Search

Amro Awad Phones & Addresses

  • Morrisville, NC
  • Orlando, FL
  • 4700 Westgrove St APT 1003, Raleigh, NC 27606
  • Los Alamos, NM

Resumes

Resumes

Amro Awad Photo 1

Assistant Professor

View page
Location:
12221 east Colonial Dr, Orlando, FL 32826
Industry:
Computer Hardware
Work:
North Carolina State University
Assistant Professor

Air Force Research Laboratory May 2018 - Aug 2018
Air Force Faculty Fellow

Sandia National Laboratories Oct 1, 2016 - Jun 2017
Senior Member of Technical Staff

University of Central Florida Oct 1, 2016 - Jun 2017
Assistant Professor In Computer Engineering

Amd Aug 2015 - Jan 2016
Research Co-Op Engineer
Education:
North Carolina State University 2011 - 2016
Doctorates, Doctor of Philosophy, Computer Engineering
North Carolina State University 2012 - 2012
Master of Science, Masters, Computer Engineering
Jordan University of Science and Technology 2007 - 2011
Bachelors, Bachelor of Science, Computer Engineering
Skills:
Programming
High Performance Computing
C++
C
Matlab
Algorithms
Python
Computer Architecture
Vhdl
Linux
Java
Verilog
Pspice
Latex
C#
Gpu
Cuda
X86 Assembly
Bash Scripting
Html
Network Programming
Pin Tool
Gem5 Simulator
Synopsys Tools
Modelsim
Sql
Mips
Openmp
Bash
Simics
Gem5
Llvm and Its Ir
Nvm Express
68K
Interests:
Politics
Children
Gpus
Human Rights
Languages:
English
Arabic
German
Hebrew
Amro Awad Photo 2

Amro Awad

View page

Publications

Us Patents

System, Method And Computer Readable Medium For File Encryption And Memory Encryption Of Secure Byte-Addressable Persistent Memory And Auditing

View page
US Patent:
20190392166, Dec 26, 2019
Filed:
Jun 20, 2019
Appl. No.:
16/447242
Inventors:
- Orlando FL, US
Amro AWAD - Orlando FL, US
International Classification:
G06F 21/62
G06F 16/16
G06F 16/13
G06F 16/22
G06F 3/06
G06F 12/0882
Abstract:
A method comprising initializing, by a processor, a field identification (FID) field and a file type field in a memory encryption counter block associated with pages for each file of a plurality of files stored in a persistent memory device (PMD), in response to a command by an operating system (OS). The file type field identifies whether each file associated with FID field is one of an encrypted file and a memory location. The method includes decrypting data of a page stored in the PMD, based on a read command by a requesting core. When decrypting, determining whether the requested page is an encrypted file or memory location. If the requested page is an encrypted file, performing decryption based on a first encryption pad generated based on the file encryption key of the encrypted file and a second encryption pad generated based on a processor key of the secure processor.

Translation Pinning In Translation Lookaside Buffers

View page
US Patent:
20190188154, Jun 20, 2019
Filed:
Dec 15, 2017
Appl. No.:
15/843165
Inventors:
- Santa Clara CA, US
Hussein Elnawawy - Raleigh NC, US
Amro Awad - Orlando FL, US
International Classification:
G06F 12/126
G06F 12/1027
G06F 12/1018
G06F 9/30
G06F 9/50
G06F 9/455
Abstract:
A processor includes a first translation lookaside buffer (TLB), a second TLB, and a TLB control mechanism. The TLB control mechanism is to store a TLB-miss count (TMC) for a page. The TMC indicates a number of TLB misses of the first TLB for the page. The TLB control mechanism is further to determine that the TMC is greater than a threshold count and store a translation of the page in the second TLB responsive to a determination that the TMC is greater than the threshold count.

Systems And Methods For Modeling Memory Access Behavior And Memory Traffic Timing Behavior

View page
US Patent:
20160239212, Aug 18, 2016
Filed:
Feb 15, 2016
Appl. No.:
15/044044
Inventors:
- Raleigh NC, US
Yipeng Wang - Raleigh NC, US
Amro Awad - Raleigh NC, US
International Classification:
G06F 3/06
G06F 17/50
Abstract:
Systems and methods for modeling memory access behavior and memory traffic timing behavior are disclosed. According to an aspect, a method includes receiving data indicative of memory access behavior resulting from instructions executed on a processor. The method also includes determining a statistical profile of the memory access behavior, the profile including tuple statistics of memory access behavior. Further, the method includes generating a clone of the executed instructions based on the statistical profile for use in simulating the memory access behavior.
Amro J Awad from Morrisville, NC, age ~35 Get Report