Dean Sullivan

According to our database1, Dean Sullivan authored at least 21 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices.
CoRR, 2024

2023
CROWBAR: Natively Fuzzing Trusted Applications Using ARM CoreSight.
J. Hardw. Syst. Secur., September, 2023

PDNPulse: Sensing PCB Anomaly With the Intrinsic Power Delivery Network.
IEEE Trans. Inf. Forensics Secur., 2023

VGF: Value-Guided Fuzzing - Fuzzing Hardware as Hardware.
CoRR, 2023

LightEMU: Hardware Assisted Fuzzing of Trusted Applications.
CoRR, 2023

When Memory Mappings Attack: On the (Mis)use of the ARM Cortex-M FPB Unit.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2023

HeisenTrojans: They Are Not There Until They Are Triggered.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2023

2022
Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
Quantifying Rowhammer Vulnerability for DRAM Security.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

2020
SaeCAS: Secure Authenticated Execution Using CAM-Based Vector Storage.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

LAHEL: Lightweight Attestation Hardening Embedded Devices using Macrocells.
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020

2018
Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in Iaas Clouds.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Hardware control flow integrity.
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018

2017
Execution Integrity with In-Place Encryption.
CoRR, 2017

LAZARUS: Practical Side-Channel Resilient Kernel-Space Randomization.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

HA2lloc: Hardware-Assisted Secure Allocator.
Proceedings of the Hardware and Architectural Support for Security and Privacy, 2017

ATRIUM: Runtime attestation resilient under memory attacks.
Proceedings of the 2017 IEEE/ACM International Conference on Computer-Aided Design, 2017

2016
Strategy without tactics: policy-agnostic hardware-enhanced control-flow integrity.
Proceedings of the 53rd Annual Design Automation Conference, 2016

2015
HAFIX: hardware-assisted flow integrity extension.
Proceedings of the 52nd Annual Design Automation Conference, 2015

2014
Real-time trust evaluation in integrated circuits.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

FIGHT-Metric: Functional Identification of Gate-Level Hardware Trustworthiness.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014


  Loading...