Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Tidjani Négadi
Ki H Chon
Lijian Wu
Kenta Torihara
Jongmoon Park
Jhonathan Pinzon
Giovanni Venturelli
Chen Ma
Jing-Sheng Wong
Radu Timofte
Home
/
Author
/
CYNTHIA STURTON
Author Info
Open Visualization
Name
Affiliation
Papers
CYNTHIA STURTON
Univ. of California, Berkeley, CA, USA|c|
17
Collaborators
Citations
PageRank
38
85
8.56
Referers
Referees
References
278
367
149
Search Limit
100
367
Publications (17 rows)
Collaborators (38 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Automating hardware security property generation: invited
0
0.34
2022
Toward Hardware Security Property Generation at Scale
0
0.34
2022
Isadora: Automated Information Flow Property Generation for Hardware Designs
1
0.37
2021
Evaluating Security Specification Mining for a CISC Architecture
0
0.34
2020
Transys: Leveraging Common Security Properties Across Hardware Designs
0
0.34
2020
FinalFilter: Asserting Security Properties of a Processor at Runtime
0
0.34
2019
End-to-End Automated Exploit Generation for Validating the Security of Processor Designs.
0
0.34
2018
Mining Security Critical Linear Temporal Logic Specifications for Processors
0
0.34
2018
Identifying Security Critical Properties for the Dynamic Verification of a Processor.
7
0.64
2017
A System To Verify Network Behavior Of Known Cryptographic Clients
2
0.36
2017
Server-side verification of client behavior in cryptographic protocols.
1
0.36
2016
Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices
2
0.35
2015
SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs
13
0.63
2015
Automated analysis of election audit logs
2
0.67
2012
Defeating UCI: Building Stealthy and Malicious Hardware
43
1.75
2011
On voting machine design for verification and testability
11
0.57
2009
Weight, weight, don't tell me: using scales to select ballots for auditing
3
0.49
2009
1