default search action
Khaled N. Khasawneh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Esmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, Nael B. Abu-Ghazaleh:
Spectre Returns! Speculation Attacks Using the Return Stack Buffer. IEEE Des. Test 41(2): 47-55 (2024) - [c34]Najmeh Nazari, Chongzhou Fang, Hosein Mohammadi Makrani, Behnam Omidi, Mahdi Eslamimehr, Setareh Rafatirad, Avesta Sasan, Hossein Sayadi, Khaled N. Khasawneh, Houman Homayoun:
Architectural Whispers: Robust Machine Learning Models Fingerprinting via Frequency Throttling Side-Channels. DAC 2024: 179:1-179:6 - [c33]Md. Shohidul Islam, Sankha Baran Dutta, Andres Marquez, Ihsen Alouani, Khaled N. Khasawneh:
Harnessing ML Privacy by Design Through Crossbar Array Non-Idealities. DATE 2024: 1-2 - [c32]Najmeh Nazari, Behnam Omidi, Chongzhou Fang, Hosein Mohammadi Makrani, Setareh Rafatirad, Avesta Sasan, Houman Homayoun, Khaled N. Khasawneh:
SpecScope: Automating Discovery of Exploitable Spectre Gadgets on Black-Box Microarchitectures. DATE 2024: 1-6 - [c31]Sunanda Roy, Thomas Crowley, Brian L. Mark, Kai Zeng, Khaled N. Khasawneh:
Evaluating and Optimizing Cryptographic Offloading for IoT Devices: Attribute-Based Encryption Case Study. ICC Workshops 2024: 189-194 - [c30]Md. Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh:
Hardware Support for Trustworthy Machine Learning: A Survey. ISQED 2024: 1-6 - [c29]Najmeh Nazari, Hosein Mohammadi Makrani, Chongzhou Fang, Hossein Sayadi, Setareh Rafatirad, Khaled N. Khasawneh, Houman Homayoun:
Forget and Rewire: Enhancing the Resilience of Transformer-based Models against Bit-Flip Attacks. USENIX Security Symposium 2024 - [c28]Yaqi He, Kai Zeng, Long Jiao, Brian L. Mark, Khaled N. Khasawneh:
Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing. WISEC 2024: 196-206 - [i11]Behnam Omidi, Khaled N. Khasawneh, Ihsen Alouani:
Evasive Hardware Trojan through Adversarial Power Trace. CoRR abs/2401.02342 (2024) - [i10]Yaqi He, Kai Zeng, Long Jiao, Brian L. Mark, Khaled N. Khasawneh:
Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing. CoRR abs/2405.03045 (2024) - 2023
- [j6]Najmeh Nazari, Hosein Mohammadi Makrani, Chongzhou Fang, Behnam Omidi, Setareh Rafatirad, Hossein Sayadi, Khaled N. Khasawneh, Houman Homayoun:
Adversarial Attacks Against Machine Learning-Based Resource Provisioning Systems. IEEE Micro 43(5): 35-44 (2023) - [j5]Md. Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh:
SecureVolt: Enhancing Deep Neural Networks Security via Undervolting. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(12): 4922-4933 (2023) - [c27]Md. Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh:
Stochastic-HMDs: Adversarial-Resilient Hardware Malware Detectors via Undervolting. DAC 2023: 1-6 - [c26]Maryam Parsa, Khaled N. Khasawneh, Ihsen Alouani:
A Brain-inspired Approach for Malware Detection using Sub-semantic Hardware Features. ACM Great Lakes Symposium on VLSI 2023: 139-142 - [c25]Md. Shohidul Islam, Behnam Omidi, Ihsen Alouani, Khaled N. Khasawneh:
VPP: Privacy Preserving Machine Learning via Undervolting. HOST 2023: 315-325 - [c24]Chongzhou Fang, Najmeh Nazari, Behnam Omidi, Han Wang, Aditya Puri, Manish Arora, Setareh Rafatirad, Houman Homayoun, Khaled N. Khasawneh:
HeteroScore: Evaluating and Mitigating Cloud Security Threats Brought by Heterogeneity. NDSS 2023 - 2022
- [j4]Md. Shohidul Islam, Khaled N. Khasawneh, Nael B. Abu-Ghazaleh, Dmitry Ponomarev, Lei Yu:
Efficient Hardware Malware Detectors That are Resilient to Adversarial Evasion. IEEE Trans. Computers 71(11): 2872-2887 (2022) - [j3]Abhijitt Dhavlle, Setareh Rafatirad, Khaled N. Khasawneh, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao:
Imitating Functional Operations for Mitigating Side-Channel Leakage. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(4): 868-881 (2022) - [c23]Yaqi He, Kai Zeng, Brian L. Mark, Khaled N. Khasawneh:
Secure and Energy-Efficient Proximity-Based Pairing for IoT Devices. GLOBECOM (Workshops) 2022: 1359-1364 - [c22]Amira Guesmi, Khaled N. Khasawneh, Nael B. Abu-Ghazaleh, Ihsen Alouani:
ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints. IJCNN 2022: 1-10 - [c21]Chongzhou Fang, Han Wang, Najmeh Nazari, Behnam Omidi, Avesta Sasan, Khaled N. Khasawneh, Setareh Rafatirad, Houman Homayoun:
Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks. NDSS 2022 - [c20]Sunanda Roy, Angelos Stavrou, Brian L. Mark, Kai Zeng, Sai Manoj P. D., Khaled N. Khasawneh:
Characterization of AES Implementations on Microprocessor-based IoT Devices. WCNC 2022: 55-60 - [i9]Amira Guesmi, Khaled N. Khasawneh, Nael B. Abu-Ghazaleh, Ihsen Alouani:
ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints. CoRR abs/2201.01621 (2022) - [i8]Amira Guesmi, Ihsen Alouani, Khaled N. Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael B. Abu-Ghazaleh:
Defending with Errors: Approximate Computing for Robustness of Deep Neural Networks. CoRR abs/2211.01182 (2022) - 2021
- [c19]Amira Guesmi, Ihsen Alouani, Khaled N. Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael B. Abu-Ghazaleh:
Defensive approximation: securing CNNs using approximate computing. ASPLOS 2021: 990-1003 - [c18]Neha Nagarkar, Khaled N. Khasawneh, Setareh Rafatirad, Avesta Sasan, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao:
Energy-Efficient and Adversarially Robust Machine Learning with Selective Dynamic Band Filtering. ACM Great Lakes Symposium on VLSI 2021: 195-200 - [c17]Md. Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh:
Lower Voltage for Higher Security: Using Voltage Overscaling to Secure Deep Neural Networks. ICCAD 2021: 1-9 - [c16]Md. Shohidul Islam, Behnam Omidi, Khaled N. Khasawneh:
Monotonic-HMDs: Exploiting Monotonic Features to Defend Against Evasive Malware. ISQED 2021: 97-102 - [c15]Hosein Mohammadi Makrani, Hossein Sayadi, Najmeh Nazari, Khaled N. Khasawneh, Avesta Sasan, Setareh Rafatirad, Houman Homayoun:
Cloak & Co-locate: Adversarial Railroading of Resource Sharing-based Attacks on the Cloud. SEED 2021: 1-13 - [i7]Md. Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh:
Stochastic-HMDs: Adversarial Resilient Hardware Malware Detectors through Voltage Over-scaling. CoRR abs/2103.06936 (2021) - [i6]Chongzhou Fang, Han Wang, Najmeh Nazari, Behnam Omidi, Avesta Sasan, Khaled N. Khasawneh, Setareh Rafatirad, Houman Homayoun:
Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks. CoRR abs/2110.00846 (2021) - 2020
- [j2]Khaled N. Khasawneh, Meltem Ozsoy, Caleb Donovick, Nael B. Abu-Ghazaleh, Dmitry Ponomarev:
EnsembleHMD: Accurate Hardware Malware Detectors with Specialized Ensemble Classifiers. IEEE Trans. Dependable Secur. Comput. 17(3): 620-633 (2020) - [c14]Javad Bahrami, Viet Ba Dang, Abubakr Abdulgadir, Khaled N. Khasawneh, Jens-Peter Kaps, Kris Gaj:
Lightweight Implementation of the LowMC Block Cipher Protected Against Side-Channel Attacks. ASHES@CCS 2020: 45-56 - [c13]Sathwika Bavikadi, Purab Ranjan Sutradhar, Khaled N. Khasawneh, Amlan Ganguly, Sai Manoj Pudukotai Dinakarrao:
A Review of In-Memory Computing Architectures for Machine Learning Applications. ACM Great Lakes Symposium on VLSI 2020: 89-94 - [c12]Claudio Canella, Khaled N. Khasawneh, Daniel Gruss:
The Evolution of Transient-Execution Attacks. ACM Great Lakes Symposium on VLSI 2020: 163-168 - [c11]Claudio Canella, Sai Manoj Pudukotai Dinakarrao, Daniel Gruss, Khaled N. Khasawneh:
Evolution of Defenses against Transient-Execution Attacks. ACM Great Lakes Symposium on VLSI 2020: 169-174 - [c10]Md. Shohidul Islam, Abraham Peedikayil Kuruvila, Kanad Basu, Khaled N. Khasawneh:
ND-HMDs: Non-Differentiable Hardware Malware Detectors against Evasive Transient Execution Attacks. ICCD 2020: 537-544 - [c9]Farnaz Behnia, Ali Mirzaeian, Mohammad Sabokrou, Sai Manoj P. D., Tinoosh Mohsenin, Khaled N. Khasawneh, Liang Zhao, Houman Homayoun, Avesta Sasan:
Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks. ISQED 2020: 27-32 - [c8]Esmaeil Mohammadian Koruyeh, Shirin Haji Amin Shirazi, Khaled N. Khasawneh, Chengyu Song, Nael B. Abu-Ghazaleh:
SpecCFI: Mitigating Spectre Attacks using CFI Informed Speculation. SP 2020: 39-53 - [i5]Farnaz Behnia, Ali Mirzaeian, Mohammad Sabokrou, Sai Manoj P. D., Tinoosh Mohsenin, Khaled N. Khasawneh, Liang Zhao, Houman Homayoun, Avesta Sasan:
Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks. CoRR abs/2001.06099 (2020) - [i4]Amira Guesmi, Ihsen Alouani, Khaled N. Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael B. Abu-Ghazaleh:
Defensive Approximation: Enhancing CNNs Security through Approximate Computing. CoRR abs/2006.07700 (2020)
2010 – 2019
- 2019
- [b1]Khaled N. Khasawneh:
Architectural Support for Securing Systems Against Software Vulnerabilities. University of California, Riverside, USA, 2019 - [c7]Khaled N. Khasawneh, Esmaeil Mohammadian Koruyeh, Chengyu Song, Dmitry Evtyushkin, Dmitry Ponomarev, Nael B. Abu-Ghazaleh:
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation. DAC 2019: 60 - [c6]Daniel Townley, Khaled N. Khasawneh, Dmitry Ponomarev, Nael B. Abu-Ghazaleh, Lei Yu:
LATCH: A Locality-Aware Taint CHecker. MICRO 2019: 969-982 - [i3]Esmaeil Mohammadian Koruyeh, Shirin Haji Amin Shirazi, Khaled N. Khasawneh, Chengyu Song, Nael B. Abu-Ghazaleh:
SPECCFI: Mitigating Spectre Attacks using CFI Informed Speculation. CoRR abs/1906.01345 (2019) - 2018
- [c5]Esmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, Nael B. Abu-Ghazaleh:
Spectre Returns! Speculation Attacks using the Return Stack Buffer. WOOT @ USENIX Security Symposium 2018 - [i2]Khaled N. Khasawneh, Esmaeil Mohammadian Koruyeh, Chengyu Song, Dmitry Evtyushkin, Dmitry Ponomarev, Nael B. Abu-Ghazaleh:
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation. CoRR abs/1806.05179 (2018) - [i1]Esmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, Nael B. Abu-Ghazaleh:
Spectre Returns! Speculation Attacks using the Return Stack Buffer. CoRR abs/1807.07940 (2018) - 2017
- [c4]Mehmet Kayaalp, Khaled N. Khasawneh, Hodjat Asghari Esfeden, Jesse Elwell, Nael B. Abu-Ghazaleh, Dmitry V. Ponomarev, Aamer Jaleel:
RIC: Relaxed Inclusion Caches for Mitigating LLC Side-Channel Attacks. DAC 2017: 7:1-7:6 - [c3]Khaled N. Khasawneh, Nael B. Abu-Ghazaleh, Dmitry Ponomarev, Lei Yu:
RHMD: evasion-resilient hardware malware detectors. MICRO 2017: 315-327 - [c2]Hoda Naghibijouybari, Khaled N. Khasawneh, Nael B. Abu-Ghazaleh:
Constructing and characterizing covert channels on GPGPUs. MICRO 2017: 354-366 - 2016
- [j1]Meltem Ozsoy, Khaled N. Khasawneh, Caleb Donovick, Iakov Gorelik, Nael B. Abu-Ghazaleh, Dmitry Ponomarev:
Hardware-Based Malware Detection Using Low-Level Architectural Features. IEEE Trans. Computers 65(11): 3332-3344 (2016) - 2015
- [c1]Khaled N. Khasawneh, Meltem Ozsoy, Caleb Donovick, Nael B. Abu-Ghazaleh, Dmitry V. Ponomarev:
Ensemble Learning for Low-Level Hardware-Supported Malware Detection. RAID 2015: 3-25
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint