Publications

2024

USENIX

Forget and Rewire: Enhancing the Resilience of Transformer-based Models against Bit-Flip Attacks

Najmeh Nazari Bavarsad, Hosein Mohammadi Makrani, Chongzhou Fang, Hossein Sayadi, Setareh Rafatirad, Khaled N. Khasawneh, Houman HomayounUSENIX Security 2024

WiSec

Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing

Yaqi He, Kai Zeng, Long Jiao, Brian L. Mark, and Khaled N. KhasawnehThe 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec24)

WiSec
@ICC

Evaluating and Optimizing Cryptographic Offloading for IoT Devices: Attribute-Based Encryption Case Study

Sunanda Roy, Thomas Crowley, Brian L. Mark, Kai Zeng, and Khaled N. KhasawnehIEEE International Conference on Communications 2024 Workshop - Nineth Workshop on NextG (6G and beyond) Wireless Security.

DAC

Architectural Whispers: Unveiling Machine Learning Models with Frequency Throttling Side-Channel Fingerprinting

Najmeh Nazari, Chongzhou Fang, Hosein Mohammadi Makrani, Behnam Omidi, Setareh Rafatirad, Avesta Sasan, Hossein Sayadi, Houman Homayoun and Khaled N. Khasawneh61th Annual Design Automation Conference (ACM DAC), 2024.

ISQED

Hardware Support for Trustworthy Machine Learning: A Survey

Md Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh25nd International Symposium on Quality Electronic Design (ISQED), 2024

DATE

SpecScope: Automating Discovery of Exploitable Spectre Gadgets on Black-box Microarchitectures

Najmeh Nazari*, Behnam Omidi*, Chongzhou Fang, Hosein Mohammadi Makrani, Setareh Rafatirad, Avesta Sasan, Houman Homayoun and Khaled N. KhasawnehDesign, Automation and Test in Europe (DATE), 2024. 

DATE

Harnessing ML Privacy by Design Through Crossbar Array Non-idealities

Md Shohidul Islam, Sankha B Dutta, Andres Marquez, Ihsen Alouani, and Khaled N. KhasawnehDesign, Automation and Test in Europe (DATE), 2024. 

Design & Test

Spectre Returns! Speculation Attacks using the Return Stack Buffer

Esmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, Nael Abu-GhazalehIEEE Design & Test 2024.

2023

TCAD

SecureVolt: Enhancing Deep Neural Networks Security via Undervolting

Md Shohidul Islam, Ihsen Alouani, Khaled N. KhasawnehIEEE Transactions on Computer-Aided Design (TCAD), 2023

IEEE
MICRO

Adversarial Attacks against Machine Learning-based Resource Provisioning Systems

Najmeh Nazari Bavarsad, Hosein Mohammadi Makrani, Behnam Omidi, Setareh Rafatirad, Hossein Sayadi, Khaled N. Khasawneh, Houman HomayounIEEE MICRO

GLSVLSI

A Brain-inspired Approach for Malware Detection using Sub-semantic Hardware Features

Maryam Parsa, Khaled N. Khasawneh, Ihsen Alouani33th Great Lakes Symposium on VLSI (GLSVLSI), 2023

HOST

Vpp: Privacy Preserving Machine Learning via Undervolting 

Md Shohidul Islam, Behnam Omidi, Ihsen Alouani, Khaled N. KhasawnehIEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2023.

DAC

Stochastic-HMDs: Adversarial-Resilient Hardware Malware Detectors via Undervolting 

Md Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh60th Annual Design Automation Conference (ACM DAC), 2023.

NDSS

HeteroScore: Evaluating and Mitigating Cloud Security Threats Brought by Heterogeneity

Chongzhou Fang, Najmeh Nazari, Behnam Omidi,  Han Wang, Aditya Puri, Manish Arora, Setareh Rafatirad, Houman Homayoun, and Khaled N. KhasawnehNetwork and Distributed Systems Security Symposium (NDSS), 2023

2022

5GBeyond @GLOBECOM 

Secure and Energy-Efficient Proximity-Based Pairing for IoT Devices

Yaqi He, Kai Zeng, Brian Mark, Khaled N. KhasawnehThe Seventh IEEE Workshop on 5G and Beyond Wireless Security in Globecom, 2022

IJCNN

ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints

Amira Guesmi, Khaled N. Khasawneh, Nael Abu-Ghazaleh, Ihsen AlouaniInternational Joint Conference on Neural Networks (IJCNN), 2022.

SOT5G

@WCNC

Characterization of AES Implementations on Microprocessor-based IoT Devices

Sunanda Roy, Angelos Stavrou, Brian L. Mark, Kai Zeng, Sai Manoj P D, Khaled N. KhasawnehWorkshop on Securing and Operating Through 5G in WCNC, 2022. 

NDSS

REPTTACK: Exploiting Cloud Schedulers to Guide Co-Location Attacks

Chongzhou Fang, Han Wang, Najmeh Nazari, Behnam Omidi, Avesta Sasan, Khaled N. Khasawneh, Setareh Rafatirad, and Houman HomayounNetwork and Distributed Systems Security Symposium (NDSS), 2022. 

2021

ICCAD

Lower Voltage for Higher Security: Using Voltage Overscaling to Secure Deep Neural Networks

Md Shohidul Islam, Ihsen Alouani, Khaled N. KhasawnehInternational Conference On Computer Aided Design (ICCAD), 2021. 

GLSVLSI

Energy-Efficient and Adversarially Robust Machine Learning with Selective Dynamic Band Filtering

Neha Nagarkar, Khaled N. Khasawneh, Setareh Rafatirad, Avesta Sasan, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao30th Great Lakes Symposium on VLSI (GLSVLSI), 2021

SEED

Cloak & Co-locate: Adversarial Railroading of Resource Sharing-based Attacks on the Cloud

Hosein Mohammadi Makrani, Hossein Sayadi, Najmeh Nazari Bavarsad, Khaled N. Khasawneh, Avesta Sasan, Setareh Rafatirad, Houman HomayounIEEE  International Symposium on Secure and Private Execution Environment Design (SEED), 2021. 

TCAD

Imitating Functional Operations for Mitigating Side-Channel Leakage

Abhijitt Dhavlle, Setareh Rafatirad, Khaled N. Khasawneh, Houman Homayoun, Sai Manoj P DIEEE Transactions on Computer-Aided Design (TCAD), 2021. 

TC

Efficient Hardware Malware Detectors that are Resilient to Adversarial Evasion

Md Shohidul Islam, Khaled N. Khasawneh, Nael Abu-Ghazaleh, Dmitry Ponomarev, Lei YuIEEE Transactions on Computers (TC), 2021. 

CogArch

@HPCA

Enhancing Hardware Malware Detectors’ Security through Voltage Over-scaling

Md Shohidul Islam, Ihsen Alouani, Khaled N. KhasawnehThe 5th Workshop on Cognitive Architectures in HPCA, 2021.

ISQED

MonotonicHMDs: Exploiting Monotonic Features to Defend Against Evasive Malware

Md Shohidul Islam, Behnam Omaidi, Khaled N. Khasawneh22nd International Symposium on Quality Electronic Design (ISQED), 2021

ASPLOS

Defensive Approximation: Securing CNNs using Approximate Computing

Amira Guesmi, Ihsen Alouani, Khaled N. Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael Abu-GhazalehThe 26th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2021

2020

ASHES

@CCS

Lightweight Implementation of the LowMC Block Cipher Protected Against Side-Channel Attacks

Javad Bahrami, Viet B. Dang, Abubakr Abdulgadir, Khaled N. Khasawneh, Jens-Peter Kaps and Kris GajFourth Workshop on Attacks and Solutions in Hardware Security (ASHES), co-located with ACM CCS, 2020

ICCD

ND-HMDs: Non-Differentiable Hardware Malware Detectors against Evasive Transient Execution Attacks

Md Shohidul Islam, Abraham Kuruvila, Kanad Basu, Khaled N. KhasawnehThe 38th IEEE International Conference on Computer Design 

GLSVLSI

The Evolution of Transient-Execution Attacks  

Claudio Canella, Khaled N. Khasawneh, Daniel Gruss30th Great Lakes Symposium on VLSI (GLSVLSI), 2020

GLSVLSI

Evolution of Defenses against Transient-Execution Attacks 

Claudio Canella, Sai Manoj Pudukotai Dinakarrao, Daniel Gruss, Khaled N. Khasawneh30th Great Lakes Symposium on VLSI (GLSVLSI), 2020

GLSVLSI

A Review of In-Memory Computing Architecture for Machine Learning Applications

Sathwika Bavikadi, Purab Ranjan Sutradhar, Khaled N.Khasawneh, Amlan Ganguly, Sai Manoj Pudukotai Dinakarrao30th Great Lakes Symposium on VLSI (GLSVLSI), 2020

DAC (WIP) 

Approx-HMDs: Approximating Hardware Malware Detectors to Defend Against Adversarial Attacks 

Md Shohidul Islam, Ihsen Alouani, Khaled N. KhasawnehWork-In-Progress (WIP): 57th Annual Design Automation Conference (ACM DAC), 2020.

ISQED

Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks

Farnaz Behnia, Ali Mirzaeian, Mohammad Sabokrou, Saj Manoj, Tinoosh Mohsenin, Khaled N. Khasawneh, Liang Zhao, Houman Homayoun, Avesta Sasan21st International Symposium on Quality Electronic Design (ISQED 2020)

S&P

SPECCFI: Mitigating Spectre Attacks using CFI informed Speculation

Esmaeil Mohammadian Koruyeh, Shirin Haji Amin Shirazi, Khaled N. Khasawneh, Chengyu Song, and Nael Abu-Ghazaleh41st IEEE Symposium on Security and Privacy (S&P), 2020.

2019

MICRO

LATCH: Locality Aware Taint CHecker

Daniel Townley, Khaled N. Khasawneh, Dmitry Ponomarev, Nael Abu-Ghazaleh, Lei YuThe 52th International Symposium on Microarchitecture (MICRO), 2019. 

DAC

SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation

Khaled N. Khasawneh, Esmaeil Mohammadian Koruyeh, Chengyu Song, Dmitry Evtyushkin, Dmitry Ponomarev, Nael Abu-Ghazaleh56th Annual Design Automation Conference (ACM DAC), 2019.

2018

TDSC

EnsembleHMD: Accurate Hardware Malware Detectors with Specialized Ensemble Classifiers

Khaled N. Khasawneh, Meltem Ozsoy, Caleb Donovick, Nael Abu-Ghazaleh, Dmitry PonomarevIEEE Transactions on Dependable and Secure Computing (TDSC), 2018. (extends RAID'15) 

WOOT

Spectre Returns! Speculation Attacks using the Return Stack Buffer

Esmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, Nael Abu-Ghazaleh12th USENIX Workshop on Offensive Technologies (WOOT), 2018. 

ICCAD

Adversarial Evasion-Resilient Hardware Malware Detectors

Khaled N. Khasawneh, Nael Abu-Ghazaleh, Dmitry Ponomarev, and Lei YuThe 37th International Conference On Computer Aided Design (ICCAD), 2018. (Invited paper)

2017

MICRO

RHMD: Evasion-Resilient Hardware Malware Detectors

Khaled N. Khasawneh, Nael Abu-Ghazaleh, Dmitry Ponomarev, and Lei YuThe 50th International Symposium on Microarchitecture (MICRO), 2017. (acceptance rate: 18.6%)

MICRO

Constructing and Characterizing Covert Channels on GPGPUs

Hoda Naghibi, Khaled N. Khasawneh, and Nael Abu-Ghazaleh The 50th International Symposium on Microarchitecture (MICRO), 2017. (acceptance rate: 18.6%)

DAC

RIC: Relaxed Inclusion Caches for Mitigating LLC Side-Channel Attacks

Mehmet Kayaalp, Khaled N. Khasawneh, Hodjat Esfeden, Jesse Elwell, Nael Abu-Ghazaleh, Dmitry Ponomarev, and Aamer Jaleel 54th Annual Design Automation Conference (ACM DAC), 2017. (acceptance rate: 24%) 

Prior to 2016

TC

Hardware-based Malware Detection using Low-level Architectural Features

Meltem Ozsoy, Khaled N. Khasawneh, Caleb Donovick, Iakov Gorelik, Nael Abu-Ghazaleh, Dmitry PonomarevIEEE Transactions on Computers (TC), 2016. (extends HPCA'15) 

RAID

Ensemble Learning for Low-level Hardware-supported Malware Detection

Khaled N. Khasawneh, Meltem Ozsoy, Caleb Donovick, Nael Abu-Ghazaleh, and Dmitry Ponomarev18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2015. (acceptance rate: 23.5%)