Automated Synthesis of Optimized Circuits for Secure Computation D Demmler, G Dessouky, F Koushanfar, AR Sadeghi, T Schneider, ... Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 67 | 2015 |
LO-FAT: Low-overhead Control Flow Attestation in Hardware G Dessouky, S Zeitouni, T Nyman, A Paverd, L Davi, P Koeberl, N Asokan, ... Proceedings of the 54th Annual Design Automation Conference 2017, 24, 2017 | 58 | 2017 |
Atrium: Runtime Attestation Resilient under Memory Attacks S Zeitouni, G Dessouky, O Arias, D Sullivan, A Ibrahim, Y Jin, AR Sadeghi Proceedings of the 36th International Conference on Computer-Aided Design …, 2017 | 44 | 2017 |
Pushing the Communication Barrier in Secure Computation using Lookup Tables G Dessouky, F Koushanfar, AR Sadeghi, T Schneider, S Zeitouni, ... NDSS, 2017 | 34 | 2017 |
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution G Dessouky, T Abera, A Ibrahim, AR Sadeghi 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 2018 | 33 | 2018 |
GarbledCPU: a MIPS Processor for Secure Computation in Hardware EM Songhori, T Schneider, S Zeitouni, AR Sadeghi, G Dessouky, ... 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2016 | 21 | 2016 |
Hardscope: Thwarting DOP with hardware-assisted run-time scope enforcement T Nyman, G Dessouky, S Zeitouni, A Lehikoinen, A Paverd, N Asokan, ... arXiv preprint arXiv:1705.10295, 2017 | 17 | 2017 |
Adaptive Dynamic On-chip Memory Management for FPGA-based Reconfigurable Architectures G Dessouky, MJ Klaiber, DG Bailey, S Simon Field Programmable Logic and Applications (FPL), 2014 24th International …, 2014 | 17 | 2014 |
Towards Systematic Design of Collective Remote Attestation Protocols IDO Nunes, G Dessouky, A Ibrahim, N Rattanavipanon, AR Sadeghi, ... Proceedings of the 39th IEEE International Conference on Distributed …, 2019 | 15 | 2019 |
HardFails: Insights into Software-Exploitable Hardware Bugs G Dessouky, D Gens, P Haney, G Persyn, A Kanuparthi, H Khattri, ... 28th {USENIX} Security Symposium ({USENIX} Security 19), 213-230, 2019 | 14 | 2019 |
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments ARS Ghada Dessouky, Tommaso Frassetto 29th USENIX Security Symposium (USENIX Security'20), 2020 | 11 | 2020 |
HardScope: Hardening embedded systems against data-oriented attacks T Nyman, G Dessouky, S Zeitouni, A Lehikoinen, A Paverd, N Asokan, ... 2019 56th ACM/IEEE Design Automation Conference (DAC), 1-6, 2019 | 4 | 2019 |
When a patch is not enough-hardfails: Software-exploitable hardware bugs G Dessouky, D Gens, P Haney, G Persyn, A Kanuparthi, H Khattri, ... arXiv preprint arXiv:1812.00197, 2018 | 4 | 2018 |
CURE: A Security Architecture with CUstomizable and Resilient Enclaves R Bahmani, F Brasser, G Dessouky, P Jauernig, M Klimmek, AR Sadeghi, ... arXiv preprint arXiv:2010.15866, 2020 | 2 | 2020 |
Poster: Exploiting dynamic partial reconfiguration for improved resistance against power analysis attacks on FPGAs G Dessouky, AR Sadeghi Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016 | 2 | 2016 |
SAFE: A Secure and Efficient Long-Term Distributed Storage System J Buchmann, G Dessouky, T Frassetto, Á Kiss, AR Sadeghi, T Schneider, ... Proceedings of the 8th International Workshop on Security in Blockchain and …, 2020 | | 2020 |
SoK: On the Security Challenges and Risks of Multi-Tenant FPGAs in the Cloud S Zeitouni, G Dessouky, AR Sadeghi arXiv preprint arXiv:2009.13914, 2020 | | 2020 |
AI Utopia or Dystopia-On Securing AI Platforms G Dessouky, P Jauernig, N Mentens, AR Sadeghi, E Stapf 2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020 | | 2020 |
With Great Complexity Comes Great Vulnerability: Challenges of Secure Processor Design G Dessouky, T Frassetto, P Jauernig, AR Sadeghi IEEE Security & Privacy, 2020 | | 2020 |
With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security G Dessouky, T Frassetto, P Jauernig, AR Sadeghi, E Stapf IEEE Security & Privacy 18 (5), 57-66, 2020 | | 2020 |