Search Results for author: Ahmad Atamli

Found 3 papers, 0 papers with code

DL2Fence: Integrating Deep Learning and Frame Fusion for Enhanced Detection and Localization of Refined Denial-of-Service in Large-Scale NoCs

no code implementations20 Mar 2024 Haoyu Wang, Basel Halak, Jianjie Ren, Ahmad Atamli

This study introduces a refined Flooding Injection Rate-adjustable Denial-of-Service (DoS) model for Network-on-Chips (NoCs) and more importantly presents DL2Fence, a novel framework utilizing Deep Learning (DL) and Frame Fusion (2F) for DoS detection and localization.

One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices

no code implementations12 Mar 2024 Marco Chilese, Richard Mitev, Meni Orenbach, Robert Thorburn, Ahmad Atamli, Ahmad-Reza Sadeghi

The core intuition behind RAGE is to exploit the correspondence between execution trace, execution graph, and execution embeddings to eliminate the unrealistic requirement of having access to a complete CFG.

AuDroid: Preventing Attacks on Audio Channels in Mobile Devices

no code implementations1 Apr 2016 Giuseppe Petracca, Yuqiong Sun, Ahmad Atamli, Trent Jaeger

We evaluate our approach on 17 widely-used apps that make extensive use of the microphone and speaker, finding that AuDroid prevents six types of attack scenarios on audio channels while permitting all 17 apps to run effectively.

Cryptography and Security Operating Systems

Cannot find the paper you are looking for? You can Submit a new open access paper.