Follow
Ayaz Akram
Title
Cited by
Cited by
Year
The gem5 simulator: Version 20.0+
J Lowe-Power, AM Ahmad, A Akram, M Alian, R Amslinger, M Andreozzi, ...
arXiv preprint arXiv:2007.03152, 2020
3212020
A Survey of Computer Architecture Simulation Techniques and Tools
A Akram, L Sawalha
IEEE Access, 2019
1212019
Nights-watch: A cache-based side-channel intrusion detector using hardware performance counters
M Mushtaq, A Akram, MK Bhatti, M Chaudhry, V Lapotre, G Gogniat
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
1062018
WHISPER A Tool for Run-time Detection of Side-Channel Attacks
M Mushtaq, J Bricq, MK Bhatti, A Akram, V Lapotre, G Gogniat, P Benoit
IEEE Access, 2020
792020
Run-time detection of prime+ probe side-channel attack on AES encryption algorithm
M Mushtaq, A Akram, MK Bhatti, RNB Rais, V Lapotre, G Gogniat
2018 Global Information Infrastructure and Networking Symposium (GIIS), 1-5, 2018
532018
× 86 computer architecture simulators: A comparative study
A Akram, L Sawalha
2016 IEEE 34th International Conference on Computer Design (ICCD), 638-645, 2016
392016
Machine learning for security: The case of side-channel attack detection at run-time
M Mushtaq, A Akram, MK Bhatti, M Chaudhry, M Yousaf, U Farooq, ...
2018 25th IEEE International Conference on Electronics, Circuits and Systems …, 2018
382018
Performance analysis of scientific computing workloads on general purpose TEEs
A Akram, A Giannakou, V Akella, J Lowe-Power, S Peisert
2021 IEEE International Parallel and Distributed Processing Symposium (IPDPS …, 2021
352021
A comparison of x86 computer architecture simulators
A Akram, L Sawalha
302016
Meet the Sherlock Holmes’ of side channel leakage: A survey of cache SCA detection techniques
A Akram, M Mushtaq, MK Bhatti, V Lapotre, G Gogniat
IEEE Access 8, 70836-70860, 2020
272020
Enabling reproducible and agile full-system simulation
BR Bruce, A Akam, H Nguyen, K Roarty, M Samani, M Fariborz, T Reddy, ...
2021 IEEE International Symposium on Performance Analysis of Systems and …, 2021
202021
Molecular Epidemiology and Prevalence of Theileria lestoquardi and Theileria ovis Infection in Goats Infested With Tick Vectors From Multan, Pakistan
M Riaz, MM Nazir, Z Tasawar, AN Ahmed, MM Ayaz, Q Akram, ...
Journal of medical entomology 56 (3), 844-848, 2019
202019
Validation of the gem5 Simulator for x86 Architectures
A Akram, L Sawalha
2019 IEEE/ACM Performance Modeling, Benchmarking and Simulation of High …, 2019
172019
The gem5 simulator: Version 20.0+. CoRR abs/2007.03152 (2020)
J Lowe-Power, AM Ahmad, A Akram, M Alian, R Amslinger, M Andreozzi, ...
arXiv preprint arXiv:2007.03152, 2020
142020
Comparison of edge detectors
A Akram, A Ismail
Int. J. Comp. Sci. Information Technol. Res 1, 16-24, 2013
142013
Android Based ECG Monitoring System
A Akram, R Javed, A Ahmad
International Journal of Science and Research (IJSR), 2013
132013
Performance analysis of scientific computing workloads on trusted execution environments
A Akram, A Giannakou, V Akella, J Lowe-Power, S Peisert
arXiv preprint arXiv:2010.13216, 2020
122020
Cache-based side-channel intrusion detection using hardware performance counters
M Mushtaq, A Akram, MK Bhatti, V Lapotre, G Gogniat
CryptArchi 2018-16th International Workshops on Cryptographic architectures …, 2018
122018
Enabling design space exploration for risc-v secure compute environments
A Akram, V Akella, S Peisert, J Lowe-Power
102021
Sherlock Holmes of Cache Side-Channel Attacks in Intel's x86 Architecture
M Mushtaq, A Akram, MK Bhatti, U Ali, V Lapotre, G Gogniat
IEEE Conference on Communications and Network Security, 2019
102019
The system can't perform the operation now. Try again later.
Articles 1–20