Dean Sullivan
Cited by
Cited by
HAFIX: Hardware-assisted flow integrity extension
L Davi, M Hanreich, D Paul, AR Sadeghi, P Koeberl, D Sullivan, O Arias, ...
Proceedings of the 52nd Annual Design Automation Conference, 1-6, 2015
Atrium: Runtime attestation resilient under memory attacks
S Zeitouni, G Dessouky, O Arias, D Sullivan, A Ibrahim, Y Jin, AR Sadeghi
2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 384-391, 2017
Strategy without tactics: Policy-agnostic hardware-enhanced control-flow integrity
D Sullivan, O Arias, L Davi, P Larsen, AR Sadeghi, Y Jin
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
FIGHT-metric: Functional identification of gate-level hardware trustworthiness
D Sullivan, J Biggers, G Zhu, S Zhang, Y Jin
Proceedings of the 51st Annual Design Automation Conference, 1-4, 2014
Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in IaaS Clouds
D Sullivan, O Arias, T Meade, Y Jin
Real-time trust evaluation in integrated circuits
Y Jin, D Sullivan
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014
Lazarus: Practical side-channel resilient kernel-space randomization
D Gens, O Arias, D Sullivan, C Liebchen, Y Jin, AR Sadeghi
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices
H Shan, B Zhang, Z Zhan, D Sullivan, S Wang, Y Jin
2022 IEEE Symposium on Security and Privacy (SP), 1246-1262, 2022
Hardware-software collaboration for secure coexistence with kernel extensions
D Oliveira, N Wetzel, M Bucci, J Navarro, D Sullivan, Y Jin
ACM SIGAPP Applied Computing Review 14 (3), 22-35, 2014
Quantifying rowhammer vulnerability for dram security
Y Jiang, H Zhu, D Sullivan, X Guo, X Zhang, Y Jin
2021 58th ACM/IEEE Design Automation Conference (DAC), 73-78, 2021
Execution integrity with in-place encryption
D Sullivan, O Arias, D Gens, L Davi, AR Sadeghi, Y Jin
arXiv preprint arXiv:1703.02698, 2017
PDNPulse: sensing PCB anomaly with the intrinsic power delivery network
H Zhu, H Shan, D Sullivan, X Guo, Y Jin, X Zhang
IEEE Transactions on Information Forensics and Security, 2023
Ha2lloc: Hardware-assisted secure allocator
O Arias, D Sullivan, Y Jin
Proceedings of the Hardware and Architectural Support for Security and …, 2017
LAHEL: Lightweight attestation hardening embedded devices using macrocells
O Arias, D Sullivan, H Shan, Y Jin
2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020
Hardware control flow integrity
Y Jin, D Sullivan, O Arias, AR Sadeghi, L Davi
The Continuing Arms Race: Code-Reuse Attacks and Defenses, 181-210, 2018
SaeCAS: secure authenticated execution using CAM-based vector storage
O Arias, D Sullivan, H Shan, Y Jin
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2020
CROWBAR: Natively Fuzzing Trusted Applications Using ARM CoreSight
H Shan, M Huang, Y Liu, S Nissankararao, Y Jin, S Wang, D Sullivan
Journal of Hardware and Systems Security, 1-11, 2023
Microscope: Causality Inference Crossing the Hardware and Software Boundary from Hardware Perspective
Z Liu, K Chen, D Sullivan, O Arias, RG Dutta, Y Jin, X Guo
Proceedings of the ASPDAC Asia and South Pacific Design Automation Conference, 2024
LightEMU: Hardware Assisted Fuzzing of Trusted Applications
H Shan, S Nissankararao, Y Liu, M Huang, S Wang, Y Jin, D Sullivan
arXiv preprint arXiv:2311.09532, 2023
Attacks and Defenses in Architectural Security
D Sullivan
University of Florida, 2021
The system can't perform the operation now. Try again later.
Articles 1–20