Cynthia Sturton

About Cynthia Sturton

Cynthia Sturton, With an exceptional h-index of 10 and a recent h-index of 10 (since 2020), a distinguished researcher at University of North Carolina at Chapel Hill, specializes in the field of Computer Security.

His recent articles reflect a diverse array of research interests and contributions to the field:

Isadora: automated information-flow property generation for hardware security verification

SEIF: Augmented Symbolic Execution for Information Flow in Hardware Designs

Sylvia: Countering the Path Explosion Problem in the Symbolic Execution of Hardware Designs

Augmented Symbolic Execution for Information Flow in Hardware Designs

Impact of Emerging Hardware on Security and Privacy

Special Session: CAD for Hardware Security-Promising Directions for Automation of Security Assurance

Countering the Path Explosion Problem in the Symbolic Execution of Hardware Designs

Automating hardware security property generation

Cynthia Sturton Information

University

Position

Assistant Professor of Computer Science

Citations(all)

551

Citations(since 2020)

331

Cited By

321

hIndex(all)

10

hIndex(since 2020)

10

i10Index(all)

12

i10Index(since 2020)

10

Email

University Profile Page

Google Scholar

Cynthia Sturton Skills & Research Interests

Computer Security

Top articles of Cynthia Sturton

Isadora: automated information-flow property generation for hardware security verification

Journal of Cryptographic Engineering

2023/11

SEIF: Augmented Symbolic Execution for Information Flow in Hardware Designs

2023/10/29

Cynthia Sturton
Cynthia Sturton

H-Index: 6

Sylvia: Countering the Path Explosion Problem in the Symbolic Execution of Hardware Designs

2023/10/24

Cynthia Sturton
Cynthia Sturton

H-Index: 6

Augmented Symbolic Execution for Information Flow in Hardware Designs

arXiv preprint arXiv:2307.11884

2023/7/21

Cynthia Sturton
Cynthia Sturton

H-Index: 6

Impact of Emerging Hardware on Security and Privacy

IEEE Security & Privacy

2023/5/26

Special Session: CAD for Hardware Security-Promising Directions for Automation of Security Assurance

2023/4/24

Countering the Path Explosion Problem in the Symbolic Execution of Hardware Designs

arXiv preprint arXiv:2304.05445

2023/4/11

Cynthia Sturton
Cynthia Sturton

H-Index: 6

Automating hardware security property generation

2022/7/10

Information Flow Verification

2022/6/2

Cynthia Sturton
Cynthia Sturton

H-Index: 6

Ryan Kastner
Ryan Kastner

H-Index: 26

Toward hardware security property generation at scale

IEEE Security & Privacy

2022/4/29

End-to-end automated exploit generation for processor security validation

IEEE Design & Test

2021/3/3

Evaluating security specification mining for a cisc architecture

2020/12/7

Cynthia Sturton
Cynthia Sturton

H-Index: 6

Evaluating a Specification for its Support of Mode Awareness using Discrete and Continuous Model Checking

2020/9/20

Alyssa Byrnes
Alyssa Byrnes

H-Index: 3

Cynthia Sturton
Cynthia Sturton

H-Index: 6

Transys: Leveraging common security properties across hardware designs

2020/5/18

Rui Zhang
Rui Zhang

H-Index: 43

Cynthia Sturton
Cynthia Sturton

H-Index: 6

See List of Professors in Cynthia Sturton University(University of North Carolina at Chapel Hill)