Cynthia Sturton
University of North Carolina at Chapel Hill
H-index: 10
North America-United States
Top articles of Cynthia Sturton
Isadora: automated information-flow property generation for hardware security verification
Journal of Cryptographic Engineering
2023/11
SEIF: Augmented Symbolic Execution for Information Flow in Hardware Designs
2023/10/29
Cynthia Sturton
H-Index: 6
Sylvia: Countering the Path Explosion Problem in the Symbolic Execution of Hardware Designs
2023/10/24
Cynthia Sturton
H-Index: 6
Augmented Symbolic Execution for Information Flow in Hardware Designs
arXiv preprint arXiv:2307.11884
2023/7/21
Cynthia Sturton
H-Index: 6
Impact of Emerging Hardware on Security and Privacy
IEEE Security & Privacy
2023/5/26
Trent Jaeger
H-Index: 28
Brent Byunghoon Kang
H-Index: 15
Nele Mentens
H-Index: 17
Cynthia Sturton
H-Index: 6
Special Session: CAD for Hardware Security-Promising Directions for Automation of Security Assurance
2023/4/24
Countering the Path Explosion Problem in the Symbolic Execution of Hardware Designs
arXiv preprint arXiv:2304.05445
2023/4/11
Cynthia Sturton
H-Index: 6
Automating hardware security property generation
2022/7/10
Also in This Issue
2019/11
Toward hardware security property generation at scale
IEEE Security & Privacy
2022/4/29
End-to-end automated exploit generation for processor security validation
IEEE Design & Test
2021/3/3
Evaluating security specification mining for a cisc architecture
2020/12/7
Cynthia Sturton
H-Index: 6
Evaluating a Specification for its Support of Mode Awareness using Discrete and Continuous Model Checking
2020/9/20
Alyssa Byrnes
H-Index: 3
Cynthia Sturton
H-Index: 6
Transys: Leveraging common security properties across hardware designs
2020/5/18
Rui Zhang
H-Index: 43
Cynthia Sturton
H-Index: 6