Follow
Ghada Dessouky
Title
Cited by
Cited by
Year
LO-FAT: Low-overhead Control Flow Attestation in Hardware
G Dessouky, S Zeitouni, T Nyman, A Paverd, L Davi, P Koeberl, N Asokan, ...
Proceedings of the 54th Annual Design Automation Conference 2017, 24, 2017
1452017
Atrium: Runtime Attestation Resilient under Memory Attacks
S Zeitouni, G Dessouky, O Arias, D Sullivan, A Ibrahim, Y Jin, AR Sadeghi
Proceedings of the 36th International Conference on Computer-Aided Design …, 2017
1152017
HardFails: Insights into Software-Exploitable Hardware Bugs
G Dessouky, D Gens, P Haney, G Persyn, A Kanuparthi, H Khattri, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 213-230, 2019
1142019
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
ARS Ghada Dessouky, Tommaso Frassetto
29th USENIX Security Symposium (USENIX Security'20), 2020
1092020
{CURE}: A security architecture with {CUstomizable} and resilient enclaves
R Bahmani, F Brasser, G Dessouky, P Jauernig, M Klimmek, AR Sadeghi, ...
30th USENIX Security Symposium (USENIX Security 21), 1073-1090, 2021
1082021
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution
G Dessouky, T Abera, A Ibrahim, AR Sadeghi
2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 2018
1032018
Automated Synthesis of Optimized Circuits for Secure Computation
D Demmler, G Dessouky, F Koushanfar, AR Sadeghi, T Schneider, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
992015
Pushing the Communication Barrier in Secure Computation using Lookup Tables
G Dessouky, F Koushanfar, AR Sadeghi, T Schneider, S Zeitouni, ...
NDSS, 2017
752017
GarbledCPU: a MIPS Processor for Secure Computation in Hardware
EM Songhori, T Schneider, S Zeitouni, AR Sadeghi, G Dessouky, ...
2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2016
392016
Towards Systematic Design of Collective Remote Attestation Protocols
IDO Nunes, G Dessouky, A Ibrahim, N Rattanavipanon, AR Sadeghi, ...
Proceedings of the 39th IEEE International Conference on Distributed …, 2019
272019
Hardscope: Thwarting DOP with hardware-assisted run-time scope enforcement
T Nyman, G Dessouky, S Zeitouni, A Lehikoinen, A Paverd, N Asokan, ...
arXiv preprint arXiv:1705.10295, 2017
252017
Adaptive Dynamic On-chip Memory Management for FPGA-based Reconfigurable Architectures
G Dessouky, MJ Klaiber, DG Bailey, S Simon
Field Programmable Logic and Applications (FPL), 2014 24th International …, 2014
242014
SoK: Secure FPGA multi-tenancy in the cloud: Challenges and opportunities
G Dessouky, AR Sadeghi, S Zeitouni
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 487-506, 2021
222021
Chunked-cache: On-demand and scalable cache isolation for security architectures
G Dessouky, A Gruler, P Mahmoody, AR Sadeghi, E Stapf
arXiv preprint arXiv:2110.08139, 2021
192021
HardScope: Hardening embedded systems against data-oriented attacks
T Nyman, G Dessouky, S Zeitouni, A Lehikoinen, A Paverd, N Asokan, ...
Proceedings of the 56th Annual Design Automation Conference 2019, 1-6, 2019
182019
Litehax: lightweight hardware-assisted attestation of program execution. In 2018 IEEE
G Dessouky, T Abera, A Ibrahim, AR Sadeghi
ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 0
12
SoK: On the security challenges and risks of multi-tenant FPGAs in the cloud
S Zeitouni, G Dessouky, AR Sadeghi
arXiv preprint arXiv:2009.13914, 2020
82020
Enclave computing on RISC-V: A brighter future for security?
G Dessouky, AR Sadeghi, E Stapf
Workshop on Secure RISC-V Architecture Design (SECRISC-V’20), 2020
62020
With great complexity comes great vulnerability: from stand-alone fixes to reconfigurable security
G Dessouky, T Frassetto, P Jauernig, AR Sadeghi, E Stapf
IEEE Security & Privacy 18 (5), 57-66, 2020
52020
When a patch is not enough-hardfails: Software-exploitable hardware bugs
G Dessouky, D Gens, P Haney, G Persyn, A Kanuparthi, H Khattri, ...
arXiv preprint arXiv:1812.00197, 2018
52018
The system can't perform the operation now. Try again later.
Articles 1–20