dblp.uni-trier.dewww.uni-trier.de

Michael E. Locasto

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
17EEAngelos Stavrou, Michael E. Locasto, Angelos D. Keromytis: Pushback for Overlay Networks: Protecting Against Malicious Insiders. ACNS 2008: 39-54
16EEGabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis: Casting out Demons: Sanitizing Training Data for Anomaly Sensors. IEEE Symposium on Security and Privacy 2008: 81-95
15EEMichael E. Locasto, Matthew Burnside, Angelos D. Keromytis: Online Network Forensics for Automatic Repair Validation. IWSEC 2008: 136-151
14EEMichael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo: Return Value Predictability Profiles for Self-healing. IWSEC 2008: 152-166
13EESergey Bratus, Michael E. Locasto, Ashwin Ramaswamy, Sean W. Smith: Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security. VMSec 2008: 49-58
2007
12EEYingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo: On the infeasibility of modeling polymorphic shellcode. ACM Conference on Computer and Communications Security 2007: 541-551
11EEAdam J. Aviv, Michael E. Locasto, Shaya Potter, Angelos D. Keromytis: SSARES: Secure Searchable Automated Remote Email Storage. ACSAC 2007: 129-139
10EEWeidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto: ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. IEEE Symposium on Security and Privacy 2007: 252-266
9EEMichael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis: From STEM to SEAD: Speculative Execution for Automated Defense. USENIX Annual Technical Conference 2007: 219-232
2006
8EEAngelos Stavrou, Michael E. Locasto, Angelos D. Keromytis: W3Bcrypt: Encryption as a Stylesheet. ACNS 2006: 349-364
7EEMichael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis: Software Self-Healing Using Collaborative Application Communities. NDSS 2006
6EEMichael E. Locasto, Angelos Stavrou, Angelos D. Keromytis: Dark application communities. NSPW 2006: 11-18
2005
5EESimon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov: Highlights from the 2005 New Security Paradigms Workshop. ACSAC 2005: 393-396
4EEMichael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo: FLIPS: Hybrid Adaptive Intrusion Prevention. RAID 2005: 82-101
3EEStelios Sidiroglou, Michael E. Locasto, Stephen W. Boyd, Angelos D. Keromytis: Building a Reactive Immune System for Software Services. USENIX Annual Technical Conference, General Track 2005: 149-161
2EEStelios Sidiroglou, Michael E. Locasto, Angelos D. Keromytis: Hardware support for self-healing software services. SIGARCH Computer Architecture News 33(1): 42-47 (2005)
2004
1EEMichael E. Locasto, Angelos D. Keromytis: CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap. ACNS 2004: 1-15

Coauthor Index

1Adam J. Aviv [11]
2Alex Boulatov [5]
3Stephen W. Boyd [3]
4Sergey Bratus [13]
5Matthew Burnside (Matt Burnside) [15]
6Mark Bush [5]
7Gabriela F. Cretu [9] [14] [16]
8Weidong Cui [10]
9Simon N. Foley [5]
10Richard Ford [5]
11Angelos D. Keromytis [1] [2] [3] [4] [5] [6] [7] [8] [9] [11] [12] [14] [15] [16] [17]
12John McDermott [5]
13Paul C. van Oorschot [5]
14Marcus Peinado [10]
15Shaya Potter [11]
16Ashwin Ramaswamy [13]
17Stelios Sidiroglou [2] [3] [5] [7]
18Abe Singer [5]
19Sean W. Smith [13]
20Anil Somayaji [5]
21Yingbo Song [12]
22Angelos Stavrou [6] [8] [9] [12] [14] [16] [17]
23Salvatore J. Stolfo [4] [12] [14] [16]
24Julie Thorpe [5]
25Helen J. Wang [10]
26Ke Wang [4]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)