Ghada Dessouky
Cited by
Cited by
LO-FAT: Low-overhead Control Flow Attestation in Hardware
G Dessouky, S Zeitouni, T Nyman, A Paverd, L Davi, P Koeberl, N Asokan, ...
Proceedings of the 54th Annual Design Automation Conference 2017, 24, 2017
Atrium: Runtime Attestation Resilient under Memory Attacks
S Zeitouni, G Dessouky, O Arias, D Sullivan, A Ibrahim, Y Jin, AR Sadeghi
Proceedings of the 36th International Conference on Computer-Aided Design …, 2017
HardFails: Insights into Software-Exploitable Hardware Bugs
G Dessouky, D Gens, P Haney, G Persyn, A Kanuparthi, H Khattri, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 213-230, 2019
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
ARS Ghada Dessouky, Tommaso Frassetto
29th USENIX Security Symposium (USENIX Security'20), 2020
{CURE}: A security architecture with {CUstomizable} and resilient enclaves
R Bahmani, F Brasser, G Dessouky, P Jauernig, M Klimmek, AR Sadeghi, ...
30th USENIX Security Symposium (USENIX Security 21), 1073-1090, 2021
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution
G Dessouky, T Abera, A Ibrahim, AR Sadeghi
2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 2018
Automated Synthesis of Optimized Circuits for Secure Computation
D Demmler, G Dessouky, F Koushanfar, AR Sadeghi, T Schneider, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Pushing the Communication Barrier in Secure Computation using Lookup Tables
G Dessouky, F Koushanfar, AR Sadeghi, T Schneider, S Zeitouni, ...
NDSS, 2017
GarbledCPU: a MIPS Processor for Secure Computation in Hardware
EM Songhori, T Schneider, S Zeitouni, AR Sadeghi, G Dessouky, ...
2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2016
Towards Systematic Design of Collective Remote Attestation Protocols
IDO Nunes, G Dessouky, A Ibrahim, N Rattanavipanon, AR Sadeghi, ...
Proceedings of the 39th IEEE International Conference on Distributed …, 2019
Hardscope: Thwarting DOP with hardware-assisted run-time scope enforcement
T Nyman, G Dessouky, S Zeitouni, A Lehikoinen, A Paverd, N Asokan, ...
arXiv preprint arXiv:1705.10295, 2017
Adaptive Dynamic On-chip Memory Management for FPGA-based Reconfigurable Architectures
G Dessouky, MJ Klaiber, DG Bailey, S Simon
Field Programmable Logic and Applications (FPL), 2014 24th International …, 2014
SoK: Secure FPGA multi-tenancy in the cloud: Challenges and opportunities
G Dessouky, AR Sadeghi, S Zeitouni
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 487-506, 2021
Chunked-cache: On-demand and scalable cache isolation for security architectures
G Dessouky, A Gruler, P Mahmoody, AR Sadeghi, E Stapf
arXiv preprint arXiv:2110.08139, 2021
HardScope: Hardening embedded systems against data-oriented attacks
T Nyman, G Dessouky, S Zeitouni, A Lehikoinen, A Paverd, N Asokan, ...
Proceedings of the 56th Annual Design Automation Conference 2019, 1-6, 2019
Litehax: lightweight hardware-assisted attestation of program execution. In 2018 IEEE
G Dessouky, T Abera, A Ibrahim, AR Sadeghi
ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 0
SoK: On the security challenges and risks of multi-tenant FPGAs in the cloud
S Zeitouni, G Dessouky, AR Sadeghi
arXiv preprint arXiv:2009.13914, 2020
Enclave computing on RISC-V: A brighter future for security?
G Dessouky, AR Sadeghi, E Stapf
Workshop on Secure RISC-V Architecture Design (SECRISC-V’20), 2020
With great complexity comes great vulnerability: from stand-alone fixes to reconfigurable security
G Dessouky, T Frassetto, P Jauernig, AR Sadeghi, E Stapf
IEEE Security & Privacy 18 (5), 57-66, 2020
When a patch is not enough-hardfails: Software-exploitable hardware bugs
G Dessouky, D Gens, P Haney, G Persyn, A Kanuparthi, H Khattri, ...
arXiv preprint arXiv:1812.00197, 2018
The system can't perform the operation now. Try again later.
Articles 1–20