default search action
Ahmad Atamli-Reineh
Person information
- affiliation (PhD 2017): University of Oxford, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j3]Haoyu Wang, Jianjie Ren, Basel Halak, Ahmad Atamli:
GNS: Graph-Based Network-on-Chip Shield for Early Defense Against Malicious Nodes in MPSoC. IEEE J. Emerg. Sel. Topics Circuits Syst. 14(3): 483-494 (2024) - [c11]Marco Chilese, Richard Mitev, Meni Orenbach, Robert Thorburn, Ahmad Atamli, Ahmad-Reza Sadeghi:
One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices. SP 2024: 3346-3364 - [i7]Marco Chilese, Richard Mitev, Meni Orenbach, Robert Thorburn, Ahmad Atamli, Ahmad-Reza Sadeghi:
One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices. CoRR abs/2403.07465 (2024) - [i6]Haoyu Wang, Basel Halak, Jianjie Ren, Ahmad Atamli:
DL2Fence: Integrating Deep Learning and Frame Fusion for Enhanced Detection and Localization of Refined Denial-of-Service in Large-Scale NoCs. CoRR abs/2403.13563 (2024) - 2022
- [j2]Thanh Nguyen, Meni Orenbach, Ahmad Atamli:
Live system call trace reconstruction on Linux. Digit. Investig. 42(Supplement): 301398 (2022) - [c10]Vaia-Maria Angeli, Ahmad Atamli, Erisa Karafili:
Forensic analysis of Tor in Windows environment: A case study. ARES 2022: 156:1-156:10
2010 – 2019
- 2019
- [c9]Ahmad Atamli, Giuseppe Petracca, Jon Crowcroft:
IO-Trust: An out-of-band trusted memory acquisition for intrusion detection and Forensics investigations in cloud IOMMU based systems. ARES 2019: 45:1-45:6 - [c8]Giuseppe Petracca, Yuqiong Sun, Ahmad Atamli-Reineh, Patrick D. McDaniel, Jens Grossklags, Trent Jaeger:
EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs. USENIX Security Symposium 2019: 567-584 - 2017
- [b1]Ahmad Atamli:
Partitioning the trusted computing base of applications on commodity systems. University of Oxford, UK, 2017 - [j1]Ahmad Atamli-Reineh, Andrew Paverd, Giuseppe Petracca, Andrew P. Martin:
A framework for application partitioning using trusted execution environments. Concurr. Comput. Pract. Exp. 29(23) (2017) - [c7]Ranjbar A. Balisane, Ravishankar Borgaonkar, Ahmad Atamli-Reineh, Andrew Martin:
Architectures for Enhancing Authentication Privacy and Security using Trusted Computing. SysTEX@SOSP 2017: 10:1-10:7 - [c6]Giuseppe Petracca, Ahmad Atamli-Reineh, Yuqiong Sun, Jens Grossklags, Trent Jaeger:
AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings. USENIX Security Symposium 2017: 379-396 - [i5]Ahmad Atamli-Reineh, Andrew P. Martin:
Securing Application with Software Partitioning: A case study using SGX. CoRR abs/1706.03006 (2017) - 2016
- [c5]Jason R. C. Nurse, Ahmad Atamli, Andrew P. Martin:
Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home. HCI (20) 2016: 255-267 - [c4]Ahmad Atamli-Reineh, Ravishankar Borgaonkar, Ranjbar A. Balisane, Giuseppe Petracca, Andrew P. Martin:
Analysis of Trusted Execution Environment usage in Samsung KNOX. SysTEX@Middleware 2016: 7:1-7:6 - [i4]Giuseppe Petracca, Yuqiong Sun, Ahmad Atamli, Trent Jaeger:
AuDroid: Preventing Attacks on Audio Channels in Mobile Devices. CoRR abs/1604.00320 (2016) - [i3]Giuseppe Petracca, Ahmad Atamli, Yuqiong Sun, Jens Grossklags, Trent Jaeger:
Aware: Controlling App Access to I/O Devices on Mobile Platforms. CoRR abs/1604.02171 (2016) - [i2]Ahmad Atamli-Reineh, Andrew J. Paverd, Andrew P. Martin:
Trustworthy and Secure Service-Oriented Architecture for the Internet of Things. CoRR abs/1606.01671 (2016) - [i1]Ahmad Atamli-Reineh, Giuseppe Petracca, Janne Uusilehto, Andrew P. Martin:
Enabling Secure and Usable Mobile Application: Revealing the Nuts and Bolts of software TPM in todays Mobile Devices. CoRR abs/1606.02995 (2016) - 2015
- [c3]Giuseppe Petracca, Yuqiong Sun, Trent Jaeger, Ahmad Atamli:
AuDroid: Preventing Attacks on Audio Channels in Mobile Devices. ACSAC 2015: 181-190 - [c2]Ahmad Atamli-Reineh, Andrew P. Martin:
Securing Application with Software Partitioning: A Case Study Using SGX. SecureComm 2015: 605-621 - 2014
- [c1]Ahmad Atamli, Andrew P. Martin:
Threat-Based Security Analysis for the Internet of Things. SIoT 2014: 35-43
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint