| OBLIVIATE: A Data Oblivious Filesystem for Intel SGX. A Ahmad, K Kim, MI Sarfaraz, B Lee NDSS, 2018 | 215 | 2018 |
| Obfuscuro: A commodity obfuscation engine on intel sgx A Ahmad, B Joe, Y Xiao, Y Zhang, I Shin, B Lee Network and Distributed System Security Symposium, 2019 | 126 | 2019 |
| Hardlog: Practical tamper-proof system auditing using a novel audit device A Ahmad, S Lee, M Peinado 2022 IEEE Symposium on Security and Privacy (SP), 1791-1807, 2022 | 51 | 2022 |
| CHANCEL: Efficient Multi-client Isolation Under Adversarial Programs. A Ahmad, J Kim, J Seo, I Shin, P Fonseca, B Lee NDSS 6, 221-230, 2021 | 49 | 2021 |
| {SHARD}:{Fine-Grained} Kernel Specialization with {Context-Aware} Hardening M Abubakar, A Ahmad, P Fonseca, D Xu 30th USENIX Security Symposium (USENIX Security 21), 2435-2452, 2021 | 49 | 2021 |
| TRUSTORE: Side-Channel Resistant Storage for SGX using Intel Hybrid CPU-FPGA H Oh, A Ahmad, S Park, B Lee, Y Paek Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 43 | 2020 |
| BlackMirror: Preventing Wallhacks in 3D Online FPS Games S Park, A Ahmad, B Lee Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 35 | 2020 |
| Kard: lightweight data race detection with per-thread memory protection A Ahmad, S Lee, P Fonseca, B Lee Proceedings of the 26th ACM International Conference on Architectural …, 2021 | 29 | 2021 |
| A tale of two trees: One writes, and other reads: Optimized oblivious accesses to bitcoin and other utxo-based blockchains DV Le, LT Hurtado, A Ahmad, M Minaei, B Lee, A Kate Proceedings on Privacy Enhancing Technologies 2020 (2), 2020 | 25 | 2020 |
| Veil: A Protected Services Framework for Confidential Virtual Machines A Ahmad, B Ou, C Liu, X Zhang, P Fonseca Proceedings of the 28th ACM International Conference on Architectural …, 2023 | 20 | 2023 |
| An Extensible Orchestration and Protection Framework for Confidential Cloud Computing A Ahmad, A Schultz, P Fonseca, B Lee | 16* | |
| Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability V Gandhi, S Banerjee, A Agrawal, A Ahmad, S Lee, M Peinado 32nd USENIX Security Symposium (USENIX Security 23), 391-408, 2023 | 13 | 2023 |
| The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches C Zhang, J Zeng, Y Zhang, A Ahmad, F Zhang, H Jin, Z Liang Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024 | 11 | 2024 |
| Erebor: A Drop-In Sandbox Solution for Private Data Processing in Untrusted Confidential Virtual Machines C Zhang, R Priolkar, Y Jiang, Y Xiao, M Vij, Z Liang, A Ahmad Proceedings of the Twentieth European Conference on Computer Systems, 1210-1228, 2025 | 7 | 2025 |
| A Tale of Two Trees: One Writes, and Other Reads.{Optimized Oblivious Accesses to Large-Scale Blockchains} DV Le, LT Hurtado, A Ahmad, M Minaei, B Lee, A Kate arXiv preprint arXiv:1909.01531, 2019 | 5 | 2019 |
| LAPUTA: Secure Data Analytics in Apache Spark with Fine-grained Policy Enforcement and Isolated Execution B Kim, J Hur, A Ahmad, B Lee Network and Distributed Systems Security, 2025 | 1 | 2025 |
| Data race detection with per-thread memory protection S Lee, A Ahmad US Patent 11,556,395, 2023 | 1 | 2023 |
| Detecting and Defending against Certificate Attacks with Origin-Bound CAPTCHAs A Ahmad, F Ahmad, L Wei, V Yegneswaran, F Zaffar International Conference on Security and Privacy in Communication Systems …, 2018 | 1 | 2018 |
| Secure Data Analytics in Apache Spark with Fine-grained Policy Enforcement and Isolated Execution. B Kim, J Hur, A Ahmad, B Lee NDSS, 2025 | | 2025 |
| Data race detection with per-thread memory protection S Lee, A Ahmad US Patent App. 18/082,444, 2023 | | 2023 |