Follow
Matthew Hicks
Title
Cited by
Cited by
Year
Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically
M Hicks, M Finnicum, ST King, MMK Martin, JM Smith
2010 IEEE symposium on security and privacy, 159-172, 2010
4122010
A2: Analog malicious hardware
K Yang, M Hicks, Q Dong, T Austin, D Sylvester
2016 IEEE symposium on security and privacy (SP), 18-37, 2016
3202016
Intermittent computation without hardware support or programmer intervention
J Van Der Woude, M Hicks
12th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2016
2492016
ANVIL: Software-based protection against next-generation rowhammer attacks
ZB Aweke, SF Yitbarek, R Qiao, R Das, M Hicks, Y Oren, T Austin
ACM SIGPLAN Notices 51 (4), 743-755, 2016
2432016
Full-speed fuzzing: Reducing fuzzing overhead through coverage-guided tracing
S Nagy, M Hicks
2019 IEEE Symposium on Security and Privacy (SP), 787-802, 2019
1872019
Defeating UCI: Building stealthy and malicious hardware
C Sturton, M Hicks, D Wagner, ST King
2011 IEEE symposium on security and privacy, 64-77, 2011
1762011
Clank: Architectural support for intermittent computation
M Hicks
ACM SIGARCH Computer Architecture News 45 (2), 228-240, 2017
1732017
Mechanism for Automatic Scaling of Application Resources in a Multi-Tenant Platform-as-a-Service (PaaS) Environment in a Cloud Computing System
MP McGrath, M Hicks
US Patent App. 13/605,563, 2014
1702014
Controlling utilization in a multi-tenant platform-as-a-service (PaaS) environment in a cloud computing system
MP McGrath, M Hicks, T Wiest, DC McPherson
US Patent 8,850,432, 2014
1582014
Capo: a software-hardware interface for practical deterministic multiprocessor replay
P Montesinos, M Hicks, ST King, J Torrellas
Proceedings of the 14th international conference on Architectural support …, 2009
1562009
Cartridges in a multi-tenant platforms-as-a-service (PaaS) system implemented in a cloud computing environment
MP McGrath, M Hicks
US Patent 8,850,514, 2014
1142014
Fuzzing hardware like software
T Trippel, KG Shin, A Chernyakhovsky, G Kelly, D Rizzo, M Hicks
31st USENIX Security Symposium (USENIX Security 22), 3237-3254, 2022
1022022
Controlling capacity in a multi-tenant platform-as-a-service environment in a cloud computing system
MP McGrath, M Hicks, T Wiest, DC McPherson
US Patent 8,904,402, 2014
952014
Specs: A lightweight runtime mechanism for protecting software from security-critical processor bugs
M Hicks, C Sturton, ST King, JM Smith
Proceedings of the Twentieth International Conference on Architectural …, 2015
902015
Breaking through binaries: Compiler-quality instrumentation for better binary-only fuzzing
S Nagy, A Nguyen-Tuong, JD Hiser, JW Davidson, M Hicks
30th USENIX Security Symposium (USENIX Security 21), 1683-1700, 2021
672021
Probable cause: The deanonymizing effects of approximate DRAM
A Rahmati, M Hicks, DE Holcomb, K Fu
Proceedings of the 42nd annual international symposium on computer …, 2015
492015
Application partitioning in a multi-tenant platform-as-a-service environment in a cloud computing system
MP McGrath, M Hicks, T Wiest, DC McPherson
US Patent 9,009,704, 2015
482015
Node selection for a new application in a multi-tenant cloud hosting environment
MP McGrath, M Hicks, DC McPherson
US Patent 9,842,002, 2017
372017
ICAS: an extensible framework for estimating the susceptibility of ic layouts to additive trojans
T Trippel, KG Shin, KB Bush, M Hicks
2020 IEEE Symposium on Security and Privacy (SP), 1742-1759, 2020
352020
Scaling of application resources in a multi-tenant platform-as-a-service environment in a cloud computing system
MP McGrath, M Hicks
US Patent 9,405,593, 2016
332016
The system can't perform the operation now. Try again later.
Articles 1–20