|
Search the dblp DataBase
Michael E. Locasto:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Michael E. Locasto, Angelos D. Keromytis
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:1-15 [Conf]
- Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis
W3Bcrypt: Encryption as a Stylesheet. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:349-364 [Conf]
- Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov
Highlights from the 2005 New Security Paradigms Workshop. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:393-396 [Conf]
- Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis
Software Self-Healing Using Collaborative Application Communities. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo
FLIPS: Hybrid Adaptive Intrusion Prevention. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:82-101 [Conf]
- Weidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2007, pp:252-266 [Conf]
- Stelios Sidiroglou, Michael E. Locasto, Stephen W. Boyd, Angelos D. Keromytis
Building a Reactive Immune System for Software Services. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, General Track, 2005, pp:149-161 [Conf]
- Stelios Sidiroglou, Michael E. Locasto, Angelos D. Keromytis
Hardware support for self-healing software services. [Citation Graph (0, 0)][DBLP] SIGARCH Computer Architecture News, 2005, v:33, n:1, pp:42-47 [Journal]
- Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis
Dark application communities. [Citation Graph (0, 0)][DBLP] NSPW, 2006, pp:11-18 [Conf]
Katana: A Hot Patching Framework for ELF Executables. [Citation Graph (, )][DBLP]
Pushback for Overlay Networks: Protecting Against Malicious Insiders. [Citation Graph (, )][DBLP]
SSARES: Secure Searchable Automated Remote Email Storage. [Citation Graph (, )][DBLP]
On the infeasibility of modeling polymorphic shellcode. [Citation Graph (, )][DBLP]
Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security. [Citation Graph (, )][DBLP]
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. [Citation Graph (, )][DBLP]
Return Value Predictability Profiles for Self-healing. [Citation Graph (, )][DBLP]
Online Network Forensics for Automatic Repair Validation. [Citation Graph (, )][DBLP]
Pushing Boulders Uphill: The Difficulty of Network Intrusion Recovery. [Citation Graph (, )][DBLP]
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. [Citation Graph (, )][DBLP]
Teaching the principles of the hacker curriculum to undergraduates. [Citation Graph (, )][DBLP]
Casting out Demons: Sanitizing Training Data for Anomaly Sensors. [Citation Graph (, )][DBLP]
From STEM to SEAD: Speculative Execution for Automated Defense. [Citation Graph (, )][DBLP]
SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.003secs
|