Follow
Ahmad Atamli
Ahmad Atamli
Unknown affiliation
Verified email at soton.ac.uk
Title
Cited by
Cited by
Year
Threat-based security analysis for the internet of things
AW Atamli, A Martin
2014 International workshop on secure internet of things, 35-43, 2014
2432014
Audroid: Preventing attacks on audio channels in mobile devices
G Petracca, Y Sun, T Jaeger, A Atamli
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
912015
{AWare}: Preventing Abuse of {Privacy-Sensitive} Sensors via Operation Bindings
G Petracca, AA Reineh, Y Sun, J Grossklags, T Jaeger
26th USENIX security symposium (USENIX Security 17), 379-396, 2017
412017
Analysis of trusted execution environment usage in samsung KNOX
A Atamli-Reineh, R Borgaonkar, RA Balisane, G Petracca, A Martin
Proceedings of the 1st Workshop on System Software for Trusted Execution, 1-6, 2016
242016
Towards a usable framework for modelling security and privacy risks in the smart home
JRC Nurse, A Atamli, A Martin
Human Aspects of Information Security, Privacy, and Trust: 4th International …, 2016
222016
Securing application with software partitioning: a case study using SGX
AA Reineh, AA Martin
International Conference on Security and Privacy 164, 2015
21*2015
{EnTrust}: Regulating Sensor Access by Cooperating Programs via Delegation Graphs
G Petracca, Y Sun, AA Reineh, P McDaniel, J Grossklags, T Jaeger
28th USENIX Security Symposium (USENIX Security 19), 567-584, 2019
112019
A framework for application partitioning using trusted execution environments
A Atamli‐Reineh, A Paverd, G Petracca, A Martin
Concurrency and Computation: Practice and Experience 29 (23), e4130, 2017
102017
Aware: Controlling app access to I/O devices on mobile platforms
G Petracca, A Atamli, Y Sun, J Grossklags, T Jaeger
arXiv preprint arXiv:1604.02171, 2016
82016
IO-Trust: an out-of-band trusted memory acquisition for intrusion detection and forensics investigations in cloud IOMMU based systems
A Atamli, G Petracca, J Crowcroft
Proceedings of the 14th International Conference on Availability …, 2019
52019
Enabling secure and usable mobile application: revealing the nuts and bolts of software TPM in todays mobile devices
AA Reineh, G Petracca, J Uusilehto, A Martin
arXiv preprint arXiv:1606.02995, 2016
42016
Live system call trace reconstruction on Linux
T Nguyen, M Orenbach, A Atamli
Forensic Science International: Digital Investigation 42, 301398, 2022
32022
Trustworthy and Secure Service-Oriented Architecture for the Internet of Things
AA Reineh, AJ Paverd, AP Martin
The 4th International Conference on the Internet of Things (IoT 2014), 2014
22014
Architectures for Enhancing Authentication Privacy and Security Using Trusted Computing
RA Balisane, R Borgaonkar, A Atamli-Reineh, A Martin
Proceedings of the 2nd Workshop on System Software for Trusted Execution, 1-7, 2017
12017
DL2Fence: Integrating Deep Learning and Frame Fusion for Enhanced Detection and Localization of Refined Denial-of-Service in Large-Scale NoCs
H Wang, B Halak, J Ren, A Atamli
arXiv preprint arXiv:2403.13563, 2024
2024
One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices
M Chilese, R Mitev, M Orenbach, R Thorburn, A Atamli, AR Sadeghi
arXiv preprint arXiv:2403.07465, 2024
2024
Secure in-service firmware update
MH Sfadia, Y Itkin, A Atamli, A Shahar, Y Strassberg, L Itsik
US Patent 11,741,232, 2023
2023
Forensic analysis of Tor in Windows environment: A case study
VM Angeli, A Atamli, E Karafili
Proceedings of the 17th International Conference on Availability …, 2022
2022
D3. 4: ASSURED REAL-TIME MONITORING AND TRACING FUNCTIONALITIES
M Orenbach, A Atamli, T Giannetsos
2020
Partitioning the Trusted Computing Baseof Applications on Commodity Systems
A Atamli
University of Oxford, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20