Publications

Forthcoming
Shan H, Zhang B, Zhan Z, Sullivan D, Wang S, Jin Y. Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices, in IEEE Symposium on Security and Privacy, 2022. ; Forthcoming.
2021
Jiang Y, Zhu H, Sullivan D, Guo X, Zhang X, Jin Y. Quantifying Rowhammer Vulnerability for DRAM Security. 2021.
2020
Arias O, Sullivan D, Shan H, Jin Y. LAHEL: Lightweight attestation hardening embedded devices using macrocells. 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). 2020 :305-315.
Arias O, Sullivan D, Shan H, Jin Y. SAECAS: Secure Authenticated Execution Using CAM-Based Vector Storage. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 2020;39 (11) :4078-4089.
2017
Zeitouni S, Dessouky G, Arias O, Sullivan D, Ibrahim A, Jin Y, Sadeghi A-R. Atrium: Runtime attestation resilient under memory attacks. 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). 2017 :384-391.
Sullivan D, Arias O, Gens D, Davi L, Sadeghi A-R, Jin Y. Execution integrity with in-place encryption. arXiv preprint arXiv:1703.02698. 2017.
Arias O, Sullivan D, Jin Y. HA2lloc: Hardware-assisted secure allocator. In: Proceedings of the Hardware and Architectural Support for Security and Privacy. ; 2017. pp. 1-7.
Gens D, Arias O, Sullivan D, Liebchen C, Jin Y, Sadeghi A-R. Lazarus: Practical side-channel resilient kernel-space randomization. International Symposium on Research in Attacks, Intrusions, and Defenses. 2017 :238-258.
2016
Sullivan D, Arias O, Davi L, Larsen P, Sadeghi A-R, Jin Y. Strategy without tactics: Policy-agnostic hardware-enhanced control-flow integrity. 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC). 2016 :1-6.
2015
Davi L, Hanreich M, Paul D, Sadeghi A-R, Koeberl P, Sullivan D, Arias O, Jin Y. HAFIX: Hardware-assisted flow integrity extension. 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC). 2015 :1-6.
2014
Sullivan D, Biggers J, Zhu G, Zhang S, Jin Y. FIGHT-metric: Functional identification of gate-level hardware trustworthiness. Proceedings of the 51st Annual Design Automation Conference. 2014 :1-4.
Oliveira D, Wetzel N, Bucci M, Navarro J, Sullivan D, Jin Y. Hardware-software collaboration for secure coexistence with kernel extensions. ACM SIGAPP Applied Computing Review. 2014;14 (3) :22-35.
Jin Y, Sullivan D. Real-time trust evaluation in integrated circuits. 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE). 2014 :1-6.