Follow
Cynthia Sturton
Cynthia Sturton
Associate Professor of Computer Science, University of North Carolina at Chapel Hill
Verified email at cs.unc.edu - Homepage
Title
Cited by
Cited by
Year
Defeating UCI: Building stealthy and malicious hardware
C Sturton, M Hicks, D Wagner, ST King
2011 IEEE symposium on security and privacy, 64-77, 2011
1752011
Specs: A lightweight runtime mechanism for protecting software from security-critical processor bugs
M Hicks, C Sturton, ST King, JM Smith
Proceedings of the Twentieth International Conference on Architectural …, 2015
852015
End-to-end automated exploit generation for validating the security of processor designs
R Zhang, C Deutschbein, P Huang, C Sturton
2018 51st Annual IEEE/ACM International Symposium on Microarchitecture …, 2018
642018
Identifying security critical properties for the dynamic verification of a processor
R Zhang, N Stanley, C Griggs, A Chi, C Sturton
ACM SIGARCH Computer Architecture News 45 (1), 541-554, 2017
452017
On voting machine design for verification and testability
C Sturton, S Jha, SA Seshia, D Wagner
Proceedings of the 16th ACM conference on Computer and communications …, 2009
362009
Usability of augmented reality for revealing secret messages to users but not their devices
SJ Andrabi, MK Reiter, C Sturton
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 89-102, 2015
232015
Transys: Leveraging common security properties across hardware designs
R Zhang, C Sturton
2020 IEEE Symposium on Security and Privacy (SP), 1713-1727, 2020
192020
Mining security critical linear temporal logic specifications for processors
C Deutschbein, C Sturton
2018 19th International Workshop on Microprocessor and SOC Test and …, 2018
142018
Isadora: Automated information flow property generation for hardware designs
C Deutschbein, A Meza, F Restuccia, R Kastner, C Sturton
Proceedings of the 5th Workshop on Attacks and Solutions in Hardware …, 2021
122021
On Using Drivers' Eyes to Predict Accident-Causing Drowsiness Levels
A Byrnes, C Sturton
2018 21st International Conference on Intelligent Transportation Systems …, 2018
112018
A recursive strategy for symbolic execution to find exploits in hardware designs
R Zhang, C Sturton
Proceedings of the 2018 ACM SIGPLAN International Workshop on Formal Methods …, 2018
112018
Weight, Weight, Don't Tell Me: Using Scales to Select Ballots for Auditing.
C Sturton, DA Wagner
EVT/WOTE, 2009
112009
A system to verify network behavior of known cryptographic clients
A Chi, RA Cochran, M Nesfield, MK Reiter, C Sturton
14th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2017
92017
Verification with small and short worlds
R Sinha, C Sturton, P Maniatis, SA Seshia, D Wagner
2012 Formal Methods in Computer-Aided Design (FMCAD), 68-77, 2012
92012
Automated analysis of election audit logs
P Baxter, A Edmundson, K Ortiz, AM Quevedo, S Rodrıguez, C Sturton, ...
Proceeding EVT/WOTE'12 Proceedings of the 2012 international conference on …, 2012
92012
FinalFilter: Asserting security properties of a processor at runtime
C Sturton, M Hicks, ST King, JM Smith
IEEE Micro 39 (4), 35-42, 2019
72019
Toward hardware security property generation at scale
C Deutschbein, A Meza, F Restuccia, M Gregoire, R Kastner, C Sturton
IEEE Security & Privacy 20 (3), 43-51, 2022
62022
Evaluating security specification mining for a cisc architecture
C Deutschbein, C Sturton
2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020
62020
Symbolic software model validation
C Sturton, R Sinha, THY Dang, S Jain, M McCoyd, WY Tan, P Maniatis, ...
2013 Eleventh ACM/IEEE International Conference on Formal Methods and Models …, 2013
52013
Isadora: automated information-flow property generation for hardware security verification
C Deutschbein, A Meza, F Restuccia, R Kastner, C Sturton
Journal of Cryptographic Engineering 13 (4), 391-407, 2023
42023
The system can't perform the operation now. Try again later.
Articles 1–20