Skip to main content

Showing 1–4 of 4 results for author: Atamli, A

.
  1. arXiv:2403.13563  [pdf

    cs.CR cs.AR cs.LG

    DL2Fence: Integrating Deep Learning and Frame Fusion for Enhanced Detection and Localization of Refined Denial-of-Service in Large-Scale NoCs

    Authors: Haoyu Wang, Basel Halak, Jianjie Ren, Ahmad Atamli

    Abstract: This study introduces a refined Flooding Injection Rate-adjustable Denial-of-Service (DoS) model for Network-on-Chips (NoCs) and more importantly presents DL2Fence, a novel framework utilizing Deep Learning (DL) and Frame Fusion (2F) for DoS detection and localization. Two Convolutional Neural Networks models for classification and segmentation were developed to detect and localize DoS respectivel… ▽ More

    Submitted 23 May, 2024; v1 submitted 20 March, 2024; originally announced March 2024.

  2. arXiv:2403.07465  [pdf, other

    cs.CR cs.LG

    One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices

    Authors: Marco Chilese, Richard Mitev, Meni Orenbach, Robert Thorburn, Ahmad Atamli, Ahmad-Reza Sadeghi

    Abstract: Control-Flow Attestation (CFA) is a security service that allows an entity (verifier) to verify the integrity of code execution on a remote computer system (prover). Existing CFA schemes suffer from impractical assumptions, such as requiring access to the prover's internal state (e.g., memory or code), the complete Control-Flow Graph (CFG) of the prover's software, large sets of measurements, or t… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

  3. arXiv:1604.02171  [pdf, ps, other

    cs.OS

    Aware: Controlling App Access to I/O Devices on Mobile Platforms

    Authors: Giuseppe Petracca, Ahmad Atamli, Yuqiong Sun, Jens Grossklags, Trent Jaeger

    Abstract: Smartphones' cameras, microphones, and device displays enable users to capture and view memorable moments of their lives. However, adversaries can trick users into authorizing malicious apps that exploit weaknesses in current mobile platforms to misuse such on-board I/O devices to stealthily capture photos, videos, and screen content without the users' consent. Contemporary mobile operating system… ▽ More

    Submitted 7 April, 2016; originally announced April 2016.

  4. arXiv:1604.00320  [pdf, ps, other

    cs.CR cs.OS

    AuDroid: Preventing Attacks on Audio Channels in Mobile Devices

    Authors: Giuseppe Petracca, Yuqiong Sun, Ahmad Atamli, Trent Jaeger

    Abstract: Voice control is a popular way to operate mobile devices, enabling users to communicate requests to their devices. However, adversaries can leverage voice control to trick mobile devices into executing commands to leak secrets or to modify critical information. Contemporary mobile operating systems fail to prevent such attacks because they do not control access to the speaker at all and fail to co… ▽ More

    Submitted 1 April, 2016; originally announced April 2016.

    Comments: 2015 Annual Computer Security Applications Conference