Share This Author
A taxonomy of wireless micro-sensor network models
This taxonomy will aid in defining appropriate communication infrastructures for different sensor network application sub-spaces, allowing network designers to choose the protocol architecture that best matches the goals of their application.
Spectre Returns! Speculation Attacks using the Return Stack Buffer
- Esmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, N. Abu-Ghazaleh
- Computer ScienceWOOT @ USENIX Security Symposium
- 20 July 2018
This paper introduces a new Spectre-class attack that is based on exploiting the return stack buffer (RSB), a common predictor structure in modern CPUs used to predict return addresses, and recommends that this patch should be used on all machines to protect against SpectreRSB.
Jump over ASLR: Attacking branch predictors to bypass ASLR
- Dmitry Evtyushkin, D. Ponomarev, N. Abu-Ghazaleh
- Computer Science49th Annual IEEE/ACM International Symposium on…
- 15 October 2016
This paper develops an attack to derive kernel and user-level ASLR offset using a side-channel attack on the branch target buffer (BTB) and describes several possible protection mechanisms, both in software and in hardware.
Preemptive routing in Ad Hoc networks
Experiments demonstrate that adding proactive route selection and maintenance to DSR and AODV (on-demand ad hoc routing protocols) significantly reduces the number of broken paths, with a small increase in protocol overhead.
GPS: a general peer-to-peer simulator and its use for modeling BitTorrent
- Weishuai Yang, N. Abu-Ghazaleh
- Computer Science13th IEEE International Symposium on Modeling…
- 27 September 2005
An extensible framework for simulating P2P networks efficiently and accurately is presented by using message level simulation rather than packet level simulation and accuracy is maintained by tracking the network infrastructure and using a flow model to accomplish accurate estimate of the message behavior.
Malware-aware processors: A framework for efficient online malware detection
- M. Ozsoy, Caleb Donovick, Iakov Gorelik, N. Abu-Ghazaleh, D. Ponomarev
- Computer ScienceIEEE 21st International Symposium on High…
- 1 February 2015
This work proposes Malware-Aware Processors (MAP) - processors augmented with an online hardware-based detector to serve as the first line of defense to differentiate malware from legitimate programs and proposes a two-level detection framework where the hardware classifier prioritizes the work of a more accurate but more expensive software defense mechanism.
Wireless Software Defined Networking: A Survey and Taxonomy
This survey evaluates the use of SDN in four classes of popular wireless networks: cellular, sensor, mesh, and home networks, and classify the different advantages that can be obtained by using SDN across this range of networks, hoping that this classification identifies unexplored opportunities for usingSDN to improve the operation and performance of wireless networks.
Rendered Insecure: GPU Side Channel Attacks are Practical
The paper shows that an OpenGL based spy can fingerprint websites accurately, track user activities within the website, and even infer the keystroke timings for a password text box with high accuracy, and suggests mitigations based on limiting the rate of the calls, or limiting the granularity of the returned information.
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation
- Khaled N. Khasawneh, Esmaeil Mohammadian Koruyeh, Chengyu Song, Dmitry Evtyushkin, D. Ponomarev, N. Abu-Ghazaleh
- Computer Science56th ACM/IEEE Design Automation Conference (DAC)
- 13 June 2018
(SafeSpec), a new model for supporting speculation in a way that is immune to the side-channel leakage by storing side effects of speculative instructions in separate structures until they commit, and a cycle accurate model of modified design of an x86-64 processor.
Non-monopolizable caches: Low-complexity mitigation of cache side channel attacks
A flexibly-partitioned cache design that either drastically weakens or completely eliminates cache-based side channel attacks, and can provide strong security guarantees for the AES and Blowfish encryption algorithms.