A Lightweight Framework for Fine-Grained Lifecycle Control of Android Applications

Yuru Shao , Ruowen Wang , Xun Chen , Ahemd M. Azab
european conference on computer systems 31

2
2019
New system security mechanisms for the cloud computing infrastructure

Ahmed Moneed Azab
North Carolina State University

2
2012
Passive monitoring of virtual systems using agent-less, offline indexing

Glenn S Ammons , Ahmed M Azab , Vasanth Bala , Sastry S Duri

11
2013
Hypersentry: enabling stealthy in-context measurement of hypervisor integrity

Ahmed M Azab , Peng Ning , Zhi Wang , Xuxian Jiang
38 -49

412
2010
2019
KALD: Detecting direct pointer disclosure vulnerabilities

Brian Belleville , Wenbo Shen , Stijn Volckaert , Ahmed M Azab
IEEE Transactions on Dependable and Secure Computing 18 ( 3) 1369 -1377

5
2019
System and method for frame buffer

Ivan Getta , Sudhi Herle , Ahmed M Azab , Rohan Bhutkar

2020
PeX: A Permission Check Analysis Framework for Linux Kernel.

Changhee Jung , Dongyoon Lee , Ahmed M. Azab , Wenbo Shen
usenix security symposium 1205 -1220

9
2019
PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks

Quan Chen , Ahmed M. Azab , Guruprasad Ganesh , Peng Ning
computer and communications security 167 -178

6
2017
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android

Yueqiang Cheng , Ruowen Wang , Ahmed M. Azab , William Enck
computer and communications security 612 -624

32
2017
Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World

Ahmed M. Azab , Peng Ning , Jitesh Shah , Quan Chen
computer and communications security 90 -102

183
2014
HIMA: A Hypervisor-Based Integrity Measurement Agent

Ahmed M. Azab , Peng Ning , Emre C. Sezer , Xiaolan Zhang
annual computer security applications conference 461 -470

91
2009
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence

Chongkyung Kil , Emre C. Sezer , Ahmed M. Azab , Peng Ning
dependable systems and networks 115 -124

115
2009
NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64

Yaohui Chen , Dongli Zhang , Ruowen Wang , Rui Qiao
2017 IEEE Symposium on Security and Privacy (SP) 304 -319

18
2017
DACSA: a decoupled architecture for cloud security analysis

Jason Gionta , Peng Ning , William Enck , Ahmed Azab
CSET'14 Proceedings of the 7th USENIX conference on Cyber Security Experimentation and Test 6 -6

4
2014
SKEE: A lightweight Secure Kernel-level Execution Environment for ARM.

Ahmed Azab , Kirk Swidowski , Rohan Bhutkar , Jia Ma
network and distributed system security symposium

37
2016
SEER: practical memory virus scanning as a service

Jason Gionta , Ahmed Azab , William Enck , Peng Ning
annual computer security applications conference 186 -195

8
2014
Methods and apparatus for protecting operating system data

Quan Chen , Ahmed Azab , Peng Ning , Guruprasad Ganesh

42
2017