- 2019
- Cynthia Sturton is the keynote speaker at Top Picks in Hardware and
Embedded Security, co-located wtih ICCAD 2019.
- Our paper, End-to-End Automated Exploit
Generation for Diagnosing Processor Designs, is accepted for
presentation at Top Picks in Hardware and Embedded Security
- Our paper, Transys: Leveraging Common Security Properties Across
Hardware Designs, is accepted for publication at the 2020 IEEE Symposium on Security and Privacy (S&P).
-
- Cynthia Sturton, with Matt Hicks, Sam King, and Jonathan
M. Smith, authors an article, FinalFilter: Asserting Security Properties of a Processor at Runtime for IEEE Micro magazine.
- Cynthia Sturton presents at GREPSEC IV.
- Cynthia Sturton presents at the Qualcomm Product Security Summit.
- Cynthia Sturton presents at the FICS Institute Distinguished Speaker Series.
- Cynthia Sturton is
featured in the Carolina Arts and Sciences magazine.
- Cynthia Sturton presents the group's research on security validation for
hardware designs at the Berkeley Security Seminar.
- Duo Security writes about our research: Better Hardware Security Through Automation.
- Cynthia Sturton presents Hardware is the New Software: Finding
Exploitable Bugs in Hardware Designs at the 2019 USENIX Enigma Conference.
- 2018
- Our paper, Mining Security Critical Linear
Temporal Logic Specifications for Processors, is accepted for
publication at the 2019 International Workshop on Microprocessor and SoC
Test, Security, and Verification (MTV).
- Cynthia Sturton, along with Mike Reiter, receives funding from Intel to develop the tools to
recognize and assess violations of non-interference in processor designs.
- Our paper End-to-End Automated Exploit Generation for Diagnosing
Processor Designs is one of four papers nominated for Best Paper award at
MICRO'18.
- Cynthia Sturton receives funding from the National Science Foundation
(NSF) to develop the use of symbolic execution of hardware designs to find and
fix exploitable bugs.
- Our paper, End-to-End Automated Exploit
Generation for Diagnosing Processor Designs, is accepted for publication
at the 2018 IEEE/ACM International Symposium on Microarchitecture (MICRO).
- Our paper, Using a Driver's Eye Data to
Predict Accident-Causing Drowsiness Levels, is accepted for publication
at the 2018 IEEE International Conference on Intelligent Transportation Systems
(ITSC).
- Cynthia Sturton is a panelist for Challenges &
Opportunities of Secure & Resilient Processor Design: Resist any Meltdown
of Trust at the 2018 Design Automation Conference
(DAC).
- Rui Zhang presents A Recursive Strategy for
Symbolic Execution to Find Exploits in Hardware Designs at the 2018 ACM
SIGPLAN International Workshop on Formal Methods and Security (FMS),
co-located with PLDI.
- Cynthia Sturton is serving on the program committee for the 2018 USENIX Security Symposium.
- Cynthia Sturton is awarded the Computer Science Student Association Teaching
Award for Excellence in Teaching from the Computer Science
department at UNC.
- Cynthia Sturton is serving on the program committee for the 2018 International Conference on the Principles of Security and Trust (POST).
- Rui Zhang presents our work on automatically identifying the security
critical properties of a processor at the Duke
Triangle Machine Learning Day.
- Cynthia Sturton is serving as the Program Committee Chair for the technical
subcommittee on hardware security at the 2018 Design Automation Conference (DAC).
- Cynthia Sturton is serving on the program committee for the 2018 IEEE Symposium on
Security and Privacy.
- 2017
- Rui Zhang presents our work on automatically identifying the security
critical properties of a processor at the 2018 High Confidence Software
and Systems Conference (HCSS).
- Rui Zhang presents Identifying Security Critical
Properties for the Dynamic Verification of a Processor at the 2017 ACM
Conference on Architectural Support for Programming Languages and
Operating Systems (ASPLOS).
- Cynthia Sturton is serving as the Program Committee Chair for the technical
subcommittee on hardware security at the 2017 Design Automation Conference (DAC).
- Cynthia Sturton participates in the 2017 NSF Workshop on Foundations of
Secure and Trusted Hardware (FOSTER).
- Andrew Chi presents A System to Verify Network
Behavior of Known Cryptographic Clients at the 2017 USENIX Symposium on
Networked Systems Design and Implementation (NSDI).
- 2016
- Cynthia Sturton receives funding from the National Science Foundation (NSF) to develop
the science and algorithms to mine security critical properties from a CPU
design.
- We are participating in the multi-institution project VeHICaL: Verified
Human Interfaces, Control, and Learning for Semi-Autonomous Systems. The
project is funded by a Frontier Award from the National Science Foundation (NSF).
- Cynthia Sturton is serving on the program committee for the 2016 International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
- Our paper Model Checking to Find Vulnerabilities
in an Instruction Set Architecture is accepted for publication as a
short paper at the 2016 IEEE Symposium on Hardware Oriented Security and
Trust (HOST).
- Cynthia Sturton is serving on the program committee for the 2016 USENIX
Security Symposium.
- Cynthia Sturton is awarded a Google Faculty Research Award for her
proposal Security Vulnerabilities in Instruction Set Architectures.
- 2015
- 2014
- Cynthia Sturton is awarded the Junior Faculty Development Award from the
University of North Carolina at Chapel Hill.
- Cynthia Sturton participates in the 2014 Heidelberg Laureate Forum (HLF).
- Cynthia Sturton is serving on the program committee for the 2014 Annual
Computer Security Applications Conference (ACSAC).
- Cynthia Sturton participates in the 2014 NSF CyberSpace 2025 Workshop (Cyber2025).
- Cynthia Sturton is serving on the program committee for the 2014 USENIX
Security Symposium.
- 2013
- Cynthia Sturton is serving on the program committee for the 2013 USENIX
Security Symposium.