Hicks, Matthew
39  results:
Search for persons X
?
1

Energy-Adaptive Buffering for Efficient, Responsive, and Pe..:

, In: Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3,
Williams, Harrison ; Hicks, Matthew - p. 268-282 , 2024
 
?
2

SRAM Imprinting for System Protection and Differentiation:

, In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security,
Mahmod, Jubayer ; Hicks, Matthew - p. 453-466 , 2024
 
?
3

Hitchhiker's Guide to Secure Checkpointing on Energy-Harves..:

, In: Proceedings of the 11th International Workshop on Energy Harvesting & Energy-Neutral Sensing Systems,
Sah, Prakhar ; Hicks, Matthew - p. 8-15 , 2023
 
?
4

RF Energy Harvesting in Minimization of Age of Information ..:

, In: 2023 IEEE International Symposium on Circuits and Systems (ISCAS),
 
?
5

T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Ro..:

, In: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security,
Trippel, Timothy ; Shin, Kang G. ; Bush, Kevin B.. - p. 746-759 , 2023
 
?
6

Self-Reinforcing Memoization for Cryptography Calculations ..:

, In: 2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO),
Wang, Xin ; Talapkaliyev, Daulet ; Hicks, Matthew. - p. 678-692 , 2022
 
?
7

SRAM has no chill: exploiting power domain separation to st..:

, In: Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems,
Mahmod, Jubayer ; Hicks, Matthew - p. 1043-1055 , 2022
 
?
8

One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via T..:

, In: Proceedings of the 38th Annual Computer Security Applications Conference,
 
?
9

Invisible bits: hiding secret messages in SRAM's analog dom..:

, In: Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems,
Mahmod, Jubayer ; Hicks, Matthew - p. 1086-1098 , 2022
 
?
10

Failure sentinels : ubiquitous just-in-time intermittent..:

, In: Proceedings of the 48th Annual International Symposium on Computer Architecture,
 
?
11

Bomberman: Defining and Defeating Hardware Ticking Timebomb..:

, In: 2021 IEEE Symposium on Security and Privacy (SP),
Trippel, Timothy ; Shin, Kang G. ; Bush, Kevin B.. - p. 970-986 , 2021
 
?
12

RingRAM: A Unified Hardware SecurityPrimitive for IoT Devic..:

, In: Annual Computer Security Applications Conference,
Moukarzel, Michael ; Hicks, Matthew - p. 660-674 , 2021
 
?
13

Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing..:

, In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security,
Nagy, Stefan ; Nguyen-Tuong, Anh ; Hiser, Jason D... - p. 351-365 , 2021
 
?
14

ICAS: an Extensible Framework for Estimating the Susceptibi..:

, In: 2020 IEEE Symposium on Security and Privacy (SP),
Trippel, Timothy ; Shin, Kang G. ; Bush, Kevin B.. - p. 1742-1759 , 2020
 
?
15

Forget Failure : Exploiting SRAM Data Remanence for Low-..:

, In: Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems,
 
1-15