Michael E. Locasto, Ph.D. - Publications

Affiliations: 
2008 Columbia University, New York, NY 
Area:
Computer Science

28/43 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2014 Gallagher J, Gonzalez R, Locasto ME. Verifying security patches Psp 2014 - Proceedings of the 2014 Acm Sigplan International Workshop On Privacy and Security in Programming, Part of Splash 2014. 11-18. DOI: 10.1145/2687148.2687151  0.419
2013 Sassaman L, Patterson ML, Bratus S, Locasto ME. Security applications of formal language theory Ieee Systems Journal. 7: 489-500. DOI: 10.1109/Jsyst.2012.2222000  0.492
2012 Watson GJ, Safavi-Naini R, Alimomeni M, Locasto ME, Narayan S. LoSt: Location based storage Proceedings of the Acm Conference On Computer and Communications Security. 59-69. DOI: 10.1145/2381913.2381926  0.314
2012 Aycock J, De Castro DMN, Locasto ME, Jarabek C. Babel: A secure computer is a polyglot Proceedings of the Acm Conference On Computer and Communications Security. 43-54. DOI: 10.1145/2381913.2381922  0.314
2012 Reeves J, Ramaswamy A, Locasto M, Bratus S, Smith S. Intrusion detection for resource-constrained embedded control systems in the power grid International Journal of Critical Infrastructure Protection. 5: 74-83. DOI: 10.1016/J.Ijcip.2012.02.002  0.407
2011 Locasto ME, Massimi M, DePasquale PJ. Security and privacy considerations in digital death Proceedings New Security Paradigms Workshop. 1-10. DOI: 10.1145/2073276.2073278  0.346
2011 Locasto ME, Ghosh AK, Jajodia S, Stavrou A. Virtual extension the ephemeral legion: Producing an expert cyber-security work force from thin air Communications of the Acm. 54: 129-131. DOI: 10.1145/1866739.1866764  0.375
2010 Bratus S, Oakley J, Ramaswamy A, Smith SW, Locasto ME. Katana: Towards Patching as a Runtime Part of the Compiler-Linker-Loader Toolchain International Journal of Secure Software Engineering. 1: 1-17. DOI: 10.4018/Jsse.2010070101  0.393
2010 Bratus S, Locasto ME, Ramaswamy A, Smith SW. VM-based security overkill: A lament for applied systems security research Proceedings New Security Paradigms Workshop. 51-60. DOI: 10.1145/1900546.1900554  0.328
2010 Boyd SW, Kc GS, Locasto ME, Keromytis AD, Prevelakis V. On the general applicability of instruction-set randomization Ieee Transactions On Dependable and Secure Computing. 7: 255-270. DOI: 10.1109/Tdsc.2008.58  0.615
2010 Ramaswamy A, Bratus S, Smith SW, Locasto ME. Katana: A hot patching framework for ELF executables Ares 2010 - 5th International Conference On Availability, Reliability, and Security. 507-512. DOI: 10.1109/ARES.2010.112  0.356
2010 Song Y, Locasto ME, Stavrou A, Keromytis AD, Stolfo SJ. On the infeasibility of modeling polymorphic shellcode : Re-thinking the role of learning in intrusion detection systems Machine Learning. 81: 179-205. DOI: 10.1007/S10994-009-5143-5  0.6
2009 Locasto ME, Bratus S, Schulte B. Bickering in-depth: Rethinking the composition of competing security systems Ieee Security and Privacy. 7: 77-81. DOI: 10.1109/MSP.2009.189  0.409
2008 Cretu GF, Stavrou A, Locasto ME, Stolfo SJ, Keromytis AD. Casting out demons: Sanitizing training data for anomaly sensors Proceedings - Ieee Symposium On Security and Privacy. 81-95. DOI: 10.1109/SP.2008.11  0.436
2008 Locasto ME, Burnside M, Keromytis AD. Online network forensics for automatic repair validation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5312: 136-151. DOI: 10.1007/978-3-540-89598-5-9  0.561
2008 Locasto ME, Stavrou A, Cretu GF, Keromytis AD, Stolfo SJ. Return value predictability profiles for self-healing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5312: 152-166. DOI: 10.1007/978-3-540-89598-5-10  0.524
2008 Stavrou A, Locasto ME, Keromytis AD. Pushback for overlay networks: Protecting against malicious insiders Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5037: 39-54. DOI: 10.1007/978-3-540-68914-0_3  0.513
2007 Locasto ME, Stavrou A, Keromytis AD. Dark application communities Proceedings New Security Paradigms Workshop. 11-18. DOI: 10.1145/1278940.1278943  0.436
2007 Cui W, Peinado M, Wang HJ, Locasto ME. ShieldGen: Automatic data patch generation for unknown vulnerabilities with informed probing Proceedings - Ieee Symposium On Security and Privacy. 252-266. DOI: 10.1109/SP.2007.34  0.316
2007 Aviv AJ, Locasto ME, Potter S, Keromytis AD. SSARES: Secure Searchable Automated Remote Email Storage Proceedings - Annual Computer Security Applications Conference, Acsac. 129-138. DOI: 10.1109/ACSAC.2007.30  0.569
2006 Stavrou A, Locasto ME, Keroniytis AD. WSBcrypt: Encryption as a stylesheet Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3989: 349-364. DOI: 10.1007/11767480_24  0.32
2006 Locasto ME, Wang K, Keromytis AD, Stolfo SJ. FLIPS: Hybrid adaptive intrusion prevention Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3858: 82-101. DOI: 10.1007/11663812_5  0.585
2006 Benny W, Locasto ME, Keromytis AD. PalProtect: A collaborative security approach to comment spam Proceedings of the 2006 Ieee Workshop On Information Assurance. 2006: 170-175.  0.595
2006 Locasto ME, Sidiroglou S, Keromytis AD. Speculative virtual verification: Policy-constrained speculative execution Proceedings New Security Paradigms Workshop. 2006: 119-124.  0.691
2005 Sidiroglou S, Locasto ME, Keromytis AD. Hardware support for self-healing software services Acm Sigarch Computer Architecture News. 33: 42-47. DOI: 10.1145/1055626.1055633  0.603
2005 Locasto ME, Parekh JJ, Keromytis AD, Stolfo SJ. Towards collaborative security and P2P intrusion detection Proceedings From the 6th Annual Ieee System, Man and Cybernetics Information Assurance Workshop, Smc 2005. 2005: 333-339. DOI: 10.1109/IAW.2005.1495971  0.55
2005 Foley S, Singer A, Locasto ME, Sidiroglou S, Keromytis AD, McDermott J, Thorpe J, Van Oorschot P, Somayaji A, Ford R, Bush M, Boulatov A. Highlights from the 2005 new security paradigms workshop Proceedings - Annual Computer Security Applications Conference, Acsac. 2005: 393-394. DOI: 10.1109/CSAC.2005.29  0.672
2004 Locasto ME, Keromytis AD. CamouflageFS: Increasing the effective key length in cryptographic filesystems on the cheap Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3089: 1-15.  0.605
Low-probability matches (unlikely to be authored by this person)
2009 Bratus S, Johnson PC, Ramaswamy A, Smith SW, Locasto ME. The cake is a lie: Privilege rings as a policy resource Proceedings of the Acm Conference On Computer and Communications Security. 33-37. DOI: 10.1145/1655148.1655154  0.295
2010 Bratus S, Locasto ME, Schulte B. SegSlice: Towards a new class of secure programming primitives for trustworthy platforms Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6101: 228-245. DOI: 10.1007/978-3-642-13869-0_15  0.272
2009 Bratus S, Locasto ME, Ramaswamy A, Smith SW. New directions for hardware-assisted trusted computing policies (Position Paper) Future of Trust in Computing: Proceedings of the First International Conference Future of Trust in Computing 2008: With 58 Illustrations. 30-37. DOI: 10.1007/978-3-8348-9324-6_3  0.264
2008 Locasto ME, Stavrou A. The hidden difficulties of watching and rebuilding networks Ieee Security and Privacy. 6: 79-82. DOI: 10.1109/MSP.2008.48  0.261
2007 Locasto ME. Self-healing: Science, engineering, and fiction [position paper] Proceedings New Security Paradigms Workshop. 43-48. DOI: 10.1145/1600176.1600183  0.256
2008 Bratus B, Locasto ME, Ramaswamy A, Smith SW. Traps, events, emulation, and enforcement: Managing the Yin and Yang of virtualization-based security Proceedings of the Acm Conference On Computer and Communications Security. 49-58. DOI: 10.1145/1456482.1456491  0.253
2014 Bratus S, Bangert J, Gabrovsky A, Shubina A, Locasto ME, Bilar D. 'Weird Machine' patterns Cyberpatterns: Unifying Design Patterns With Security and Attack Patterns. 157-171. DOI: 10.1007/978-3-319-04447-7_13  0.235
2003 Hulme M, Locasto M. Using the web to enhance and transform education Acm Crossroads Student Magazine. 10: 6-6. DOI: 10.1145/973381.973387  0.215
2009 Cretu-Ciocarlie GF, Stavrou A, Locasto ME, Stolfo SJ. Adaptive anomaly detection via self-calibration and dynamic updating Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5758: 41-60. DOI: 10.1007/978-3-642-04342-0_3  0.193
2011 Locasto ME, Little MC. A failure-based discipline of trustworthy information systems Ieee Security and Privacy. 9: 71-75. DOI: 10.1109/MSP.2011.77  0.192
2012 Depasquale PJ, Locasto ME, Kaczmarczyk L, Martinovic M. // TODO: Help students improve commenting practices Proceedings - Frontiers in Education Conference, Fie. DOI: 10.1109/FIE.2012.6462504  0.181
2009 Locasto ME. Helping students 0wn their own code Ieee Security and Privacy. 7: 53-56. DOI: 10.1109/MSP.2009.66  0.169
2016 Weiss R, Locasto ME, Mache J. A reflective approach to assessing student performance in cybersecurity exercises Sigcse 2016 - Proceedings of the 47th Acm Technical Symposium On Computing Science Education. 597-602. DOI: 10.1145/2839509.2844646  0.14
2009 Stavrou A, Cretu-Ciocarlie GF, Locasto ME, Stolfo SJ. Keep your friends close: The necessity for updating an anomaly sensor with legitimate environment changes Proceedings of the Acm Conference On Computer and Communications Security. 39-45. DOI: 10.1145/1654988.1655000  0.128
2010 Bratus S, Shubina A, Locasto ME. Teaching the principles of the Hacker Curriculum to undergraduates Sigcse'10 - Proceedings of the 41st Acm Technical Symposium On Computer Science Education. 122-126. DOI: 10.1145/1734263.1734303  0.045
Hide low-probability matches.