Cynthia Sturton
Cynthia Sturton
Assistant Professor of Computer Science, University of North Carolina at Chapel Hill
Verified email at - Homepage
Cited by
Cited by
Defeating UCI: Building stealthy and malicious hardware
C Sturton, M Hicks, D Wagner, ST King
2011 IEEE symposium on security and privacy, 64-77, 2011
Specs: A lightweight runtime mechanism for protecting software from security-critical processor bugs
M Hicks, C Sturton, ST King, JM Smith
Proceedings of the Twentieth International Conference on Architectural …, 2015
On voting machine design for verification and testability
C Sturton, S Jha, SA Seshia, D Wagner
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Identifying security critical properties for the dynamic verification of a processor
R Zhang, N Stanley, C Griggs, A Chi, C Sturton
ACM SIGARCH Computer Architecture News 45 (1), 541-554, 2017
End-to-end automated exploit generation for validating the security of processor designs
R Zhang, C Deutschbein, P Huang, C Sturton
2018 51st Annual IEEE/ACM International Symposium on Microarchitecture …, 2018
Usability of augmented reality for revealing secret messages to users but not their devices
SJ Andrabi, MK Reiter, C Sturton
Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 89-102, 2015
Weight, Weight, Don't Tell Me: Using Scales to Select Ballots for Auditing.
C Sturton, DA Wagner
EVT/WOTE, 2009
Automated analysis of election audit logs
P Baxter, A Edmundson, K Ortiz, AM Quevedo, S Rodrıguez, C Sturton, ...
Proceeding EVT/WOTE'12 Proceedings of the 2012 international conference on …, 2012
Transys: Leveraging common security properties across hardware designs
R Zhang, C Sturton
2020 IEEE Symposium on Security and Privacy (SP), 1713-1727, 2020
Mining security critical linear temporal logic specifications for processors
C Deutschbein, C Sturton
2018 19th International Workshop on Microprocessor and SOC Test and …, 2018
A recursive strategy for symbolic execution to find exploits in hardware designs
R Zhang, C Sturton
Proceedings of the 2018 ACM SIGPLAN International Workshop on Formal Methods …, 2018
Verification with small and short worlds
R Sinha, C Sturton, P Maniatis, SA Seshia, D Wagner
2012 Formal Methods in Computer-Aided Design (FMCAD), 68-77, 2012
A system to verify network behavior of known cryptographic clients
A Chi, RA Cochran, M Nesfield, MK Reiter, C Sturton
14th {USENIX} Symposium on Networked Systems Design and Implementation …, 2017
On Using Drivers' Eyes to Predict Accident-Causing Drowsiness Levels
A Byrnes, C Sturton
2018 21st International Conference on Intelligent Transportation Systems …, 2018
Symbolic software model validation
C Sturton, R Sinha, THY Dang, S Jain, M McCoyd, WY Tan, P Maniatis, ...
2013 Eleventh ACM/IEEE International Conference on Formal Methods and Models …, 2013
Evaluating Security Specification Mining for a CISC Architecture
C Deutschbein, C Sturton
2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020
Server-side verification of client behavior in cryptographic protocols
A Chi, R Cochran, M Nesfield, MK Reiter, C Sturton
arXiv preprint arXiv:1603.04085, 2016
FinalFilter: Asserting security properties of a processor at runtime
C Sturton, M Hicks, ST King, JM Smith
IEEE Micro 39 (4), 35-42, 2019
Model checking to find vulnerabilities in an instruction set architecture
C Bradfield, C Sturton
2016 IEEE International Symposium on Hardware Oriented Security and Trust …, 2016
A Methodology For Creating Information Flow Specifications of Hardware Designs
C Deutschbein, A Meza, F Restuccia, R Kastner, C Sturton
arXiv preprint arXiv:2106.07449, 2021
The system can't perform the operation now. Try again later.
Articles 1–20