Michael E. Locasto, Ph.D. - Publications

Affiliations: 
2008 Columbia University, New York, NY 
Area:
Computer Science

28 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2014 Gallagher J, Gonzalez R, Locasto ME. Verifying security patches Psp 2014 - Proceedings of the 2014 Acm Sigplan International Workshop On Privacy and Security in Programming, Part of Splash 2014. 11-18. DOI: 10.1145/2687148.2687151  0.419
2013 Sassaman L, Patterson ML, Bratus S, Locasto ME. Security applications of formal language theory Ieee Systems Journal. 7: 489-500. DOI: 10.1109/Jsyst.2012.2222000  0.492
2012 Watson GJ, Safavi-Naini R, Alimomeni M, Locasto ME, Narayan S. LoSt: Location based storage Proceedings of the Acm Conference On Computer and Communications Security. 59-69. DOI: 10.1145/2381913.2381926  0.314
2012 Aycock J, De Castro DMN, Locasto ME, Jarabek C. Babel: A secure computer is a polyglot Proceedings of the Acm Conference On Computer and Communications Security. 43-54. DOI: 10.1145/2381913.2381922  0.314
2012 Reeves J, Ramaswamy A, Locasto M, Bratus S, Smith S. Intrusion detection for resource-constrained embedded control systems in the power grid International Journal of Critical Infrastructure Protection. 5: 74-83. DOI: 10.1016/J.Ijcip.2012.02.002  0.407
2011 Locasto ME, Massimi M, DePasquale PJ. Security and privacy considerations in digital death Proceedings New Security Paradigms Workshop. 1-10. DOI: 10.1145/2073276.2073278  0.346
2011 Locasto ME, Ghosh AK, Jajodia S, Stavrou A. Virtual extension the ephemeral legion: Producing an expert cyber-security work force from thin air Communications of the Acm. 54: 129-131. DOI: 10.1145/1866739.1866764  0.375
2010 Bratus S, Oakley J, Ramaswamy A, Smith SW, Locasto ME. Katana: Towards Patching as a Runtime Part of the Compiler-Linker-Loader Toolchain International Journal of Secure Software Engineering. 1: 1-17. DOI: 10.4018/Jsse.2010070101  0.393
2010 Bratus S, Locasto ME, Ramaswamy A, Smith SW. VM-based security overkill: A lament for applied systems security research Proceedings New Security Paradigms Workshop. 51-60. DOI: 10.1145/1900546.1900554  0.328
2010 Boyd SW, Kc GS, Locasto ME, Keromytis AD, Prevelakis V. On the general applicability of instruction-set randomization Ieee Transactions On Dependable and Secure Computing. 7: 255-270. DOI: 10.1109/Tdsc.2008.58  0.615
2010 Ramaswamy A, Bratus S, Smith SW, Locasto ME. Katana: A hot patching framework for ELF executables Ares 2010 - 5th International Conference On Availability, Reliability, and Security. 507-512. DOI: 10.1109/ARES.2010.112  0.356
2010 Song Y, Locasto ME, Stavrou A, Keromytis AD, Stolfo SJ. On the infeasibility of modeling polymorphic shellcode : Re-thinking the role of learning in intrusion detection systems Machine Learning. 81: 179-205. DOI: 10.1007/S10994-009-5143-5  0.6
2009 Locasto ME, Bratus S, Schulte B. Bickering in-depth: Rethinking the composition of competing security systems Ieee Security and Privacy. 7: 77-81. DOI: 10.1109/MSP.2009.189  0.409
2008 Cretu GF, Stavrou A, Locasto ME, Stolfo SJ, Keromytis AD. Casting out demons: Sanitizing training data for anomaly sensors Proceedings - Ieee Symposium On Security and Privacy. 81-95. DOI: 10.1109/SP.2008.11  0.436
2008 Locasto ME, Burnside M, Keromytis AD. Online network forensics for automatic repair validation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5312: 136-151. DOI: 10.1007/978-3-540-89598-5-9  0.561
2008 Locasto ME, Stavrou A, Cretu GF, Keromytis AD, Stolfo SJ. Return value predictability profiles for self-healing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5312: 152-166. DOI: 10.1007/978-3-540-89598-5-10  0.524
2008 Stavrou A, Locasto ME, Keromytis AD. Pushback for overlay networks: Protecting against malicious insiders Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5037: 39-54. DOI: 10.1007/978-3-540-68914-0_3  0.513
2007 Locasto ME, Stavrou A, Keromytis AD. Dark application communities Proceedings New Security Paradigms Workshop. 11-18. DOI: 10.1145/1278940.1278943  0.436
2007 Cui W, Peinado M, Wang HJ, Locasto ME. ShieldGen: Automatic data patch generation for unknown vulnerabilities with informed probing Proceedings - Ieee Symposium On Security and Privacy. 252-266. DOI: 10.1109/SP.2007.34  0.316
2007 Aviv AJ, Locasto ME, Potter S, Keromytis AD. SSARES: Secure Searchable Automated Remote Email Storage Proceedings - Annual Computer Security Applications Conference, Acsac. 129-138. DOI: 10.1109/ACSAC.2007.30  0.569
2006 Stavrou A, Locasto ME, Keroniytis AD. WSBcrypt: Encryption as a stylesheet Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3989: 349-364. DOI: 10.1007/11767480_24  0.32
2006 Locasto ME, Wang K, Keromytis AD, Stolfo SJ. FLIPS: Hybrid adaptive intrusion prevention Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3858: 82-101. DOI: 10.1007/11663812_5  0.585
2006 Locasto ME, Sidiroglou S, Keromytis AD. Speculative virtual verification: Policy-constrained speculative execution Proceedings New Security Paradigms Workshop. 2006: 119-124.  0.691
2006 Benny W, Locasto ME, Keromytis AD. PalProtect: A collaborative security approach to comment spam Proceedings of the 2006 Ieee Workshop On Information Assurance. 2006: 170-175.  0.595
2005 Sidiroglou S, Locasto ME, Keromytis AD. Hardware support for self-healing software services Acm Sigarch Computer Architecture News. 33: 42-47. DOI: 10.1145/1055626.1055633  0.603
2005 Locasto ME, Parekh JJ, Keromytis AD, Stolfo SJ. Towards collaborative security and P2P intrusion detection Proceedings From the 6th Annual Ieee System, Man and Cybernetics Information Assurance Workshop, Smc 2005. 2005: 333-339. DOI: 10.1109/IAW.2005.1495971  0.55
2005 Foley S, Singer A, Locasto ME, Sidiroglou S, Keromytis AD, McDermott J, Thorpe J, Van Oorschot P, Somayaji A, Ford R, Bush M, Boulatov A. Highlights from the 2005 new security paradigms workshop Proceedings - Annual Computer Security Applications Conference, Acsac. 2005: 393-394. DOI: 10.1109/CSAC.2005.29  0.672
2004 Locasto ME, Keromytis AD. CamouflageFS: Increasing the effective key length in cryptographic filesystems on the cheap Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3089: 1-15.  0.605
Show low-probability matches.