Cynthia Sturton
Orcid: 0000-0003-3930-7440
According to our database1,
Cynthia Sturton
authored at least 33 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
1
4
1
2
1
1
3
1
1
3
3
2
1
2
1
2
1
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
2023
Isadora: automated information-flow property generation for hardware security verification.
J. Cryptogr. Eng., November, 2023
CoRR, 2023
Special Session: CAD for Hardware Security - Promising Directions for Automation of Security Assurance.
Proceedings of the 41st IEEE VLSI Test Symposium, 2023
Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, 2023
Sylvia: Countering the Path Explosion Problem in the Symbolic Execution of Hardware Designs.
Proceedings of the Formal Methods in Computer-Aided Design, 2023
2022
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022
2021
IEEE Des. Test, 2021
CoRR, 2021
Proceedings of the ASHES@CCS 2021: Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, 2021
2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Evaluating a Specification for its Support of Mode Awareness using Discrete and Continuous Model Checking.
Proceedings of the 23rd IEEE International Conference on Intelligent Transportation Systems, 2020
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020
2019
IEEE Micro, 2019
2018
Proceedings of the 19th International Workshop on Microprocessor and SOC Test and Verification, 2018
End-to-End Automated Exploit Generation for Validating the Security of Processor Designs.
Proceedings of the 51st Annual IEEE/ACM International Symposium on Microarchitecture, 2018
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018
2017
Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, 2017
Identifying Security Critical Properties for the Dynamic Verification of a Processor.
Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems, 2017
2016
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016
2015
Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015
2013
Proceedings of the 11th ACM/IEEE International Conference on Formal Methods and Models for Codesign, 2013
2012
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012
Proceedings of the Formal Methods in Computer-Aided Design, 2012
2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
2009
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009