Ahmad Atamli-Reineh

Affiliations:
  • University of Oxford, UK (PhD 2017)


According to our database1, Ahmad Atamli-Reineh authored at least 18 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DL2Fence: Integrating Deep Learning and Frame Fusion for Enhanced Detection and Localization of Refined Denial-of-Service in Large-Scale NoCs.
CoRR, 2024

One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices.
CoRR, 2024

2022
Live system call trace reconstruction on Linux.
Digit. Investig., 2022

Forensic analysis of Tor in Windows environment: A case study.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2019
EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs.
Proceedings of the 28th USENIX Security Symposium, 2019

IO-Trust: An out-of-band trusted memory acquisition for intrusion detection and Forensics investigations in cloud IOMMU based systems.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2017
Partitioning the trusted computing base of applications on commodity systems.
PhD thesis, 2017

A framework for application partitioning using trusted execution environments.
Concurr. Comput. Pract. Exp., 2017

AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.
Proceedings of the 26th USENIX Security Symposium, 2017

Architectures for Enhancing Authentication Privacy and Security using Trusted Computing.
Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX@SOSP 2017, 2017

2016
Aware: Controlling App Access to I/O Devices on Mobile Platforms.
CoRR, 2016

Enabling Secure and Usable Mobile Application: Revealing the Nuts and Bolts of software TPM in todays Mobile Devices.
CoRR, 2016

Trustworthy and Secure Service-Oriented Architecture for the Internet of Things.
CoRR, 2016

Analysis of Trusted Execution Environment usage in Samsung KNOX.
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016

Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

2015
Securing Application with Software Partitioning: A Case Study Using SGX.
Proceedings of the Security and Privacy in Communication Networks, 2015

AuDroid: Preventing Attacks on Audio Channels in Mobile Devices.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Threat-Based Security Analysis for the Internet of Things.
Proceedings of the 2014 International Workshop on Secure Internet of Things, 2014


  Loading...