Khaled N. Khasawneh
Cited by
Cited by
Spectre returns! speculation attacks using the return stack buffer
EM Koruyeh, KN Khasawneh, C Song, N Abu-Ghazaleh
12th USENIX Workshop on Offensive Technologies (WOOT 18), 2018
Safespec: Banishing the spectre of a meltdown with leakage-free speculation
KN Khasawneh, EM Koruyeh, C Song, D Evtyushkin, D Ponomarev, ...
2019 56th ACM/IEEE Design Automation Conference (DAC), 1-6, 2019
Ensemble learning for low-level hardware-supported malware detection
KN Khasawneh, M Ozsoy, C Donovick, N Abu-Ghazaleh, D Ponomarev
International Symposium on Research in Attacks, Intrusions and Defenses …, 2015
Hardware-based malware detection using low-level architectural features
M Ozsoy, KN Khasawneh, C Donovick, I Gorelik, N Abu-Ghazaleh, ...
IEEE Transactions on Computers 65 (11), 3332-3344, 2016
Speccfi: Mitigating spectre attacks using cfi informed speculation
EM Koruyeh, SHA Shirazi, KN Khasawneh, C Song, N Abu-Ghazaleh
2020 IEEE Symposium on Security and Privacy (SP), 39-53, 2020
Ric: Relaxed inclusion caches for mitigating llc side-channel attacks
M Kayaalp, KN Khasawneh, HA Esfeden, J Elwell, N Abu-Ghazaleh, ...
Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017
RHMD: Evasion-resilient hardware malware detectors
KN Khasawneh, N Abu-Ghazaleh, D Ponomarev, L Yu
Proceedings of the 50th Annual IEEE/ACM international symposium on …, 2017
Constructing and characterizing covert channels on gpgpus
H Naghibijouybari, KN Khasawneh, N Abu-Ghazaleh
Proceedings of the 50th Annual IEEE/ACM International Symposium on …, 2017
A review of in-memory computing architectures for machine learning applications
S Bavikadi, PR Sutradhar, KN Khasawneh, A Ganguly, ...
Proceedings of the 2020 on Great Lakes Symposium on VLSI, 89-94, 2020
Defensive approximation: securing cnns using approximate computing
A Guesmi, I Alouani, KN Khasawneh, M Baklouti, T Frikha, M Abid, ...
Proceedings of the 26th ACM international conference on architectural …, 2021
EnsembleHMD: Accurate hardware malware detectors with specialized ensemble classifiers
KN Khasawneh, M Ozsoy, C Donovick, N Abu-Ghazaleh, D Ponomarev
IEEE Transactions on Dependable and Secure Computing 17 (3), 620-633, 2018
Evolution of defenses against transient-execution attacks
C Canella, SM Pudukotai Dinakarrao, D Gruss, KN Khasawneh
Proceedings of the 2020 on Great Lakes Symposium on VLSI, 169-174, 2020
The evolution of transient-execution attacks
C Canella, KN Khasawneh, D Gruss
Proceedings of the 2020 on Great Lakes Symposium on VLSI, 163-168, 2020
Code-bridged classifier (cbc): A low or negative overhead defense for making a cnn classifier robust against adversarial attacks
F Behnia, A Mirzaeian, M Sabokrou, S Manoj, T Mohsenin, ...
2020 21st International Symposium on Quality Electronic Design (ISQED), 27-32, 2020
Lightweight implementation of the lowmc block cipher protected against side-channel attacks
J Bahrami, VB Dang, A Abdulgadir, KN Khasawneh, JP Kaps, K Gaj
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware …, 2020
Efficient hardware malware detectors that are resilient to adversarial evasion
MS Islam, KN Khasawneh, N Abu-Ghazaleh, D Ponomarev, L Yu
IEEE Transactions on Computers 71 (11), 2872-2887, 2021
Nd-hmds: Non-differentiable hardware malware detectors against evasive transient execution attacks
MS Islam, AP Kuruvila, K Basu, KN Khasawneh
2020 IEEE 38th International Conference on Computer Design (ICCD), 537-544, 2020
Cloak & co-locate: Adversarial railroading of resource sharing-based attacks on the cloud
HM Makrani, H Sayadi, N Nazari, KN Khasawneh, A Sasan, S Rafatirad, ...
2021 International Symposium on Secure and Private Execution Environment …, 2021
Repttack: Exploiting cloud schedulers to guide co-location attacks
C Fang, H Wang, N Nazari, B Omidi, A Sasan, KN Khasawneh, ...
arXiv preprint arXiv:2110.00846, 2021
Imitating functional operations for mitigating side-channel leakage
A Dhavlle, S Rafatirad, K Khasawneh, H Homayoun, SMP Dinakarrao
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2021
The system can't perform the operation now. Try again later.
Articles 1–20