, NC Skalsky
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world
AM Azab, P Ning, J Shah, Q Chen, R Bhutkar, G Ganesh, J Ma, W Shen
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
C Kil, EC Sezer, AM Azab, P Ning, X Zhang
2009 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2009
Sice: a hardware-level strongly isolated computing environment for x86 multi-core platforms
AM Azab, P Ning, X Zhang
Proceedings of the 18th ACM conference on Computer and communications …, 2011
HIMA: A hypervisor-based integrity measurement agent
AM Azab, P Ning, EC Sezer, X Zhang
2009 Annual Computer Security Applications Conference, 461-470, 2009
SKEE: A lightweight Secure Kernel-level Execution Environment for ARM.
AM Azab, K Swidowski, R Bhutkar, J Ma, W Shen, R Wang, P Ning
NDSS 16, 21-24, 2016
{EASEAndroid}: Automatic Policy Analysis and Refinement for Security Enhanced Android via {Large-Scale}{Semi-Supervised} Learning
R Wang, W Enck, D Reeves, X Zhang, P Ning, D Xu, W Zhou, AM Azab
24th USENIX Security Symposium (USENIX Security 15), 351-366, 2015
{PeX}: A permission check analysis framework for linux kernel
T Zhang, W Shen, D Lee, C Jung, AM Azab, R Wang
28th USENIX Security Symposium (USENIX Security 19), 1205-1220, 2019
NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64
WS Yaohui Chen, Dongli Zhang, Ruowen Wang, Rui Qiao, Ahmed M. Azab, Long Lu ...
38th IEEE Symposium on Security and Privacy, 2017
Methods and apparatus for protecting operating system data
Q Chen, A Azab, P Ning, G Ganesh
US Patent 9,772,953, 2017
PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks
PN Quan Chen, Ahmed M Azab, Guruprasad Ganesh
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android
YC Ruowen Wang, Ahmed M Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen ...
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
Seer: practical memory virus scanning as a service
J Gionta, A Azab, W Enck, P Ning, X Zhang
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
Methods, systems, and computer readable medium for active monitoring, memory protection and integrity verification of target devices
A Azab, P Ning
US Patent 9,483,635, 2016
Method and apparatus for protecting kernel control-flow integrity using static binary instrumentation
J Gleeson, A Azab, W Shen, R Bhutkar
US Patent 10,289,842, 2019
Passive monitoring of virtual systems using agent-less, offline indexing
GS Ammons, AM Azab, V Bala, SS Duri, TW Mummert, DC Reimer, ...
US Patent App. 13/527,948, 2013
A lightweight framework for fine-grained lifecycle control of android applications
Y Shao, R Wang, X Chen, AM Azab, ZM Mao
Proceedings of the Fourteenth EuroSys Conference 2019, 1-14, 2019
Apparatus and method for protection of critical embedded system components via hardware-isolated secure element-based monitor
P Ning, SE McLaughlin, MC Grace, AM Azab, R Bhutkar, W Shen, X Chen, ...
US Patent 10,402,561, 2019
{DACSA}: A Decoupled Architecture for Cloud Security Analysis
J Gionta, A Azab, W Enck, P Ning, X Zhang
7th Workshop on Cyber Security Experimentation and Test (CSET 14), 2014
KALD: Detecting Direct Pointer Disclosure Vulnerabilities
B Belleville, W Shen, S Volckaert, AM Azab, M Franz
IEEE Transactions on Dependable and Secure Computing 18 (3), 1369-1377, 2019
The system can't perform the operation now. Try again later.
Articles 1–20