Cynthia Sturton
Cynthia Sturton
Assistant Professor of Computer Science, University of North Carolina at Chapel Hill
Verified email at - Homepage
Cited by
Cited by
Defeating UCI: Building stealthy and malicious hardware
C Sturton, M Hicks, D Wagner, ST King
2011 IEEE Symposium on Security and Privacy, 64-77, 2011
Specs: A lightweight runtime mechanism for protecting software from security-critical processor bugs
M Hicks, C Sturton, ST King, JM Smith
Proceedings of the Twentieth International Conference on Architectural …, 2015
On voting machine design for verification and testability
C Sturton, S Jha, SA Seshia, D Wagner
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Usability of augmented reality for revealing secret messages to users but not their devices
SJ Andrabi, MK Reiter, C Sturton
Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 89-102, 2015
Identifying security critical properties for the dynamic verification of a processor
R Zhang, N Stanley, C Griggs, A Chi, C Sturton
ACM SIGARCH Computer Architecture News 45 (1), 541-554, 2017
Weight, Weight, Don't Tell Me: Using Scales to Select Ballots for Auditing.
C Sturton, DA Wagner
EVT/WOTE, 2009
Automated analysis of election audit logs
P Baxter, A Edmundson, K Ortiz, AM Quevedo, S Rodrıguez, C Sturton, ...
Proceeding EVT/WOTE'12 Proceedings of the 2012 international conference on …, 2012
Verification with small and short worlds
R Sinha, C Sturton, P Maniatis, SA Seshia, D Wagner
2012 Formal Methods in Computer-Aided Design (FMCAD), 68-77, 2012
End-to-end automated exploit generation for validating the security of processor designs
R Zhang, C Deutschbein, P Huang, C Sturton
2018 51st Annual IEEE/ACM International Symposium on Microarchitecture …, 2018
Symbolic software model validation
C Sturton, R Sinha, THY Dang, S Jain, M McCoyd, WY Tan, P Maniatis, ...
2013 Eleventh ACM/IEEE International Conference on Formal Methods and Models …, 2013
A system to verify network behavior of known cryptographic clients
A Chi, RA Cochran, M Nesfield, MK Reiter, C Sturton
14th {USENIX} Symposium on Networked Systems Design and Implementation …, 2017
Server-side verification of client behavior in cryptographic protocols
A Chi, R Cochran, M Nesfield, MK Reiter, C Sturton
arXiv preprint arXiv:1603.04085, 2016
On Using Drivers' Eyes to Predict Accident-Causing Drowsiness Levels
A Byrnes, C Sturton
2018 21st International Conference on Intelligent Transportation Systems …, 2018
Mining security critical linear temporal logic specifications for processors
C Deutschbein, C Sturton
2018 19th International Workshop on Microprocessor and SOC Test and …, 2018
Model checking to find vulnerabilities in an instruction set architecture
C Bradfield, C Sturton
2016 IEEE International Symposium on Hardware Oriented Security and Trust …, 2016
A recursive strategy for symbolic execution to find exploits in hardware designs
R Zhang, C Sturton
Proceedings of the 2018 ACM SIGPLAN International Workshop on Formal Methods …, 2018
FinalFilter: Asserting Security Properties of a Processor at Runtime
C Sturton, M Hicks, ST King, JM Smith
IEEE Micro 39 (4), 35-42, 2019
Hardware Is the New Software: Finding Exploitable Bugs in Hardware Designs
C Sturton
MAGICCARPET: Verified Detection and Recovery for Hardware-based Exploits
C Sturton, M Hicks, ST King, JM Smith
Secure Virtualization with Formal Methods
C Sturton
UC Berkeley, 2013
The system can't perform the operation now. Try again later.
Articles 1–20