| 📜 Thesis, 📕 Security Conference, 📘 Systems Conference, 📗 Architecture Conference, ASTeRiSC Research Lab Member | 
|---|
  Efficient Fine-Grained Kernel Auditing using Augmented Reference Behavior Analysis and Virtualized Selective Tracing (To Appear)
               Chuqi Zhang, Spencer Faith, Feras Al-Qassas Theodorus Wensan Februanto, Zhenkai Liang, and Adil Ahmad
               📕 IEEE Symposium on Security and Privacy (Oakland), 2026
  Efficient Attack Provenance Via a User-Space Auditing Framework
             Feras Al-Qassas
             📜 MS Thesis
  A Virtualization-Based Private and Secure Video Game Architecture for Personal Computers
             Santosh Gokul
             📜 MS Thesis
  Erebor: A Drop-In Sandbox Solution for Private Data Processing in Untrusted Confidential Virtual Machines [paper | slides | code]
               Chuqi Zhang, Rahul Priolkar, Yuancheng Jiang, Yuan Xiao, Mona Vij, Zhenkai Liang, and Adil Ahmad
               📘 ACM EuroSys Conference (EuroSys), 2025
  Towards Trusted Extensible Device Measurement and Management via Intra-Firmware Privilege Isolation [paper]
               Chuqi Zhang, Bonan Ruan, Vikram Ramaswamy, Zhenkai Liang, and Adil Ahmad
               📘 ACM Workshop on Operating System Research for Connected Intelligence (WOSCI) (co-located with EuroSYS), 2025
  Poster: Towards a Lightweight Kernel Data Race Detector
             Rahul Priolkar, Chuqi Zhang, and Adil Ahmad
             📕 ISOC Network and Distributed System Security Symposium (NDSS), 2025
  Secure Data Analytics in Apache Spark with Fine-grained Policy Enforcement and Isolated Execution [paper]
             Byeongwook Kim, Jaewon Hur, Adil Ahmad, and Byoungyoung Lee
             📕 ISOC Network and Distributed System Security Symposium (NDSS), 2025
  The HitchHiker's Guide to High-Assurance System Observability Protection with Fast Permission Switches [paper | slides | code]
              Chuqi Zhang, Jun Zeng, Yiming Zhang, Adil Ahmad, Fengwei Zhang, Hai Jin, and Zhenkai Liang
             📕 ACM Conference on Computer and Communications Security (CCS), 2024
  Detecting Specification Mismatches using Machine Learning-Based Analysis of CPU Manuals
             Rachel Guzman
             📜 MS Thesis
  Veil: A Protected Services Framework for Confidential Virtual Machines [paper | slides | lightning | code]
             Adil Ahmad, Botong Ou, Congyu Liu, Xiaokuan Zhang, and Pedro Fonseca
             📗 ACM International Conference on Architectural Support for Programming Languages (ASPLOS), 2023
                [* Presented at ACM ASPLOS 2024 in San Diego, CA]
  Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability [paper]
             Varun Gandhi, Sarbartha Bannerjee, Aniket Agarwal, Adil Ahmad, Sangho Lee, and Marcus Peinado
             📕 USENIX Security Symposium (Security), 2023
  An Extensible Orchestration and Protection Framework for Confidential Cloud Computing [paper]
             Adil Ahmad, Alex Shultz, Byoungyoung Lee, and Pedro Fonseca
             📘 USENIX Operating Systems Design and Implementation (OSDI), 2023
  Defeating Critical Threats to Cloud User Data in Trusted Execution Environments [paper]
             Adil Ahmad
             📜 PhD Thesis
  HardLog: Practical Tamper-Proof System Auditing Using a Novel Audit Device [paper | slides | code]
             Adil Ahmad, Sangho Lee, and Marcus Peinado
             📕 IEEE Symposium on Security and Privacy (Oakland), 2022
             Adil Ahmad, Juhee Kim, Jaebaek Seo, Insik Shin, Pedro Fonseca, and Byoungyoung Lee
             📕 ISOC Network and Distributed System Security Symposium (NDSS), 2021
  Kard: Lightweight Data Race Detection with Per-thread Memory Protection [paper | slides | abstract]
             Adil Ahmad, Sangho Lee, Pedro Fonseca, and Byoungyoung Lee
             📗 ACM International Conference on Architectural Support for Programming Languages (ASPLOS), 2021
             Muhammad Abubakar, Adil Ahmad, Pedro Fonseca, and Dongyan Xu
             📕 Usenix Security Symposium (Security), 2021
             Seounghyun Park, Adil Ahmad, and Byoungyoung Lee
             📕 ACM Conference on Computer and Communications Security (CCS), 2020
             Hyunyoung Oh, Adil Ahmad, Seounghyun Park, Byoungyoung Lee, and Yunheung Park
             📕ACM Conference on Computer and Communications Security (CCS), 2020
  A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains [paper | code]
             Duc V. Le, Lizzy Tengana Hurtado, Adil Ahmad, Mohsen Minaei, Byoungyoung Lee, and Aniket Kate
             📕Privacy Enhancing Technologies Symposium (PETS), 2020
             Adil Ahmad, Byunggill Joe, Yuan Xiao, Yinqian Zhang, Insik Shin and Byoungyoung Lee
             📕 ISOC Network and Distributed System Security Symposium (NDSS), 2019
               [* co-first authors]
             Adil Ahmad, Kyungtae Kim, Muhammad Ihsanulhaq Sarfaraz and Byoungyoung Lee
             📕 ISOC Network and Distributed System Security Symposium (NDSS), 2018
  Detecting and Defending against Compelled Certificate Attacks using Origin-Bound CAPTCHAs [paper]
             Adil Ahmad, Faizan Ahmad, Lei Wei, Vinod Yegneswaran and Fareed Zaffar
             📕 International Conference on Security and Privacy in Communication Networks (SecureComm), 2018