Follow
Cynthia Sturton
Cynthia Sturton
Associate Professor of Computer Science, University of North Carolina at Chapel Hill
Verified email at cs.unc.edu - Homepage
Title
Cited by
Cited by
Year
Defeating UCI: Building stealthy and malicious hardware
C Sturton, M Hicks, D Wagner, ST King
2011 IEEE symposium on security and privacy, 64-77, 2011
1782011
Specs: A lightweight runtime mechanism for protecting software from security-critical processor bugs
M Hicks, C Sturton, ST King, JM Smith
Proceedings of the Twentieth International Conference on Architectural …, 2015
902015
End-to-end automated exploit generation for validating the security of processor designs
R Zhang, C Deutschbein, P Huang, C Sturton
2018 51st Annual IEEE/ACM International Symposium on Microarchitecture …, 2018
722018
Identifying security critical properties for the dynamic verification of a processor
R Zhang, N Stanley, C Griggs, A Chi, C Sturton
ACM SIGARCH Computer Architecture News 45 (1), 541-554, 2017
512017
On voting machine design for verification and testability
C Sturton, S Jha, SA Seshia, D Wagner
Proceedings of the 16th ACM conference on Computer and communications …, 2009
362009
Transys: Leveraging common security properties across hardware designs
R Zhang, C Sturton
2020 IEEE Symposium on Security and Privacy (SP), 1713-1727, 2020
242020
Usability of augmented reality for revealing secret messages to users but not their devices
SJ Andrabi, MK Reiter, C Sturton
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 89-102, 2015
242015
Isadora: Automated information flow property generation for hardware designs
C Deutschbein, A Meza, F Restuccia, R Kastner, C Sturton
Proceedings of the 5th Workshop on Attacks and Solutions in Hardware …, 2021
182021
Mining security critical linear temporal logic specifications for processors
C Deutschbein, C Sturton
2018 19th International Workshop on Microprocessor and SOC Test and …, 2018
152018
A recursive strategy for symbolic execution to find exploits in hardware designs
R Zhang, C Sturton
Proceedings of the 2018 ACM SIGPLAN International Workshop on Formal Methods …, 2018
112018
Weight, Weight, Don't Tell Me: Using Scales to Select Ballots for Auditing.
C Sturton, DA Wagner
EVT/WOTE, 2009
112009
On Using Drivers' Eyes to Predict Accident-Causing Drowsiness Levels
A Byrnes, C Sturton
2018 21st International Conference on Intelligent Transportation Systems …, 2018
102018
Toward hardware security property generation at scale
C Deutschbein, A Meza, F Restuccia, M Gregoire, R Kastner, C Sturton
IEEE Security & Privacy 20 (3), 43-51, 2022
92022
FinalFilter: Asserting security properties of a processor at runtime
C Sturton, M Hicks, ST King, JM Smith
IEEE Micro 39 (4), 35-42, 2019
92019
A system to verify network behavior of known cryptographic clients
A Chi, RA Cochran, M Nesfield, MK Reiter, C Sturton
14th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2017
92017
Verification with small and short worlds
R Sinha, C Sturton, P Maniatis, SA Seshia, D Wagner
2012 Formal Methods in Computer-Aided Design (FMCAD), 68-77, 2012
92012
Automated analysis of election audit logs
P Baxter, A Edmundson, K Ortiz, AM Quevedo, S Rodrıguez, C Sturton, ...
Proceeding EVT/WOTE'12 Proceedings of the 2012 international conference on …, 2012
92012
Automating hardware security property generation
R Kastner, F Restuccia, A Meza, S Ray, J Fung, C Sturton
Proceedings of the 59th ACM/IEEE Design Automation Conference, 1384-1387, 2022
72022
Evaluating security specification mining for a cisc architecture
C Deutschbein, C Sturton
2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020
72020
Isadora: automated information-flow property generation for hardware security verification
C Deutschbein, A Meza, F Restuccia, R Kastner, C Sturton
Journal of Cryptographic Engineering 13 (4), 391-407, 2023
52023
The system can't perform the operation now. Try again later.
Articles 1–20