Matthew Hicks

Orcid: 0000-0002-3639-4342

According to our database1, Matthew Hicks authored at least 43 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
RIPencapsulation: Defeating IP Encapsulation on TI MSP Devices.
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024

A Difference World: High-performance, NVM-invariant, Software-only Intermittent Computation.
Proceedings of the 2024 USENIX Annual Technical Conference, 2024

UnTrustZone: Systematic Accelerated Aging to Expose On-chip Secrets.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Energy-Adaptive Buffering for Efficient, Responsive, and Persistent Batteryless Systems.
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024

SRAM Imprinting for System Protection and Differentiation.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
No Linux, No Problem: Fast and Correct Windows Binary Fuzzing via Target-embedded Snapshotting.
Proceedings of the 32nd USENIX Security Symposium, 2023

Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023

RF Energy Harvesting in Minimization of Age of Information with Updating Erasures.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2023

Hitchhiker's Guide to Secure Checkpointing on Energy-Harvesting Systems.
Proceedings of the 11th International Workshop on Energy Harvesting & Energy-Neutral Sensing Systems, 2023

T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Fuzzing Hardware Like Software.
Proceedings of the 31st USENIX Security Symposium, 2022

Self-Reinforcing Memoization for Cryptography Calculations in Secure Memory Systems.
Proceedings of the 55th IEEE/ACM International Symposium on Microarchitecture, 2022

Invisible bits: hiding secret messages in SRAM's analog domain.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022

SRAM has no chill: exploiting power domain separation to steal on-chip secrets.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022

One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing.
Proceedings of the 30th USENIX Security Symposium, 2021

Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Failure Sentinels: Ubiquitous Just-in-time Intermittent Computation via Low-cost Hardware Support for Voltage Monitoring.
Proceedings of the 48th ACM/IEEE Annual International Symposium on Computer Architecture, 2021

Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing with Coverage-preserving Coverage-guided Tracing.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

RingRAM: A Unified Hardware SecurityPrimitive for IoT Devices that Gets Better with Age.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Silicon Dating.
CoRR, 2020

ICAS: an Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Forget Failure: Exploiting SRAM Data Remanence for Low-overhead Intermittent Computation.
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020

2019
FinalFilter: Asserting Security Properties of a Processor at Runtime.
IEEE Micro, 2019

Defensive Routing: a Preventive Layout-Level Defense Against Untrusted Foundries.
CoRR, 2019

An Extensible Framework for Quantifying the Coverage of Defenses Against Untrusted Foundries.
CoRR, 2019

Full-Speed Fuzzing: Reducing Fuzzing Overhead through Coverage-Guided Tracing.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2017
Exploiting the analog properties of digital circuits for malicious hardware.
Commun. ACM, 2017

Reap What You Store: Side-channel Resilient Computing Through Energy Harvesting.
Proceedings of the Fifth ACM International Workshop on Energy Harvesting and Energy-Neutral Sensing Systems, 2017

SNIFFER: A high-accuracy malware detector for enterprise-based systems.
Proceedings of the IEEE 2nd International Verification and Security Workshop, 2017

Clank: Architectural Support for Intermittent Computation.
Proceedings of the 44th Annual International Symposium on Computer Architecture, 2017

2016
A2: Analog Malicious Hardware.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Intermittent Computation without Hardware Support or Programmer Intervention.
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016

ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks.
Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, 2016

2015
Determining conserved metabolic biomarkers from a million database queries.
Bioinform., 2015

Probable cause: the deanonymizing effects of approximate DRAM.
Proceedings of the 42nd Annual International Symposium on Computer Architecture, 2015

SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015

2013
Practical systems for overcoming processor imperfections
PhD thesis, 2013

2011
Defeating UCI: Building Stealthy and Malicious Hardware.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Reducing Maternal Mortality: An Ultrasound System for Village Midwives.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2011

2010
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically.
login Usenix Mag., 2010

Portable antenatal ultrasound platform for village midwives.
Proceedings of the First ACM Annual Symposium on Computing for Development, 2010

2009
Capo: a software-hardware interface for practical deterministic multiprocessor replay.
Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems, 2009


  Loading...