Hamed Nemati

Orcid: 0000-0001-9251-3679

Affiliations:
  • CISPA Helmholtz Center for Information Security, Saarbrücken, Germany


According to our database1, Hamed Nemati authored at least 32 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and Performance Optimization.
CoRR, 2023

Serberus: Protecting Cryptographic Code from Spectres at Compile-Time.
CoRR, 2023

SEAL: Capability-Based Access Control for Data-Analytic Scenarios.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

CryptoBap: A Binary Analysis Platform for Cryptographic Protocols.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Axiomatic hardware-software contracts for security.
Proceedings of the ISCA '22: The 49th Annual International Symposium on Computer Architecture, New York, New York, USA, June 18, 2022

Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

A Case Study in Information Flow Refinement for Low Level Systems.
Proceedings of the Logic of Software. A Tasting Menu of Formal Methods, 2022

2021
Relational Models of Microarchitectures for Formal Security Analyses.
CoRR, 2021

Osiris: Automated Discovery of Microarchitectural Side Channels.
Proceedings of the 30th USENIX Security Symposium, 2021

Validation of Side-Channel Models via Observation Refinement.
Proceedings of the MICRO '21: 54th Annual IEEE/ACM International Symposium on Microarchitecture, 2021

Replication Package for Input Algebras.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2021

Input Algebras.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

On Compositional Information Flow Aware Refinement.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

2020
Speculative Leakage in ARM Cortex-A53.
CoRR, 2020

Secure System Virtualization: End-to-End Verification of Memory Isolation.
CoRR, 2020

Spatio-Temporal Model-Checking of Cyber-Physical Systems Using Graph Queries.
Proceedings of the Tests and Proofs - 14th International Conference, 2020

MAC-in-the-Box: Verifying a Minimalistic Hardware Design for MAC Computation.
Proceedings of the Computer Security - ESORICS 2020, 2020

Validation of Abstract Side-Channel Models for Computer Architectures.
Proceedings of the Computer Aided Verification - 32nd International Conference, 2020

2019
ConfLLVM: A Compiler for Enforcing Data Confidentiality in Low-Level Code.
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019

2018
Formal Verification of Integrity-Preserving Countermeasures Against Cache Storage Side-Channels.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018

2017
Secure System Virtualization: End-to-End Verification of Memory Isolation.
PhD thesis, 2017

2016
Provably secure memory isolation for Linux on ARM.
J. Comput. Secur., 2016

Cache Storage Channels: Alias-Driven Attacks and Verified Countermeasures.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
Trustworthy Memory Isolation of Linux on Embedded Devices.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

Trustworthy Virtualization of the ARMv7 Memory Subsystem.
Proceedings of the SOFSEM 2015: Theory and Practice of Computer Science, 2015

Trustworthy Prevention of Code Injection in Linux on Embedded Devices.
Proceedings of the Computer Security - ESORICS 2015, 2015

2013
Machine code verification of a tiny ARM hypervisor.
Proceedings of the TrustED'13, 2013

Formal verification of information flow security for a simple arm-based separation kernel.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Private Key based query on encrypted data.
ISC Int. J. Inf. Secur., 2012

2011
Virtual machine based security architecture.
Proceedings of the 2011 World Congress on Internet Security, 2011

2010
TCvisor: A hypervisor level secure storage.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010


  Loading...