USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 22 results:
Filters: Author is Ahmad-Reza Sadeghi [Clear All Filters]
ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks. 32nd USENIX Security Symposium (USENIX Security 23). :4301--4318.
.
2023. HyPFuzz: Formal-Assisted Processor Fuzzing. 32nd USENIX Security Symposium (USENIX Security 23). :1361--1378.
.
2023. Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M. 32nd USENIX Security Symposium (USENIX Security 23). :6239--6256.
.
2023. FLAME: Taming Backdoors in Federated Learning. 31st USENIX Security Symposium (USENIX Security 22). :1415--1432.
.
2022. GhostTouch: Targeted Attacks on Touchscreens without Physical Touch. 31st USENIX Security Symposium (USENIX Security 22). :1543--1559.
.
2022. TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities. 31st USENIX Security Symposium (USENIX Security 22). :3219--3236.
.
2022. V'CER: Efficient Certificate Validation in Constrained Networks. 31st USENIX Security Symposium (USENIX Security 22). :4491--4508.
.
2022. CURE: A Security Architecture with CUstomizable and Resilient Enclaves. 30th USENIX Security Symposium (USENIX Security 21). :1073--1090.
.
2021. HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments. 29th USENIX Security Symposium (USENIX Security 20). :451--468.
.
2020. V0LTpwn: Attacking x86 Processor Integrity from Software. 29th USENIX Security Symposium (USENIX Security 20). :1445--1461.
.
2020. FastKitten: Practical Smart Contracts on Bitcoin. 28th USENIX Security Symposium (USENIX Security 19). :801--818.
.
2019. HardFails: Insights into Software-Exploitable Hardware Bugs. 28th USENIX Security Symposium (USENIX Security 19). :213--230.
.
2019. PAtt: Physics-based Attestation of Control Systems. 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :165--180.
.
2019. The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX. 27th USENIX Security Symposium (USENIX Security 18). :1213--1227.
.
2018. IMIX: In-Process Memory Isolation EXtension. 27th USENIX Security Symposium (USENIX Security 18). :83--97.
.
2018. CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory. 26th USENIX Security Symposium (USENIX Security 17). :117--130.
.
2017. Software Grand Exposure: SGX Cache Attacks Are Practical. 11th USENIX Workshop on Offensive Technologies (WOOT 17).
.
2017. Subversive-C: Abusing and Protecting Dynamic Message Dispatch. 2016 USENIX Annual Technical Conference (USENIX ATC 16). :209--221.
.
2016. ASM: A Programmable Interface for Extending Android Security. 23rd USENIX Security Symposium (USENIX Security 14). :1005-1019.
.
2014. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. 23rd USENIX Security Symposium (USENIX Security 14). :401--416.
.
2014. Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies. 22nd USENIX Security Symposium (USENIX Security 13). :131--146.
.
2013. Transparent Mobile Storage Protection in Trusted Virtual Domains. 23rd Large Installation System Administration Conference (LISA 09).
.
2009.