Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Cynthia Sturton"'
Autor:
Calvin Deutschbein, Andres Meza, Francesco Restuccia, Matthew Gregoire, Ryan Kastner, Cynthia Sturton
Publikováno v:
IEEE Security & Privacy. 20:43-51
Publikováno v:
IEEE Security & Privacy. 21:6-7
Publikováno v:
Journal of Cryptographic Engineering.
Publikováno v:
Proceedings of the 59th ACM/IEEE Design Automation Conference.
Publikováno v:
IEEE Design & Test. 38:22-30
Editor’s notes: This article presents an end-to-end tool that, starting from a processor and a set of security-critical invariants, automatically generates exploits to help designers find security threats. — Rosario Cammarota, Intel Labs — Fran
Autor:
Cynthia Sturton, Ryan Kastner
Publikováno v:
Handbook of Computer Architecture ISBN: 9789811564017
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::97179bac09f009a98cbeefa70ee2c7ff
https://doi.org/10.1007/978-981-15-6401-7_42-1
https://doi.org/10.1007/978-981-15-6401-7_42-1
Publikováno v:
IEEE Micro. 39:35-42
In an ideal world, it would be possible to build a provably correct and secure processor. However, the complexity of today's processors puts this ideal out of reach. The complete verification of a modern processor remains intractable. Statically veri
Publikováno v:
ASHES@CCS
Isadora is a methodology for creating information flow specifications of hardware designs. The methodology combines information flow tracking and specification mining to produce a set of information flow properties that are suitable for use during th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f86a0125a4d8c62e30a22123eadee57e
http://arxiv.org/abs/2106.07449
http://arxiv.org/abs/2106.07449
Autor:
Calvin Deutschbein, Cynthia Sturton
Publikováno v:
HOST
Security specification mining is a relatively new line of research that aims to develop a set of security properties for use during the design validation phase of the hardware life-cycle. Prior work in this field has targeted open-source RISC archite
Autor:
Cynthia Sturton, Alyssa Byrnes
Publikováno v:
ITSC
In situations where humans and computers cooperate, mode confusion on the part of the human can be dangerous. We present a methodology to evaluate a semi-autonomous system for its support of mode awareness. The methodology uses discrete-state model c