BibTeX records: Ahmad Atamli-Reineh

download as .bib file

@article{DBLP:journals/corr/abs-2403-07465,
  author       = {Marco Chilese and
                  Richard Mitev and
                  Meni Orenbach and
                  Robert Thorburn and
                  Ahmad Atamli and
                  Ahmad{-}Reza Sadeghi},
  title        = {One for All and All for One: GNN-based Control-Flow Attestation for
                  Embedded Devices},
  journal      = {CoRR},
  volume       = {abs/2403.07465},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.07465},
  doi          = {10.48550/ARXIV.2403.07465},
  eprinttype    = {arXiv},
  eprint       = {2403.07465},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-07465.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-13563,
  author       = {Haoyu Wang and
                  Basel Halak and
                  Jianjie Ren and
                  Ahmad Atamli},
  title        = {DL2Fence: Integrating Deep Learning and Frame Fusion for Enhanced
                  Detection and Localization of Refined Denial-of-Service in Large-Scale
                  NoCs},
  journal      = {CoRR},
  volume       = {abs/2403.13563},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.13563},
  doi          = {10.48550/ARXIV.2403.13563},
  eprinttype    = {arXiv},
  eprint       = {2403.13563},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-13563.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NguyenOA22,
  author       = {Thanh Nguyen and
                  Meni Orenbach and
                  Ahmad Atamli},
  title        = {Live system call trace reconstruction on Linux},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301398},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301398},
  doi          = {10.1016/J.FSIDI.2022.301398},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NguyenOA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AngeliAK22,
  author       = {Vaia{-}Maria Angeli and
                  Ahmad Atamli and
                  Erisa Karafili},
  title        = {Forensic analysis of Tor in Windows environment: {A} case study},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {156:1--156:10},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3543808},
  doi          = {10.1145/3538969.3543808},
  timestamp    = {Fri, 19 Aug 2022 09:45:12 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AngeliAK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AtamliPC19,
  author       = {Ahmad Atamli and
                  Giuseppe Petracca and
                  Jon Crowcroft},
  title        = {IO-Trust: An out-of-band trusted memory acquisition for intrusion
                  detection and Forensics investigations in cloud {IOMMU} based systems},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {45:1--45:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340511},
  doi          = {10.1145/3339252.3340511},
  timestamp    = {Sun, 11 Aug 2019 18:58:56 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AtamliPC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PetraccaSAMGJ19,
  author       = {Giuseppe Petracca and
                  Yuqiong Sun and
                  Ahmad Atamli{-}Reineh and
                  Patrick D. McDaniel and
                  Jens Grossklags and
                  Trent Jaeger},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation
                  Graphs},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {567--584},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/petracca},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/PetraccaSAMGJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Atamli17,
  author       = {Ahmad Atamli},
  title        = {Partitioning the trusted computing base of applications on commodity
                  systems},
  school       = {University of Oxford, {UK}},
  year         = {2017},
  url          = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.757712},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Atamli17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/Atamli-ReinehPP17,
  author       = {Ahmad Atamli{-}Reineh and
                  Andrew Paverd and
                  Giuseppe Petracca and
                  Andrew P. Martin},
  title        = {A framework for application partitioning using trusted execution environments},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {29},
  number       = {23},
  year         = {2017},
  url          = {https://doi.org/10.1002/cpe.4130},
  doi          = {10.1002/CPE.4130},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/Atamli-ReinehPP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/BalisaneBAM17,
  author       = {Ranjbar A. Balisane and
                  Ravishankar Borgaonkar and
                  Ahmad Atamli{-}Reineh and
                  Andrew Martin},
  title        = {Architectures for Enhancing Authentication Privacy and Security using
                  Trusted Computing},
  booktitle    = {Proceedings of the 2nd Workshop on System Software for Trusted Execution,
                  SysTEX@SOSP 2017, Shanghai, China, October 28, 2017},
  pages        = {10:1--10:7},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3152701.3152713},
  doi          = {10.1145/3152701.3152713},
  timestamp    = {Sun, 18 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/BalisaneBAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PetraccaASGJ17,
  author       = {Giuseppe Petracca and
                  Ahmad Atamli{-}Reineh and
                  Yuqiong Sun and
                  Jens Grossklags and
                  Trent Jaeger},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation
                  Bindings},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {379--396},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/petracca},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/PetraccaASGJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Atamli-ReinehM17,
  author       = {Ahmad Atamli{-}Reineh and
                  Andrew P. Martin},
  title        = {Securing Application with Software Partitioning: {A} case study using
                  {SGX}},
  journal      = {CoRR},
  volume       = {abs/1706.03006},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.03006},
  eprinttype    = {arXiv},
  eprint       = {1706.03006},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Atamli-ReinehM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/NurseAM16,
  author       = {Jason R. C. Nurse and
                  Ahmad Atamli and
                  Andrew P. Martin},
  editor       = {Theo Tryfonas},
  title        = {Towards a Usable Framework for Modelling Security and Privacy Risks
                  in the Smart Home},
  booktitle    = {Human Aspects of Information Security, Privacy, and Trust - 4th International
                  Conference, {HAS} 2016, Held as Part of {HCI} International 2016,
                  Toronto, ON, Canada, July 17-22, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9750},
  pages        = {255--267},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39381-0\_23},
  doi          = {10.1007/978-3-319-39381-0\_23},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/NurseAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/Atamli-ReinehBB16,
  author       = {Ahmad Atamli{-}Reineh and
                  Ravishankar Borgaonkar and
                  Ranjbar A. Balisane and
                  Giuseppe Petracca and
                  Andrew P. Martin},
  title        = {Analysis of Trusted Execution Environment usage in Samsung {KNOX}},
  booktitle    = {Proceedings of the 1st Workshop on System Software for Trusted Execution,
                  SysTEX@Middleware 2016, Trento, Italy, December 12, 2016},
  pages        = {7:1--7:6},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3007788.3007795},
  doi          = {10.1145/3007788.3007795},
  timestamp    = {Tue, 06 Nov 2018 16:57:13 +0100},
  biburl       = {https://dblp.org/rec/conf/middleware/Atamli-ReinehBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PetraccaSAJ16,
  author       = {Giuseppe Petracca and
                  Yuqiong Sun and
                  Ahmad Atamli and
                  Trent Jaeger},
  title        = {AuDroid: Preventing Attacks on Audio Channels in Mobile Devices},
  journal      = {CoRR},
  volume       = {abs/1604.00320},
  year         = {2016},
  url          = {http://arxiv.org/abs/1604.00320},
  eprinttype    = {arXiv},
  eprint       = {1604.00320},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PetraccaSAJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PetraccaASGJ16,
  author       = {Giuseppe Petracca and
                  Ahmad Atamli and
                  Yuqiong Sun and
                  Jens Grossklags and
                  Trent Jaeger},
  title        = {Aware: Controlling App Access to {I/O} Devices on Mobile Platforms},
  journal      = {CoRR},
  volume       = {abs/1604.02171},
  year         = {2016},
  url          = {http://arxiv.org/abs/1604.02171},
  eprinttype    = {arXiv},
  eprint       = {1604.02171},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PetraccaASGJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Atamli-ReinehPM16,
  author       = {Ahmad Atamli{-}Reineh and
                  Andrew J. Paverd and
                  Andrew P. Martin},
  title        = {Trustworthy and Secure Service-Oriented Architecture for the Internet
                  of Things},
  journal      = {CoRR},
  volume       = {abs/1606.01671},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.01671},
  eprinttype    = {arXiv},
  eprint       = {1606.01671},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Atamli-ReinehPM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Atamli-ReinehPU16,
  author       = {Ahmad Atamli{-}Reineh and
                  Giuseppe Petracca and
                  Janne Uusilehto and
                  Andrew P. Martin},
  title        = {Enabling Secure and Usable Mobile Application: Revealing the Nuts
                  and Bolts of software {TPM} in todays Mobile Devices},
  journal      = {CoRR},
  volume       = {abs/1606.02995},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.02995},
  eprinttype    = {arXiv},
  eprint       = {1606.02995},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Atamli-ReinehPU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PetraccaSJA15,
  author       = {Giuseppe Petracca and
                  Yuqiong Sun and
                  Trent Jaeger and
                  Ahmad Atamli},
  title        = {AuDroid: Preventing Attacks on Audio Channels in Mobile Devices},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {181--190},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818005},
  doi          = {10.1145/2818000.2818005},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PetraccaSJA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/Atamli-ReinehM15,
  author       = {Ahmad Atamli{-}Reineh and
                  Andrew P. Martin},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Securing Application with Software Partitioning: {A} Case Study Using
                  {SGX}},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {605--621},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_40},
  doi          = {10.1007/978-3-319-28865-9\_40},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/Atamli-ReinehM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/siot/AtamliM14,
  author       = {Ahmad Atamli and
                  Andrew P. Martin},
  editor       = {Gabriel Ghinita and
                  Razvan Rughinis and
                  Ahmad{-}Reza Sadeghi},
  title        = {Threat-Based Security Analysis for the Internet of Things},
  booktitle    = {2014 International Workshop on Secure Internet of Things, SIoT 2014,
                  Wroclaw, Poland, September 10, 2014},
  pages        = {35--43},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SIoT.2014.10},
  doi          = {10.1109/SIOT.2014.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/siot/AtamliM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics