default search action
Matthew Hicks
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c37]Jubayer Mahmod, Matthew Hicks:
SRAM Imprinting for System Protection and Differentiation. AsiaCCS 2024 - [c36]Harrison Williams, Matthew Hicks:
Energy-Adaptive Buffering for Efficient, Responsive, and Persistent Batteryless Systems. ASPLOS (3) 2024: 268-282 - [c35]Harrison Williams, Matthew Hicks:
A Survey of Prototyping Platforms for Intermittent Computing Research. ENSsys@SenSys 2024: 8-14 - [c34]Jubayer Mahmod, Matthew Hicks:
UnTrustZone: Systematic Accelerated Aging to Expose On-chip Secrets. SP 2024: 4107-4124 - [c33]Harrison Williams, Saim Ahmad, Matthew Hicks:
A Difference World: High-performance, NVM-invariant, Software-only Intermittent Computation. USENIX ATC 2024: 1223-1238 - [c32]Prakhar Sah, Matthew Hicks:
RIPencapsulation: Defeating IP Encapsulation on TI MSP Devices. WOOT @ USENIX Security Symposium 2024: 117-132 - [i8]Harrison Williams, Matthew Hicks:
Energy-adaptive Buffering for Efficient, Responsive, and Persistent Batteryless Systems. CoRR abs/2401.08806 (2024) - 2023
- [c31]Timothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks:
T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing. AsiaCCS 2023: 746-759 - [c30]Prakhar Sah, Matthew Hicks:
Hitchhiker's Guide to Secure Checkpointing on Energy-Harvesting Systems. ENSsys@SenSys 2023: 8-15 - [c29]Fariborz Lohrabi Pour, Harrison Williams, Matthew Hicks, Dong Sam Ha:
RF Energy Harvesting in Minimization of Age of Information with Updating Erasures. ISCAS 2023: 1-5 - [c28]Salman Ahmed, Hans Liljestrand, Hani Jamjoom, Matthew Hicks, N. Asokan, Danfeng Yao:
Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks. USENIX Security Symposium 2023: 1433-1450 - [c27]Leo Stone, Rishi Ranjan, Stefan Nagy, Matthew Hicks:
No Linux, No Problem: Fast and Correct Windows Binary Fuzzing via Target-embedded Snapshotting. USENIX Security Symposium 2023: 4913-4929 - [i7]Prakhar Sah, Matthew Hicks:
RIPencapsulation: Defeating IP Encapsulation on TI MSP Devices. CoRR abs/2310.16433 (2023) - 2022
- [c26]Prashast Srivastava, Stefan Nagy, Matthew Hicks, Antonio Bianchi, Mathias Payer:
One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction. ACSAC 2022: 388-399 - [c25]Jubayer Mahmod, Matthew Hicks:
SRAM has no chill: exploiting power domain separation to steal on-chip secrets. ASPLOS 2022: 1043-1055 - [c24]Jubayer Mahmod, Matthew Hicks:
Invisible bits: hiding secret messages in SRAM's analog domain. ASPLOS 2022: 1086-1098 - [c23]Xin Wang, Daulet Talapkaliyev, Matthew Hicks, Xun Jian:
Self-Reinforcing Memoization for Cryptography Calculations in Secure Memory Systems. MICRO 2022: 678-692 - [c22]Timothy Trippel, Kang G. Shin, Alex Chernyakhovsky, Garret Kelly, Dominic Rizzo, Matthew Hicks:
Fuzzing Hardware Like Software. USENIX Security Symposium 2022: 3237-3254 - [i6]Stefan Nagy, Anh Nguyen-Tuong, Jason D. Hiser, Jack W. Davidson, Matthew Hicks:
Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing with Coverage-preserving Coverage-guided Tracing. CoRR abs/2209.03441 (2022) - 2021
- [c21]Michael Moukarzel, Matthew Hicks:
RingRAM: A Unified Hardware SecurityPrimitive for IoT Devices that Gets Better with Age. ACSAC 2021: 660-674 - [c20]Stefan Nagy, Anh Nguyen-Tuong, Jason D. Hiser, Jack W. Davidson, Matthew Hicks:
Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing with Coverage-preserving Coverage-guided Tracing. CCS 2021: 351-365 - [c19]Harrison Williams, Michael Moukarzel, Matthew Hicks:
Failure Sentinels: Ubiquitous Just-in-time Intermittent Computation via Low-cost Hardware Support for Voltage Monitoring. ISCA 2021: 665-678 - [c18]Timothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks:
Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time. SP 2021: 970-986 - [c17]Stefan Nagy, Anh Nguyen-Tuong, Jason D. Hiser, Jack W. Davidson, Matthew Hicks:
Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing. USENIX Security Symposium 2021: 1683-1700 - [i5]Timothy Trippel, Kang G. Shin, Alex Chernyakhovsky, Garret Kelly, Dominic Rizzo, Matthew Hicks:
Fuzzing Hardware Like Software. CoRR abs/2102.02308 (2021) - 2020
- [c16]Harrison Williams, Xun Jian, Matthew Hicks:
Forget Failure: Exploiting SRAM Data Remanence for Low-overhead Intermittent Computation. ASPLOS 2020: 69-84 - [c15]Timothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks:
ICAS: an Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans. SP 2020: 1742-1759 - [i4]Harrison Williams, Alexander Lind, Kishankumar Parikh, Matthew Hicks:
Silicon Dating. CoRR abs/2009.04002 (2020)
2010 – 2019
- 2019
- [j4]Cynthia Sturton, Matthew Hicks, Samuel T. King, Jonathan M. Smith:
FinalFilter: Asserting Security Properties of a Processor at Runtime. IEEE Micro 39(4): 35-42 (2019) - [c14]Stefan Nagy, Matthew Hicks:
Full-Speed Fuzzing: Reducing Fuzzing Overhead through Coverage-Guided Tracing. IEEE Symposium on Security and Privacy 2019: 787-802 - [i3]Timothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks:
An Extensible Framework for Quantifying the Coverage of Defenses Against Untrusted Foundries. CoRR abs/1906.08836 (2019) - [i2]Timothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks:
Defensive Routing: a Preventive Layout-Level Defense Against Untrusted Foundries. CoRR abs/1906.08842 (2019) - 2018
- [i1]Stefan Nagy, Matthew Hicks:
Full-speed Fuzzing: Reducing Fuzzing Overhead through Coverage-guided Tracing. CoRR abs/1812.11875 (2018) - 2017
- [j3]Kaiyuan Yang, Matthew Hicks, Qing Dong, Todd M. Austin, Dennis Sylvester:
Exploiting the analog properties of digital circuits for malicious hardware. Commun. ACM 60(9): 83-91 (2017) - [c13]Matthew Hicks:
Clank: Architectural Support for Intermittent Computation. ISCA 2017: 228-240 - [c12]Evan Chavis, Harrison Davis, Yijun Hou, Matthew Hicks, Salessawi Ferede Yitbarek, Todd M. Austin, Valeria Bertacco:
SNIFFER: A high-accuracy malware detector for enterprise-based systems. IVSW 2017: 70-75 - [c11]Michael Moukarzel, Matthew Hicks:
Reap What You Store: Side-channel Resilient Computing Through Energy Harvesting. ENSsys@SenSys 2017: 21-26 - 2016
- [c10]Zelalem Birhanu Aweke, Salessawi Ferede Yitbarek, Rui Qiao, Reetuparna Das, Matthew Hicks, Yossi Oren, Todd M. Austin:
ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks. ASPLOS 2016: 743-755 - [c9]Joel van der Woude, Matthew Hicks:
Intermittent Computation without Hardware Support or Programmer Intervention. OSDI 2016: 17-32 - [c8]Kaiyuan Yang, Matthew Hicks, Qing Dong, Todd M. Austin, Dennis Sylvester:
A2: Analog Malicious Hardware. IEEE Symposium on Security and Privacy 2016: 18-37 - 2015
- [j2]Michael E. Kurczy, Julijana Ivanisevic, Caroline H. Johnson, Winnie Uritboonthai, Linh Hoang, Mingliang Fang, Matthew Hicks, Anthony Aldebot, Duane Rinehart, Lisa J. Mellander, Ralf Tautenhahn, Gary J. Patti, Mary E. Spilker, H. Paul Benton, Gary Siuzdak:
Determining conserved metabolic biomarkers from a million database queries. Bioinform. 31(23): 3721-3724 (2015) - [c7]Matthew Hicks, Cynthia Sturton, Samuel T. King, Jonathan M. Smith:
SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs. ASPLOS 2015: 517-529 - [c6]Amir Rahmati, Matthew Hicks, Daniel E. Holcomb, Kevin Fu:
Probable cause: the deanonymizing effects of approximate DRAM. ISCA 2015: 604-615 - 2013
- [b1]Matthew Hicks:
Practical systems for overcoming processor imperfections. University of Illinois Urbana-Champaign, USA, 2013 - 2011
- [c5]Waylon Brunette, Matthew Hicks, Alexis Hope, Ginger Ruddy, Ruth E. Anderson, Beth E. Kolko:
Reducing Maternal Mortality: An Ultrasound System for Village Midwives. GHTC 2011: 84-90 - [c4]Cynthia Sturton, Matthew Hicks, David A. Wagner, Samuel T. King:
Defeating UCI: Building Stealthy and Malicious Hardware. IEEE Symposium on Security and Privacy 2011: 64-77 - 2010
- [j1]Matthew Hicks, Murph Finnicum, Samuel T. King, Milo M. K. Martin, Jonathan M. Smith:
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically. login Usenix Mag. 35(6) (2010) - [c3]Waylon Brunette, Wayne Gerard, Matthew Hicks, Alexis Hope, Mitchell Ishimitsu, Pratik Prasad, Ruth E. Anderson, Gaetano Borriello, Beth E. Kolko, Robert Nathan:
Portable antenatal ultrasound platform for village midwives. ACM DEV 2010: 23 - [c2]Matthew Hicks, Murph Finnicum, Samuel T. King, Milo M. K. Martin, Jonathan M. Smith:
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically. IEEE Symposium on Security and Privacy 2010: 159-172
2000 – 2009
- 2009
- [c1]Pablo Montesinos, Matthew Hicks, Samuel T. King, Josep Torrellas:
Capo: a software-hardware interface for practical deterministic multiprocessor replay. ASPLOS 2009: 73-84
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 21:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint