Michael E. Locasto, Ph.D. - Publications

Affiliations: 
2008 Columbia University, New York, NY 
Area:
Computer Science

14 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2010 Boyd SW, Kc GS, Locasto ME, Keromytis AD, Prevelakis V. On the general applicability of instruction-set randomization Ieee Transactions On Dependable and Secure Computing. 7: 255-270. DOI: 10.1109/TDSC.2008.58  0.6
2010 Song Y, Locasto ME, Stavrou A, Keromytis AD, Stolfo SJ. On the infeasibility of modeling polymorphic shellcode : Re-thinking the role of learning in intrusion detection systems Machine Learning. 81: 179-205. DOI: 10.1007/s10994-009-5143-5  0.4
2008 Cretu GF, Stavrou A, Locasto ME, Stolfo SJ, Keromytis AD. Casting out demons: Sanitizing training data for anomaly sensors Proceedings - Ieee Symposium On Security and Privacy. 81-95. DOI: 10.1109/SP.2008.11  0.56
2008 Locasto ME, Burnside M, Keromytis AD. Online network forensics for automatic repair validation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5312: 136-151. DOI: 10.1007/978-3-540-89598-5-9  0.92
2008 Locasto ME, Stavrou A, Cretu GF, Keromytis AD, Stolfo SJ. Return value predictability profiles for self-healing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5312: 152-166. DOI: 10.1007/978-3-540-89598-5-10  0.52
2008 Stavrou A, Locasto ME, Keromytis AD. Pushback for overlay networks: Protecting against malicious insiders Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5037: 39-54. DOI: 10.1007/978-3-540-68914-0_3  0.56
2007 Locasto ME, Stavrou A, Keromytis AD. Dark application communities Proceedings New Security Paradigms Workshop. 11-18. DOI: 10.1145/1278940.1278943  0.68
2007 Aviv AJ, Locasto ME, Potter S, Keromytis AD. SSARES: Secure Searchable Automated Remote Email Storage Proceedings - Annual Computer Security Applications Conference, Acsac. 129-138. DOI: 10.1109/ACSAC.2007.30  0.6
2006 Locasto ME, Wang K, Keromytis AD, Stolfo SJ. FLIPS: Hybrid adaptive intrusion prevention Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3858: 82-101. DOI: 10.1007/11663812_5  0.4
2006 Benny W, Locasto ME, Keromytis AD. PalProtect: A collaborative security approach to comment spam Proceedings of the 2006 Ieee Workshop On Information Assurance. 2006: 170-175.  1
2006 Locasto ME, Sidiroglou S, Keromytis AD. Speculative virtual verification: Policy-constrained speculative execution Proceedings New Security Paradigms Workshop. 2006: 119-124.  1
2005 Locasto ME, Parekh JJ, Keromytis AD, Stolfo SJ. Towards collaborative security and P2P intrusion detection Proceedings From the 6th Annual Ieee System, Man and Cybernetics Information Assurance Workshop, Smc 2005. 2005: 333-339. DOI: 10.1109/IAW.2005.1495971  0.52
2005 Foley S, Singer A, Locasto ME, Sidiroglou S, Keromytis AD, McDermott J, Thorpe J, Van Oorschot P, Somayaji A, Ford R, Bush M, Boulatov A. Highlights from the 2005 new security paradigms workshop Proceedings - Annual Computer Security Applications Conference, Acsac. 2005: 393-394. DOI: 10.1109/CSAC.2005.29  0.36
2004 Locasto ME, Keromytis AD. CamouflageFS: Increasing the effective key length in cryptographic filesystems on the cheap Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3089: 1-15.  1
Show low-probability matches.