Cynthia Sturton
Cynthia Sturton
Assistant Professor of Computer Science, University of North Carolina at Chapel Hill
Verified email at cs.unc.edu - Homepage
TitleCited byYear
Defeating UCI: Building stealthy and malicious hardware
C Sturton, M Hicks, D Wagner, ST King
2011 IEEE Symposium on Security and Privacy, 64-77, 2011
1012011
Specs: A lightweight runtime mechanism for protecting software from security-critical processor bugs
M Hicks, C Sturton, ST King, JM Smith
ACM SIGARCH Computer Architecture News 43 (1), 517-529, 2015
352015
On voting machine design for verification and testability
C Sturton, S Jha, SA Seshia, D Wagner
Proceedings of the 16th ACM conference on Computer and communications …, 2009
322009
Identifying security critical properties for the dynamic verification of a processor
R Zhang, N Stanley, C Griggs, A Chi, C Sturton
ACM SIGARCH Computer Architecture News 45 (1), 541-554, 2017
112017
Usability of augmented reality for revealing secret messages to users but not their devices
SJ Andrabi, MK Reiter, C Sturton
Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 89-102, 2015
112015
Weight, Weight, Don't Tell Me: Using Scales to Select Ballots for Auditing.
C Sturton, DA Wagner
EVT/WOTE, 2009
102009
Automated analysis of election audit logs
P Baxter, A Edmundson, K Ortiz, AM Quevedo, S Rodrıguez, C Sturton, ...
Proceeding EVT/WOTE'12 Proceedings of the 2012 international conference on …, 2012
92012
Verification with small and short worlds
R Sinha, C Sturton, P Maniatis, SA Seshia, D Wagner
2012 Formal Methods in Computer-Aided Design (FMCAD), 68-77, 2012
62012
Symbolic software model validation
C Sturton, R Sinha, THY Dang, S Jain, M McCoyd, WY Tan, P Maniatis, ...
2013 Eleventh ACM/IEEE International Conference on Formal Methods and Models …, 2013
52013
Server-side verification of client behavior in cryptographic protocols
A Chi, R Cochran, M Nesfield, MK Reiter, C Sturton
arXiv preprint arXiv:1603.04085, 2016
42016
End-to-end automated exploit generation for validating the security of processor designs
R Zhang, C Deutschbein, P Huang, C Sturton
2018 51st Annual IEEE/ACM International Symposium on Microarchitecture …, 2018
32018
A system to verify network behavior of known cryptographic clients
A Chi, RA Cochran, M Nesfield, MK Reiter, C Sturton
14th {USENIX} Symposium on Networked Systems Design and Implementation …, 2017
32017
Mining Security Critical Linear Temporal Logic Specifications for Processors
C Deutschbein, C Sturton
2018 19th International Workshop on Microprocessor and SOC Test and …, 2018
12018
A recursive strategy for symbolic execution to find exploits in hardware designs
R Zhang, C Sturton
Proceedings of the 2018 ACM SIGPLAN International Workshop on Formal Methods …, 2018
12018
Model checking to find vulnerabilities in an instruction set architecture
C Bradfield, C Sturton
2016 IEEE International Symposium on Hardware Oriented Security and Trust …, 2016
12016
FinalFilter: Asserting Security Properties of a Processor at Runtime
C Sturton, M Hicks, ST King, JM Smith
IEEE Micro 39 (4), 35-42, 2019
2019
Hardware Is the New Software: Finding Exploitable Bugs in Hardware Designs
C Sturton
2019
On Using Drivers' Eyes to Predict Accident-Causing Drowsiness Levels
A Byrnes, C Sturton
2018 21st International Conference on Intelligent Transportation Systems …, 2018
2018
MAGICCARPET: Verified Detection and Recovery for Hardware-based Exploits
C Sturton, M Hicks, ST King, JM Smith
2015
Secure Virtualization with Formal Methods
C Sturton
UC Berkeley, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–20