Architectural Support for Securing Systems Against Software Vulnerabilities

Khaled Nofan Khasawneh
University of California, Riverside

2019
Imitating Functional Operations for Mitigating Side-Channel Leakage

Setareh Rafatirad , Houman Homayoun , Khaled Khasawneh , Sai Manoj Pudukotai Dinakarrao
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 1 -1

1
2021
Energy-Efficient and Adversarially Robust Machine Learning with Selective Dynamic Band Filtering

Neha Nagarkar , Khaled Khasawneh , Setareh Rafatirad , Avesta Sasan
195 -200

1
2021
Ensemble Learning with an Architectural Sub-semantic Engine for Malware Detection

Khaled Khasawneh ,
State University of New York at Binghamton

1
2014
Defensive approximation: Enhancing cnns security through approximate computing

Amira Guesmi , Ihsen Alouani , Khaled Khasawneh , Mouna Baklouti
arXiv preprint arXiv:2006.07700

4
2020
Defensive Approximation: Securing CNNs using Approximate Computing Extended Abstract

Amira Guesmi , Ihsen Alouani , Khaled Khasawneh , Mouna Baklouti

Spectre Returns! Speculation Attacks using the Return Stack Buffer

Esmaeil Mohammadian Koruyeh , Khaled Khasawneh , Chengyu Song , Nael Abu-Ghazaleh
arXiv e-prints arXiv: 1807.07940 -arXiv: 1807.07940

2018
Repttack: Exploiting cloud schedulers to guide co-location attacks

Chongzhou Fang , Han Wang , Najmeh Nazari , Behnam Omidi
arXiv preprint arXiv:2110.00846

14
2021
Cloak & co-locate: Adversarial railroading of resource sharing-based attacks on the cloud

Hosein Mohammadi Makrani , Hossein Sayadi , Najmeh Nazari , Khaled N Khasawneh
2021 International Symposium on Secure and Private Execution Environment Design (SEED) 1 -13

14
2021
Adversarial Attacks against Machine Learning-based Resource Provisioning Systems

Najmeh Nazari , Hosein Mohammadi Makrani , Chongzhou Fang , Behnam Omidi
IEEE Micro

4
2023
Heteroscore: Evaluating and mitigating cloud security threats brought by heterogeneity

Chongzhou Fang , Najmeh Nazari , Behnam Omidi , Han Wang
The Network and Distributed System Security Symposium (NDSS)

3
2023
EnsembleHMD: Accurate hardware malware detectors with specialized ensemble classifiers

Khaled N Khasawneh , Meltem Ozsoy , Caleb Donovick , Nael Abu-Ghazaleh
IEEE Transactions on Dependable and Secure Computing 17 ( 3) 620 -633

50
2018
Room: Adversarial machine learning attacks under real-time constraints

Amira Guesmi , Khaled N Khasawneh , Nael Abu-Ghazaleh , Ihsen Alouani
2022 International Joint Conference on Neural Networks (IJCNN) 1 -10

12
2022
Defending with errors: Approximate computing for robustness of deep neural networks

Amira Guesmi , Ihsen Alouani , Khaled N Khasawneh , Mouna Baklouti
arXiv preprint arXiv:2211.01182

1
2022
Spectre Returns! Speculation Attacks using the Return Stack Buffer

Esmaeil Mohammadian Koruyeh , Khaled N Khasawneh , Chengyu Song , Nael Abu-Ghazaleh
IEEE Design & Test

2024
SafeSpec

Khaled N Khasawneh , Esmaeil Mohammadian Koruyeh , Chengyu Song , Dmitry Evtyushkin
Proceedings of the 56th Annual Design Automation Conference 2019

2019
Characterization of AES Implementations on Microprocessor-based IoT Devices

Sunanda Roy , Angelos Stavrou , Brian L Mark , Kai Zeng
2022 IEEE Wireless Communications and Networking Conference (WCNC) 55 -60

2
2022
Lower Voltage for Higher Security: Using Voltage Overscaling to Secure Deep Neural Networks

Shohidul Islam , Ihsen Alouani , Khaled N Khasawneh
2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD) 1 -9

8
2021