Ahmed Tamrawi

Title(s):

Lecturer [E CPE]

Lecturer, Software Security

Office

Coover
2520 Osborn Dr
Ames, IA 500111046

Information

Ahmed Tamrawi is a software security researcher, educator, and full-stack developer with expertise in program analysis for enhancing the safety and security of complex systems. His work spans multiple domains, including verifying the security of critical software and detecting advanced algorithmic complexity issues and side-channel vulnerabilities. Ahmed has also contributed to high-profile U.S. Department of Defense DARPA initiatives, specifically the Automated Program Analysis for Cybersecurity (APAC) and Space/Time Analysis for Cybersecurity (STAC) programs, where he helped pioneer solutions in automated program analysis. Along serving as a part-time lecturer at Iowa State University, Ahmed is currently a research scientist at EnSoft Corp. At EnSoft, he is focused on advancing Atlas, an innovative program analysis platform, and Simhance, a tool to modenize Simulink models and check for their compliance. His professional experience includes roles as an assistant professor at Birzeit University and Yarmouk University, software development engineer intern at Amazon, research and teaching assistant at Iowa State University, research and development engineer at G.ho.st, and software development engineer intern at MBRM. Ahmed holds both a Ph.D. and M.S. in Computer Engineering from Iowa State University and a B.S. in Computer Engineering from Yarmouk University.

Publications

  • Mathews, Jon; Tamrawi, Ahmed; Ferrero, Sergio; Sauceda, Jeremias (2025). “Modern Simulink DevOps Integration.
  • Awadhutkar, Payas; Tamrawi, Ahmed; Sauceda, Jeremias (2025). “Detecting Cyber-Security Vulnerabilities in Legacy Safety-Critical Software with Tight Performance Constraints.
  • Mathews, Jon; Murdock, Theodore; Sauceda, Jeremias; Tamrawi, Ahmed; Kothari, Suresh (2024). “A Humane, Graph-Based Representation of Programs and Analyses.Technical Whitepaper, EnSoft Corp.
  • Awadhutkar, Payas; Tamrawi, Ahmed; Goluch, Ryan; Kothari, Suresh (2022). “Control flow equivalence method for establishing sanctity of compiling.” Computers & Security
  • Al-Issa, Yazan; Ottom, Mohammad Ashraf; Tamrawi, Ahmed (2019). “eHealth Cloud Security Challenges: A Survey.Journal of Healthcare Engineering
  • Holland, Benjamin; Mathews, Jon; Tamrawi, Ahmed (2018). “Catastrophic Cyber-Physical Malware.Versatile Cybersecurity
  • Tamrawi, Ahmed; Ram, Sharwan; Awadhutkar, Payas; Holland, Benjamin; Santhanam, Ganesh Ram; Kothari, Suresh (2018). “DynaDoc: Automated On-Demand Context-Specific Documentation.” 2018 IEEE Third International Workshop on Dynamic Software Documentation (DySDoc3)
  • Kothari, Suresh; Santhanam, Ganesh Ram; Awadhutkar, Payas; Holland, Benjamin; Mathews, Jon; Tamrawi, Ahmed (2018). “Catastrophic cyber-physical malware.” Versatile Cybersecurity
  • Holland, Benjamin; Awadhutkar, Payas; Kothari, Suresh; Tamrawi, Ahmed; Mathews, Jon (2018). “Comb: Computing relevant program behaviors.Proceedings of the 40th International Conference on Software Engineering: Companion Proceedings
  • Tamrawi, Ahmed; Kothari, Suresh (2018). “Projected control graph for computing relevant program behaviors.Science of Computer Programming
  • Kothari, Suresh; Awadhutkar, Payas; Tamrawi, Ahmed; Mathews, Jon (2017). “Modeling lessons from verifying large software systems for safety and security.” 2017 Winter Simulation Conference (WSC)
  • Tamrawi, Ahmed; Kothari, Suresh (2016). “Projected control graph for accurate and efficient analysis of safety and security vulnerabilities.2016 23rd Asia-Pacific Software Engineering Conference (APSEC)
  • Tamrawi, Ahmed (2016). “Evidence-enabled verification for the Linux kernel.
  • Kothari, Suresh; Awadhutkar, Payas; Tamrawi, Ahmed (2016). “Insights for practicing engineers from a formal verification study of the linux kernel.2016 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)
  • Kothari, Suresh; Tamrawi, Ahmed; Mathews, Jon (2016). “Human-machine resolution of invisible control flow?2016 IEEE 24th International Conference on Program Comprehension (ICPC)
  • Kothari, Suresh; Tamrawi, Ahmed; Sauceda, Jeremias; Mathews, Jon (2016). “Let’s verify Linux: accelerated learning of analytical reasoning through automation and collaboration.Proceedings of the 38th International Conference on Software Engineering Companion
  • Kothari, Suresh; Tamrawi, Ahmed; Mathews, Jon (2016). “Rethinking verification: accuracy, efficiency and scalability through human-machine collaboration.” Proceedings of the 38th International Conference on Software Engineering Companion
  • Tamrawi, Ahmed; Kothari, Suresh (2014). “Event-flow graphs for efficient path-sensitive analyses.” arXiv preprint arXiv:1404.1279
  • Kothari, Suresh; Deepak, Akshay; Tamrawi, Ahmed; Holland, Benjamin; Krishnan, Sandeep (2014). “A “Human-in-the-loop” approach for resolving complex software anomalies.” 2014 IEEE international conference on systems, man, and cybernetics (SMC)
  • Tamrawi, Ahmed; Nguyen, Hoan Anh; Nguyen, Hung Viet; Nguyen, Tien N (2012). “SYMake: a build code analysis and refactoring tool for makefiles.Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering
  • Tamrawi, Ahmed; Nguyen, Hoan Anh; Nguyen, Hung Viet; Nguyen, Tien N (2012). “Build code analysis with symbolic evaluation.2012 34th International Conference on Software Engineering (ICSE)
  • Nguyen, Anh Tuan; Nguyen, Tung Thanh; Nguyen, Hoan Anh; Tamrawi, Ahmed; Nguyen, Hung Viet; Al-Kofahi, Jafar; Nguyen, Tien N (2012). “Graph-based pattern-oriented, context-sensitive source code completion.2012 34th International Conference on Software Engineering (ICSE)
  • Tamrawi, Ahmed; Nguyen, Tung Thanh; Al-Kofahi, Jafar M; Nguyen, Tien N (2011). “Fuzzy set and cache-based approach for bug triaging.Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering
  • Tamrawi, Ahmed; Nguyen, Tung Thanh; Al-Kofahi, Jafar; Nguyen, Tien N (2011). “Fuzzy set-based automatic bug triaging (NIER track).Proceedings of the 33rd international conference on software engineering
  • Al-Kofahi, Jafar M; Tamrawi, Ahmed; Nguyen, Tung Thanh; Nguyen, Hoan Anh; Nguyen, Tien N (2010). “Fuzzy set approach for automatic tagging in evolving software.2010 IEEE international conference on software maintenance
  • Tamrawi, Ahmed; Kothari, Suraj. “L-SAP: Scalable and Accurate Lock/Unlock Pairing for the Linux Kernel.

Departments

Affiliations

Interests

Loading...