Michael E. Locasto, Ph.D.
Affiliations: | 2008 | Columbia University, New York, NY |
Area:
Computer ScienceGoogle:
"Michael Locasto"Parents
Sign in to add mentorAngelos D. Keromytis | grad student | 2008 | Columbia | |
(Integrity postures for software self -defense.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Gallagher J, Gonzalez R, Locasto ME. (2014) Verifying security patches Psp 2014 - Proceedings of the 2014 Acm Sigplan International Workshop On Privacy and Security in Programming, Part of Splash 2014. 11-18 |
Sassaman L, Patterson ML, Bratus S, et al. (2013) Security applications of formal language theory Ieee Systems Journal. 7: 489-500 |
Watson GJ, Safavi-Naini R, Alimomeni M, et al. (2012) LoSt: Location based storage Proceedings of the Acm Conference On Computer and Communications Security. 59-69 |
Aycock J, De Castro DMN, Locasto ME, et al. (2012) Babel: A secure computer is a polyglot Proceedings of the Acm Conference On Computer and Communications Security. 43-54 |
Reeves J, Ramaswamy A, Locasto M, et al. (2012) Intrusion detection for resource-constrained embedded control systems in the power grid International Journal of Critical Infrastructure Protection. 5: 74-83 |
Locasto ME, Massimi M, DePasquale PJ. (2011) Security and privacy considerations in digital death Proceedings New Security Paradigms Workshop. 1-10 |
Locasto ME, Ghosh AK, Jajodia S, et al. (2011) Virtual extension the ephemeral legion: Producing an expert cyber-security work force from thin air Communications of the Acm. 54: 129-131 |
Bratus S, Oakley J, Ramaswamy A, et al. (2010) Katana: Towards Patching as a Runtime Part of the Compiler-Linker-Loader Toolchain International Journal of Secure Software Engineering. 1: 1-17 |
Bratus S, Locasto ME, Ramaswamy A, et al. (2010) VM-based security overkill: A lament for applied systems security research Proceedings New Security Paradigms Workshop. 51-60 |
Boyd SW, Kc GS, Locasto ME, et al. (2010) On the general applicability of instruction-set randomization Ieee Transactions On Dependable and Secure Computing. 7: 255-270 |