Follow
Hamed Nemati
Title
Cited by
Cited by
Year
Cache storage channels: Alias-driven attacks and verified countermeasures
R Guanciale, H Nemati, C Baumann, M Dam
2016 IEEE Symposium on Security and Privacy (SP), 38-55, 2016
1132016
Formal verification of information flow security for a simple ARM-based separation kernel
M Dam, R Guanciale, N Khakpour, H Nemati, O Schwarz
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1132013
Osiris: Automated discovery of microarchitectural side channels
D Weber, A Ibrahim, H Nemati, M Schwarz, C Rossow
30th USENIX Security Symposium (USENIX Security 21), 1415-1432, 2021
472021
Machine code verification of a tiny ARM hypervisor
M Dam, R Guanciale, H Nemati
Proceedings of the 3rd international workshop on Trustworthy embedded …, 2013
392013
Axiomatic hardware-software contracts for security
N Mosier, H Lachnitt, H Nemati, C Trippel
Proceedings of the 49th Annual International Symposium on Computer …, 2022
292022
Trustworthy virtualization of the ARMv7 memory subsystem
H Nemati, R Guanciale, M Dam
SOFSEM 2015: Theory and Practice of Computer Science: 41st International …, 2015
242015
Validation of abstract side-channel models for computer architectures
H Nemati, P Buiras, A Lindner, R Guanciale, S Jacobs
Computer Aided Verification: 32nd International Conference, CAV 2020, Los …, 2020
222020
Provably secure memory isolation for Linux on ARM
R Guanciale, H Nemati, M Dam, C Baumann
Journal of Computer Security 24 (6), 793-837, 2016
222016
Validation of side-channel models via observation refinement
P Buiras, H Nemati, A Lindner, R Guanciale
MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture …, 2021
202021
Confllvm: A compiler for enforcing data confidentiality in low-level code
A Brahmakshatriya, P Kedia, DP McKee, D Garg, A Lal, A Rastogi, ...
Proceedings of the Fourteenth EuroSys Conference 2019, 1-15, 2019
162019
Trustworthy prevention of code injection in linux on embedded devices
H Chfouka, H Nemati, R Guanciale, M Dam, P Ekdahl
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
152015
Tcvisor: A hypervisor level secure storage
M Rezaei, NS Moosavi, H Nemati, R Azmi
2010 International Conference for Internet Technology and Secured …, 2010
122010
On compositional information flow aware refinement
C Baumann, M Dam, R Guanciale, H Nemati
2021 IEEE 34th Computer Security Foundations Symposium (CSF), 1-16, 2021
102021
Input algebras
R Gopinath, H Nemati, A Zeller
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
102021
Speculative leakage in ARM cortex-a53
H Nemati, R Guanciale, P Buiras, A Lindner
arXiv preprint arXiv:2007.06865, 2020
82020
Microarchitectural leakage templates and their application to cache-based side channels
A Ibrahim, H Nemati, T Schlüter, NO Tippenhauer, C Rossow
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
72022
Hypervisor-based intrusion detection using artificial immune systems
R Azmi, B Pishgoo, H Nemati
8th international Iranian ISC conference on information security and …, 2011
72011
Secure System Virtualization: End-to-End Verification of Memory Isolation
H Nemati
Royal Institute of Technology, Stockholm, Sweden, 2017
62017
Trustworthy memory isolation of Linux on embedded devices
H Nemati, M Dam, R Guanciale, V Do, A Vahidi
Trust and Trustworthy Computing: 8th International Conference, TRUST 2015 …, 2015
32015
Host based anomaly detection using a combination of artificial immune systems and hypervisor technology
R Azmi, B Pishgoo, H Nemati
Elsevier Procedia Computer Science, in press-a, 2012
32012
The system can't perform the operation now. Try again later.
Articles 1–20