Spectre returns! speculation attacks using the return stack buffer EM Koruyeh, KN Khasawneh, C Song, N Abu-Ghazaleh 12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18), 2018 | 138 | 2018 |
Safespec: Banishing the spectre of a meltdown with leakage-free speculation KN Khasawneh, EM Koruyeh, C Song, D Evtyushkin, D Ponomarev, ... 2019 56th ACM/IEEE Design Automation Conference (DAC), 1-6, 2019 | 75* | 2019 |
Ensemble learning for low-level hardware-supported malware detection KN Khasawneh, M Ozsoy, C Donovick, N Abu-Ghazaleh, D Ponomarev International Symposium on Research in Attacks, Intrusions and Defenses …, 2015 | 70 | 2015 |
Hardware-based malware detection using low-level architectural features M Ozsoy, KN Khasawneh, C Donovick, I Gorelik, N Abu-Ghazaleh, ... IEEE Transactions on Computers 65 (11), 3332-3344, 2016 | 53 | 2016 |
Ric: Relaxed inclusion caches for mitigating llc side-channel attacks M Kayaalp, KN Khasawneh, HA Esfeden, J Elwell, N Abu-Ghazaleh, ... 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2017 | 48 | 2017 |
RHMD: Evasion-resilient hardware malware detectors KN Khasawneh, N Abu-Ghazaleh, D Ponomarev, L Yu Proceedings of the 50th Annual IEEE/ACM International Symposium on …, 2017 | 30 | 2017 |
Constructing and characterizing covert channels on gpgpus H Naghibijouybari, KN Khasawneh, N Abu-Ghazaleh 2017 50th Annual IEEE/ACM International Symposium on Microarchitecture …, 2017 | 26 | 2017 |
EnsembleHMD: Accurate hardware malware detectors with specialized ensemble classifiers KN Khasawneh, M Ozsoy, C Donovick, N Abu-Ghazaleh, D Ponomarev IEEE Transactions on Dependable and Secure Computing 17 (3), 620-633, 2018 | 20 | 2018 |
Speccfi: Mitigating spectre attacks using cfi informed speculation EM Koruyeh, SHA Shirazi, KN Khasawneh, C Song, N Abu-Ghazaleh 2020 IEEE Symposium on Security and Privacy (SP), 39-53, 2020 | 13 | 2020 |
Code-bridged classifier (cbc): A low or negative overhead defense for making a cnn classifier robust against adversarial attacks F Behnia, A Mirzaeian, M Sabokrou, S Manoj, T Mohsenin, ... 2020 21st International Symposium on Quality Electronic Design (ISQED), 27-32, 2020 | 7 | 2020 |
Evolution of defenses against transient-execution attacks C Canella, SM Pudukotai Dinakarrao, D Gruss, KN Khasawneh Proceedings of the 2020 on Great Lakes Symposium on VLSI, 169-174, 2020 | 4 | 2020 |
Adversarial evasion-resilient hardware malware detectors KN Khasawneh, NB Abu-Ghazaleh, D Ponomarev, L Yu 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-6, 2018 | 4 | 2018 |
The evolution of transient-execution attacks C Canella, KN Khasawneh, D Gruss Proceedings of the 2020 on Great Lakes Symposium on VLSI, 163-168, 2020 | 2 | 2020 |
ND-HMDs: Non-Differentiable Hardware Malware Detectors against Evasive Transient Execution Attacks MS Islam, AP Kuruvila, K Basu, KN Khasawneh 2020 IEEE 38th International Conference on Computer Design (ICCD), 537-544, 2020 | 1 | 2020 |
Defensive Approximation: Enhancing CNNs Security through Approximate Computing A Guesmi, I Alouani, K Khasawneh, M Baklouti, T Frikha, M Abid, ... arXiv preprint arXiv:2006.07700, 2020 | 1 | 2020 |
LATCH: A Locality-Aware Taint CHecker D Townley, KN Khasawneh, D Ponomarev, N Abu-Ghazaleh, L Yu Proceedings of the 52nd Annual IEEE/ACM International Symposium on …, 2019 | 1 | 2019 |
Malware detectors learn to work together M Lee Nature Electronics 1 (4), 206, 2018 | 1 | 2018 |
Ensemble Learning with an Architectural Sub-semantic Engine for Malware Detection K Khasawneh State University of New York at Binghamton, 2014 | 1 | 2014 |
Lightweight Implementation of the LowMC Block Cipher Protected Against Side-Channel Attacks J Bahrami, VB Dang, A Abdulgadir, KN Khasawneh, JP Kaps, K Gaj Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware …, 2020 | | 2020 |
A Review of In-Memory Computing Architectures for Machine Learning Applications S Bavikadi, PR Sutradhar, KN Khasawneh, A Ganguly, ... Proceedings of the 2020 on Great Lakes Symposium on VLSI, 89-94, 2020 | | 2020 |