Year |
Citation |
Score |
2014 |
Gallagher J, Gonzalez R, Locasto ME. Verifying security patches Psp 2014 - Proceedings of the 2014 Acm Sigplan International Workshop On Privacy and Security in Programming, Part of Splash 2014. 11-18. DOI: 10.1145/2687148.2687151 |
0.419 |
|
2013 |
Sassaman L, Patterson ML, Bratus S, Locasto ME. Security applications of formal language theory Ieee Systems Journal. 7: 489-500. DOI: 10.1109/Jsyst.2012.2222000 |
0.492 |
|
2012 |
Watson GJ, Safavi-Naini R, Alimomeni M, Locasto ME, Narayan S. LoSt: Location based storage Proceedings of the Acm Conference On Computer and Communications Security. 59-69. DOI: 10.1145/2381913.2381926 |
0.314 |
|
2012 |
Aycock J, De Castro DMN, Locasto ME, Jarabek C. Babel: A secure computer is a polyglot Proceedings of the Acm Conference On Computer and Communications Security. 43-54. DOI: 10.1145/2381913.2381922 |
0.314 |
|
2012 |
Reeves J, Ramaswamy A, Locasto M, Bratus S, Smith S. Intrusion detection for resource-constrained embedded control systems in the power grid International Journal of Critical Infrastructure Protection. 5: 74-83. DOI: 10.1016/J.Ijcip.2012.02.002 |
0.407 |
|
2011 |
Locasto ME, Massimi M, DePasquale PJ. Security and privacy considerations in digital death Proceedings New Security Paradigms Workshop. 1-10. DOI: 10.1145/2073276.2073278 |
0.346 |
|
2011 |
Locasto ME, Ghosh AK, Jajodia S, Stavrou A. Virtual extension the ephemeral legion: Producing an expert cyber-security work force from thin air Communications of the Acm. 54: 129-131. DOI: 10.1145/1866739.1866764 |
0.375 |
|
2010 |
Bratus S, Oakley J, Ramaswamy A, Smith SW, Locasto ME. Katana: Towards Patching as a Runtime Part of the Compiler-Linker-Loader Toolchain International Journal of Secure Software Engineering. 1: 1-17. DOI: 10.4018/Jsse.2010070101 |
0.393 |
|
2010 |
Bratus S, Locasto ME, Ramaswamy A, Smith SW. VM-based security overkill: A lament for applied systems security research Proceedings New Security Paradigms Workshop. 51-60. DOI: 10.1145/1900546.1900554 |
0.328 |
|
2010 |
Boyd SW, Kc GS, Locasto ME, Keromytis AD, Prevelakis V. On the general applicability of instruction-set randomization Ieee Transactions On Dependable and Secure Computing. 7: 255-270. DOI: 10.1109/Tdsc.2008.58 |
0.615 |
|
2010 |
Ramaswamy A, Bratus S, Smith SW, Locasto ME. Katana: A hot patching framework for ELF executables Ares 2010 - 5th International Conference On Availability, Reliability, and Security. 507-512. DOI: 10.1109/ARES.2010.112 |
0.356 |
|
2010 |
Song Y, Locasto ME, Stavrou A, Keromytis AD, Stolfo SJ. On the infeasibility of modeling polymorphic shellcode : Re-thinking the role of learning in intrusion detection systems Machine Learning. 81: 179-205. DOI: 10.1007/S10994-009-5143-5 |
0.6 |
|
2009 |
Locasto ME, Bratus S, Schulte B. Bickering in-depth: Rethinking the composition of competing security systems Ieee Security and Privacy. 7: 77-81. DOI: 10.1109/MSP.2009.189 |
0.409 |
|
2008 |
Cretu GF, Stavrou A, Locasto ME, Stolfo SJ, Keromytis AD. Casting out demons: Sanitizing training data for anomaly sensors Proceedings - Ieee Symposium On Security and Privacy. 81-95. DOI: 10.1109/SP.2008.11 |
0.436 |
|
2008 |
Locasto ME, Burnside M, Keromytis AD. Online network forensics for automatic repair validation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5312: 136-151. DOI: 10.1007/978-3-540-89598-5-9 |
0.561 |
|
2008 |
Locasto ME, Stavrou A, Cretu GF, Keromytis AD, Stolfo SJ. Return value predictability profiles for self-healing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5312: 152-166. DOI: 10.1007/978-3-540-89598-5-10 |
0.524 |
|
2008 |
Stavrou A, Locasto ME, Keromytis AD. Pushback for overlay networks: Protecting against malicious insiders Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5037: 39-54. DOI: 10.1007/978-3-540-68914-0_3 |
0.513 |
|
2007 |
Locasto ME, Stavrou A, Keromytis AD. Dark application communities Proceedings New Security Paradigms Workshop. 11-18. DOI: 10.1145/1278940.1278943 |
0.436 |
|
2007 |
Cui W, Peinado M, Wang HJ, Locasto ME. ShieldGen: Automatic data patch generation for unknown vulnerabilities with informed probing Proceedings - Ieee Symposium On Security and Privacy. 252-266. DOI: 10.1109/SP.2007.34 |
0.316 |
|
2007 |
Aviv AJ, Locasto ME, Potter S, Keromytis AD. SSARES: Secure Searchable Automated Remote Email Storage Proceedings - Annual Computer Security Applications Conference, Acsac. 129-138. DOI: 10.1109/ACSAC.2007.30 |
0.569 |
|
2006 |
Stavrou A, Locasto ME, Keroniytis AD. WSBcrypt: Encryption as a stylesheet Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3989: 349-364. DOI: 10.1007/11767480_24 |
0.32 |
|
2006 |
Locasto ME, Wang K, Keromytis AD, Stolfo SJ. FLIPS: Hybrid adaptive intrusion prevention Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3858: 82-101. DOI: 10.1007/11663812_5 |
0.585 |
|
2006 |
Locasto ME, Sidiroglou S, Keromytis AD. Speculative virtual verification: Policy-constrained speculative execution Proceedings New Security Paradigms Workshop. 2006: 119-124. |
0.691 |
|
2006 |
Benny W, Locasto ME, Keromytis AD. PalProtect: A collaborative security approach to comment spam Proceedings of the 2006 Ieee Workshop On Information Assurance. 2006: 170-175. |
0.595 |
|
2005 |
Sidiroglou S, Locasto ME, Keromytis AD. Hardware support for self-healing software services Acm Sigarch Computer Architecture News. 33: 42-47. DOI: 10.1145/1055626.1055633 |
0.603 |
|
2005 |
Locasto ME, Parekh JJ, Keromytis AD, Stolfo SJ. Towards collaborative security and P2P intrusion detection Proceedings From the 6th Annual Ieee System, Man and Cybernetics Information Assurance Workshop, Smc 2005. 2005: 333-339. DOI: 10.1109/IAW.2005.1495971 |
0.55 |
|
2005 |
Foley S, Singer A, Locasto ME, Sidiroglou S, Keromytis AD, McDermott J, Thorpe J, Van Oorschot P, Somayaji A, Ford R, Bush M, Boulatov A. Highlights from the 2005 new security paradigms workshop Proceedings - Annual Computer Security Applications Conference, Acsac. 2005: 393-394. DOI: 10.1109/CSAC.2005.29 |
0.672 |
|
2004 |
Locasto ME, Keromytis AD. CamouflageFS: Increasing the effective key length in cryptographic filesystems on the cheap Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3089: 1-15. |
0.605 |
|
Show low-probability matches. |