Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ahmad Atamli-Reineh
@article{DBLP:journals/corr/abs-2403-07465, author = {Marco Chilese and Richard Mitev and Meni Orenbach and Robert Thorburn and Ahmad Atamli and Ahmad{-}Reza Sadeghi}, title = {One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices}, journal = {CoRR}, volume = {abs/2403.07465}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.07465}, doi = {10.48550/ARXIV.2403.07465}, eprinttype = {arXiv}, eprint = {2403.07465}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-07465.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-13563, author = {Haoyu Wang and Basel Halak and Jianjie Ren and Ahmad Atamli}, title = {DL2Fence: Integrating Deep Learning and Frame Fusion for Enhanced Detection and Localization of Refined Denial-of-Service in Large-Scale NoCs}, journal = {CoRR}, volume = {abs/2403.13563}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.13563}, doi = {10.48550/ARXIV.2403.13563}, eprinttype = {arXiv}, eprint = {2403.13563}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-13563.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NguyenOA22, author = {Thanh Nguyen and Meni Orenbach and Ahmad Atamli}, title = {Live system call trace reconstruction on Linux}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301398}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301398}, doi = {10.1016/J.FSIDI.2022.301398}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NguyenOA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AngeliAK22, author = {Vaia{-}Maria Angeli and Ahmad Atamli and Erisa Karafili}, title = {Forensic analysis of Tor in Windows environment: {A} case study}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {156:1--156:10}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3543808}, doi = {10.1145/3538969.3543808}, timestamp = {Fri, 19 Aug 2022 09:45:12 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/AngeliAK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AtamliPC19, author = {Ahmad Atamli and Giuseppe Petracca and Jon Crowcroft}, title = {IO-Trust: An out-of-band trusted memory acquisition for intrusion detection and Forensics investigations in cloud {IOMMU} based systems}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {45:1--45:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340511}, doi = {10.1145/3339252.3340511}, timestamp = {Sun, 11 Aug 2019 18:58:56 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/AtamliPC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PetraccaSAMGJ19, author = {Giuseppe Petracca and Yuqiong Sun and Ahmad Atamli{-}Reineh and Patrick D. McDaniel and Jens Grossklags and Trent Jaeger}, editor = {Nadia Heninger and Patrick Traynor}, title = {EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {567--584}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/petracca}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/PetraccaSAMGJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Atamli17, author = {Ahmad Atamli}, title = {Partitioning the trusted computing base of applications on commodity systems}, school = {University of Oxford, {UK}}, year = {2017}, url = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.757712}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Atamli17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/Atamli-ReinehPP17, author = {Ahmad Atamli{-}Reineh and Andrew Paverd and Giuseppe Petracca and Andrew P. Martin}, title = {A framework for application partitioning using trusted execution environments}, journal = {Concurr. Comput. Pract. Exp.}, volume = {29}, number = {23}, year = {2017}, url = {https://doi.org/10.1002/cpe.4130}, doi = {10.1002/CPE.4130}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/Atamli-ReinehPP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/BalisaneBAM17, author = {Ranjbar A. Balisane and Ravishankar Borgaonkar and Ahmad Atamli{-}Reineh and Andrew Martin}, title = {Architectures for Enhancing Authentication Privacy and Security using Trusted Computing}, booktitle = {Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX@SOSP 2017, Shanghai, China, October 28, 2017}, pages = {10:1--10:7}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3152701.3152713}, doi = {10.1145/3152701.3152713}, timestamp = {Sun, 18 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sosp/BalisaneBAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PetraccaASGJ17, author = {Giuseppe Petracca and Ahmad Atamli{-}Reineh and Yuqiong Sun and Jens Grossklags and Trent Jaeger}, editor = {Engin Kirda and Thomas Ristenpart}, title = {AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {379--396}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/petracca}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/PetraccaASGJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Atamli-ReinehM17, author = {Ahmad Atamli{-}Reineh and Andrew P. Martin}, title = {Securing Application with Software Partitioning: {A} case study using {SGX}}, journal = {CoRR}, volume = {abs/1706.03006}, year = {2017}, url = {http://arxiv.org/abs/1706.03006}, eprinttype = {arXiv}, eprint = {1706.03006}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Atamli-ReinehM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/NurseAM16, author = {Jason R. C. Nurse and Ahmad Atamli and Andrew P. Martin}, editor = {Theo Tryfonas}, title = {Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home}, booktitle = {Human Aspects of Information Security, Privacy, and Trust - 4th International Conference, {HAS} 2016, Held as Part of {HCI} International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9750}, pages = {255--267}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39381-0\_23}, doi = {10.1007/978-3-319-39381-0\_23}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/hci/NurseAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/Atamli-ReinehBB16, author = {Ahmad Atamli{-}Reineh and Ravishankar Borgaonkar and Ranjbar A. Balisane and Giuseppe Petracca and Andrew P. Martin}, title = {Analysis of Trusted Execution Environment usage in Samsung {KNOX}}, booktitle = {Proceedings of the 1st Workshop on System Software for Trusted Execution, SysTEX@Middleware 2016, Trento, Italy, December 12, 2016}, pages = {7:1--7:6}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3007788.3007795}, doi = {10.1145/3007788.3007795}, timestamp = {Tue, 06 Nov 2018 16:57:13 +0100}, biburl = {https://dblp.org/rec/conf/middleware/Atamli-ReinehBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PetraccaSAJ16, author = {Giuseppe Petracca and Yuqiong Sun and Ahmad Atamli and Trent Jaeger}, title = {AuDroid: Preventing Attacks on Audio Channels in Mobile Devices}, journal = {CoRR}, volume = {abs/1604.00320}, year = {2016}, url = {http://arxiv.org/abs/1604.00320}, eprinttype = {arXiv}, eprint = {1604.00320}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PetraccaSAJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PetraccaASGJ16, author = {Giuseppe Petracca and Ahmad Atamli and Yuqiong Sun and Jens Grossklags and Trent Jaeger}, title = {Aware: Controlling App Access to {I/O} Devices on Mobile Platforms}, journal = {CoRR}, volume = {abs/1604.02171}, year = {2016}, url = {http://arxiv.org/abs/1604.02171}, eprinttype = {arXiv}, eprint = {1604.02171}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PetraccaASGJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Atamli-ReinehPM16, author = {Ahmad Atamli{-}Reineh and Andrew J. Paverd and Andrew P. Martin}, title = {Trustworthy and Secure Service-Oriented Architecture for the Internet of Things}, journal = {CoRR}, volume = {abs/1606.01671}, year = {2016}, url = {http://arxiv.org/abs/1606.01671}, eprinttype = {arXiv}, eprint = {1606.01671}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Atamli-ReinehPM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Atamli-ReinehPU16, author = {Ahmad Atamli{-}Reineh and Giuseppe Petracca and Janne Uusilehto and Andrew P. Martin}, title = {Enabling Secure and Usable Mobile Application: Revealing the Nuts and Bolts of software {TPM} in todays Mobile Devices}, journal = {CoRR}, volume = {abs/1606.02995}, year = {2016}, url = {http://arxiv.org/abs/1606.02995}, eprinttype = {arXiv}, eprint = {1606.02995}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Atamli-ReinehPU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PetraccaSJA15, author = {Giuseppe Petracca and Yuqiong Sun and Trent Jaeger and Ahmad Atamli}, title = {AuDroid: Preventing Attacks on Audio Channels in Mobile Devices}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {181--190}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818005}, doi = {10.1145/2818000.2818005}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PetraccaSJA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/Atamli-ReinehM15, author = {Ahmad Atamli{-}Reineh and Andrew P. Martin}, editor = {Bhavani Thuraisingham and XiaoFeng Wang and Vinod Yegneswaran}, title = {Securing Application with Software Partitioning: {A} Case Study Using {SGX}}, booktitle = {Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {164}, pages = {605--621}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28865-9\_40}, doi = {10.1007/978-3-319-28865-9\_40}, timestamp = {Wed, 29 Jun 2022 15:37:43 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/Atamli-ReinehM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/siot/AtamliM14, author = {Ahmad Atamli and Andrew P. Martin}, editor = {Gabriel Ghinita and Razvan Rughinis and Ahmad{-}Reza Sadeghi}, title = {Threat-Based Security Analysis for the Internet of Things}, booktitle = {2014 International Workshop on Secure Internet of Things, SIoT 2014, Wroclaw, Poland, September 10, 2014}, pages = {35--43}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SIoT.2014.10}, doi = {10.1109/SIOT.2014.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/siot/AtamliM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.