The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael E. Locasto: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michael E. Locasto, Angelos D. Keromytis
    CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:1-15 [Conf]
  2. Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis
    W3Bcrypt: Encryption as a Stylesheet. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:349-364 [Conf]
  3. Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov
    Highlights from the 2005 New Security Paradigms Workshop. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:393-396 [Conf]
  4. Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis
    Software Self-Healing Using Collaborative Application Communities. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  5. Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo
    FLIPS: Hybrid Adaptive Intrusion Prevention. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:82-101 [Conf]
  6. Weidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto
    ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:252-266 [Conf]
  7. Stelios Sidiroglou, Michael E. Locasto, Stephen W. Boyd, Angelos D. Keromytis
    Building a Reactive Immune System for Software Services. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2005, pp:149-161 [Conf]
  8. Stelios Sidiroglou, Michael E. Locasto, Angelos D. Keromytis
    Hardware support for self-healing software services. [Citation Graph (0, 0)][DBLP]
    SIGARCH Computer Architecture News, 2005, v:33, n:1, pp:42-47 [Journal]
  9. Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis
    Dark application communities. [Citation Graph (0, 0)][DBLP]
    NSPW, 2006, pp:11-18 [Conf]

  10. Katana: A Hot Patching Framework for ELF Executables. [Citation Graph (, )][DBLP]


  11. Pushback for Overlay Networks: Protecting Against Malicious Insiders. [Citation Graph (, )][DBLP]


  12. SSARES: Secure Searchable Automated Remote Email Storage. [Citation Graph (, )][DBLP]


  13. On the infeasibility of modeling polymorphic shellcode. [Citation Graph (, )][DBLP]


  14. Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security. [Citation Graph (, )][DBLP]


  15. Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. [Citation Graph (, )][DBLP]


  16. Return Value Predictability Profiles for Self-healing. [Citation Graph (, )][DBLP]


  17. Online Network Forensics for Automatic Repair Validation. [Citation Graph (, )][DBLP]


  18. Pushing Boulders Uphill: The Difficulty of Network Intrusion Recovery. [Citation Graph (, )][DBLP]


  19. Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. [Citation Graph (, )][DBLP]


  20. Teaching the principles of the hacker curriculum to undergraduates. [Citation Graph (, )][DBLP]


  21. Casting out Demons: Sanitizing Training Data for Anomaly Sensors. [Citation Graph (, )][DBLP]


  22. From STEM to SEAD: Speculative Execution for Automated Defense. [Citation Graph (, )][DBLP]


  23. SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002