• Implementing and Analyzing a Recursive Technique for Building Path Oblivious RAM 

      Rachid, Maan Haj; Riley, Ryan; Malluhi, Qutaibah ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      It has been demonstrated that encrypting confidential data before storing it is not sufficient because data access patterns can leak significant information about the data itself (Goldreich & Ostrovsky, 1996). Oblivious ...
    • On the detection of Kernel-level rootkits using hardware performance counters 

      Singh, Baljit; Evtyushkin, Dmitry; Elwell, Jesse; Riley, Ryan D; Cervesato, Iliano ( Association for Computing Machinery, Inc , 2017 , Conference Paper)
      Recent work has investigated the use of hardware perfor- mance counters (HPCs) for the detection of malware run- ning on a system. These works gather traces of HPCs for a variety of applications (both malicious and ...