• HOME
  • PUBLICATIONS
  • STUDENTS
  • COURSES
  • NEWS

  • 2019
    • Cynthia Sturton is the keynote speaker at Top Picks in Hardware and Embedded Security, co-located wtih ICCAD 2019.
    • Our paper, End-to-End Automated Exploit Generation for Diagnosing Processor Designs, is accepted for presentation at Top Picks in Hardware and Embedded Security
    • Our paper, Transys: Leveraging Common Security Properties Across Hardware Designs, is accepted for publication at the 2020 IEEE Symposium on Security and Privacy (S&P).
    • Cynthia Sturton, with Matt Hicks, Sam King, and Jonathan M. Smith, authors an article, FinalFilter: Asserting Security Properties of a Processor at Runtime for IEEE Micro magazine.
    • Cynthia Sturton presents at GREPSEC IV.
    • Cynthia Sturton presents at the Qualcomm Product Security Summit.
    • Cynthia Sturton presents at the FICS Institute Distinguished Speaker Series.
    • Cynthia Sturton is featured in the Carolina Arts and Sciences magazine.
    • Cynthia Sturton presents the group's research on security validation for hardware designs at the Berkeley Security Seminar.
    • Duo Security writes about our research: Better Hardware Security Through Automation.
    • Cynthia Sturton presents Hardware is the New Software: Finding Exploitable Bugs in Hardware Designs at the 2019 USENIX Enigma Conference.
  • 2018
    • Our paper, Mining Security Critical Linear Temporal Logic Specifications for Processors, is accepted for publication at the 2019 International Workshop on Microprocessor and SoC Test, Security, and Verification (MTV).
    • Cynthia Sturton, along with Mike Reiter, receives funding from Intel to develop the tools to recognize and assess violations of non-interference in processor designs.
    • Our paper End-to-End Automated Exploit Generation for Diagnosing Processor Designs is one of four papers nominated for Best Paper award at MICRO'18.
    • Cynthia Sturton receives funding from the National Science Foundation (NSF) to develop the use of symbolic execution of hardware designs to find and fix exploitable bugs.
    • Our paper, End-to-End Automated Exploit Generation for Diagnosing Processor Designs, is accepted for publication at the 2018 IEEE/ACM International Symposium on Microarchitecture (MICRO).
    • Our paper, Using a Driver's Eye Data to Predict Accident-Causing Drowsiness Levels, is accepted for publication at the 2018 IEEE International Conference on Intelligent Transportation Systems (ITSC).
    • Cynthia Sturton is a panelist for Challenges & Opportunities of Secure & Resilient Processor Design: Resist any Meltdown of Trust at the 2018 Design Automation Conference (DAC).
    • Rui Zhang presents A Recursive Strategy for Symbolic Execution to Find Exploits in Hardware Designs at the 2018 ACM SIGPLAN International Workshop on Formal Methods and Security (FMS), co-located with PLDI.
    • Cynthia Sturton is serving on the program committee for the 2018 USENIX Security Symposium.
    • Cynthia Sturton is awarded the Computer Science Student Association Teaching Award for Excellence in Teaching from the Computer Science department at UNC.
    • Cynthia Sturton is serving on the program committee for the 2018 International Conference on the Principles of Security and Trust (POST).
    • Rui Zhang presents our work on automatically identifying the security critical properties of a processor at the Duke Triangle Machine Learning Day.
    • Cynthia Sturton is serving as the Program Committee Chair for the technical subcommittee on hardware security at the 2018 Design Automation Conference (DAC).
    • Cynthia Sturton is serving on the program committee for the 2018 IEEE Symposium on Security and Privacy.
  • 2017
    • Rui Zhang presents our work on automatically identifying the security critical properties of a processor at the 2018 High Confidence Software and Systems Conference (HCSS).
    • Rui Zhang presents Identifying Security Critical Properties for the Dynamic Verification of a Processor at the 2017 ACM Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS).
    • Cynthia Sturton is serving as the Program Committee Chair for the technical subcommittee on hardware security at the 2017 Design Automation Conference (DAC).
    • Cynthia Sturton participates in the 2017 NSF Workshop on Foundations of Secure and Trusted Hardware (FOSTER).
    • Andrew Chi presents A System to Verify Network Behavior of Known Cryptographic Clients at the 2017 USENIX Symposium on Networked Systems Design and Implementation (NSDI).
  • 2016
    • Cynthia Sturton receives funding from the National Science Foundation (NSF) to develop the science and algorithms to mine security critical properties from a CPU design.
    • We are participating in the multi-institution project VeHICaL: Verified Human Interfaces, Control, and Learning for Semi-Autonomous Systems. The project is funded by a Frontier Award from the National Science Foundation (NSF).
    • Cynthia Sturton is serving on the program committee for the 2016 International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
    • Our paper Model Checking to Find Vulnerabilities in an Instruction Set Architecture is accepted for publication as a short paper at the 2016 IEEE Symposium on Hardware Oriented Security and Trust (HOST).
    • Cynthia Sturton is serving on the program committee for the 2016 USENIX Security Symposium.
    • Cynthia Sturton is awarded a Google Faculty Research Award for her proposal Security Vulnerabilities in Instruction Set Architectures.
  • 2015
    • Sarah Andrabi presents Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices at the 2015 Symposium on Usable Privacy and Security (SOUPS).
    • Matthew Hicks presents SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security Critical Processor Bugs at the 2015 ACM Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS).
    • Cynthia Sturton participates in the 2015 NSF Workshop on Formal Methods for Information Security.
    • Cynthia Sturton is serving on the program committee for the 2015 USENIX Security Symposium.
    • Cynthia Sturton is serving on the program committee for the 2015 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
    • Cynthia Sturton is awarded the Computer and Information Science and Engineering Research Initiation Initiative (CRII) award from the National Science Foundation (NSF).
  • 2014
    • Cynthia Sturton is awarded the Junior Faculty Development Award from the University of North Carolina at Chapel Hill.
    • Cynthia Sturton participates in the 2014 Heidelberg Laureate Forum (HLF).
    • Cynthia Sturton is serving on the program committee for the 2014 Annual Computer Security Applications Conference (ACSAC).
    • Cynthia Sturton participates in the 2014 NSF CyberSpace 2025 Workshop (Cyber2025).
    • Cynthia Sturton is serving on the program committee for the 2014 USENIX Security Symposium.
  • 2013
    • Cynthia Sturton is serving on the program committee for the 2013 USENIX Security Symposium.