[go: up one dir, main page]

Follow
Dean Sullivan
Title
Cited by
Cited by
Year
HAFIX: Hardware-assisted flow integrity extension
L Davi, M Hanreich, D Paul, AR Sadeghi, P Koeberl, D Sullivan, O Arias, ...
Proceedings of the 52nd Annual Design Automation Conference, 1-6, 2015
2472015
Atrium: Runtime attestation resilient under memory attacks
S Zeitouni, G Dessouky, O Arias, D Sullivan, A Ibrahim, Y Jin, AR Sadeghi
2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 384-391, 2017
1542017
Strategy without tactics: Policy-agnostic hardware-enhanced control-flow integrity
D Sullivan, O Arias, L Davi, P Larsen, AR Sadeghi, Y Jin
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
712016
FIGHT-metric: Functional identification of gate-level hardware trustworthiness
D Sullivan, J Biggers, G Zhu, S Zhang, Y Jin
Proceedings of the 51st Annual Design Automation Conference, 1-4, 2014
532014
Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in IaaS Clouds
D Sullivan, O Arias, T Meade, Y Jin
512018
Invisible finger: Practical electromagnetic interference attack on touchscreen-based electronic devices
H Shan, B Zhang, Z Zhan, D Sullivan, S Wang, Y Jin
2022 IEEE Symposium on Security and Privacy (SP), 1246-1262, 2022
442022
Real-time trust evaluation in integrated circuits
Y Jin, D Sullivan
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014
372014
Lazarus: Practical side-channel resilient kernel-space randomization
D Gens, O Arias, D Sullivan, C Liebchen, Y Jin, AR Sadeghi
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
342017
HAFIX: Hardware-assisted flow integrity extension
O Arias, L Davi, M Hanreich, Y Jin, P Koeberl, D Paul, AR Sadeghi, ...
292015
Quantifying rowhammer vulnerability for DRAM security
Y Jiang, H Zhu, D Sullivan, X Guo, X Zhang, Y Jin
2021 58th ACM/IEEE Design Automation Conference (DAC), 73-78, 2021
282021
PDNPulse: Sensing PCB anomaly with the intrinsic power delivery network
H Zhu, H Shan, D Sullivan, X Guo, Y Jin, X Zhang
IEEE Transactions on Information Forensics and Security 18, 3590-3605, 2023
262023
Hardware-software collaboration for secure coexistence with kernel extensions
D Oliveira, N Wetzel, M Bucci, J Navarro, D Sullivan, Y Jin
ACM SIGAPP Applied Computing Review 14 (3), 22-35, 2014
162014
Lahel: Lightweight attestation hardening embedded devices using macrocells
O Arias, D Sullivan, H Shan, Y Jin
2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020
152020
Execution integrity with in-place encryption
D Sullivan, O Arias, D Gens, L Davi, AR Sadeghi, Y Jin
arXiv preprint arXiv:1703.02698, 2017
132017
Crowbar: Natively fuzzing trusted applications using arm coresight
H Shan, M Huang, Y Liu, S Nissankararao, Y Jin, S Wang, D Sullivan
Journal of Hardware and Systems Security 7 (2), 44-54, 2023
92023
Ha2lloc: Hardware-assisted secure allocator
O Arias, D Sullivan, Y Jin
Proceedings of the Hardware and Architectural Support for Security and …, 2017
62017
Hardware control flow integrity
Y Jin, D Sullivan, O Arias, AR Sadeghi, L Davi
The Continuing Arms Race: Code-Reuse Attacks and Defenses, 181-210, 2018
52018
LightEMU: Hardware assisted fuzzing of trusted applications
H Shan, S Nissankararao, Y Liu, M Huang, S Wang, Y Jin, D Sullivan
2024 IEEE International Symposium on Hardware Oriented Security and Trust …, 2024
42024
SaeCAS: Secure authenticated execution using CAM-based vector storage
O Arias, D Sullivan, H Shan, Y Jin
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2020
42020
When Memory Mappings Attack: On the (Mis) use of the ARM Cortex-M FPB Unit
H Shan, D Sullivan, O Arias
2023 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 1-6, 2023
22023
The system can't perform the operation now. Try again later.
Articles 1–20