Остановите войну!
for scientists:
default search action
Michael E. Locasto
Person information
- affiliation: Columbia University, New York City, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c64]Prashant Anantharaman, Robert Lathrop, Rebecca Shapiro, Michael E. Locasto:
PolyDoc: Surveying PDF Files from the PolySwarm network. SP (Workshops) 2023: 117-134 - 2022
- [c63]Prashant Anantharaman, Steven Cheung, Nicholas Boorman, Michael E. Locasto:
A Format-Aware Reducer for Scriptable Rewriting of PDF Files. SP (Workshops) 2022: 136-151 - 2021
- [c62]Prashant Anantharaman, Anmol Chachra, Shikhar Sinha, Michael C. Millian, Bogdan Copos, Sean W. Smith, Michael E. Locasto:
A Communications Validity Detector for SCADA Networks. Critical Infrastructure Protection 2021: 155-183 - 2020
- [c61]Prashant Anantharaman, Liwei Song, Ioannis Agadakos, Gabriela F. Ciocarlie, Bogdan Copos, Ulf Lindqvist, Michael E. Locasto:
IoTHound: environment-agnostic device identification and monitoring. IOT 2020: 7:1-7:9
2010 – 2019
- 2019
- [c60]Michael C. Millian, Prashant Anantharaman, Sergey Bratus, Sean W. Smith, Michael E. Locasto:
Converting an Electric Power Utility Network to Defend Against Crafted Inputs. Critical Infrastructure Protection 2019: 73-85 - 2018
- [c59]Ioannis Agadakos, Gabriela F. Ciocarlie, Bogdan Copos, Tancrède Lepoint, Ulf Lindqvist, Michael E. Locasto, James R. Michaelis:
Risks and Benefits of Side-Channels in Battlefields. FUSION 2018: 2290-2297 - [c58]Richard Weiss, Ambareen Siraj, Jens Mache, Blair Taylor, Siddharth Kaza, Ankur Chattopadhyay, Michael E. Locasto:
Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2018: (Abstract Only). SIGCSE 2018: 1070 - 2017
- [j18]Richard S. Weiss, Franklyn A. Turbak, Jens Mache, Michael E. Locasto:
Cybersecurity Education and Assessment in EDURange. IEEE Secur. Priv. 15(3): 90-95 (2017) - [j17]Sergey Bratus, Lars Hermerschmidt, Sven M. Hallberg, Michael E. Locasto, Falcon Momot, Meredith L. Patterson, Anna Shubina:
Curing the Vulnerable Parser: Design Patterns for Secure Input Handling. login Usenix Mag. 42(1) (2017) - [c57]Ioannis Agadakos, Chien-Ying Chen, Matteo Campanelli, Prashant Anantharaman, Monowar Hasan, Bogdan Copos, Tancrède Lepoint, Michael E. Locasto, Gabriela F. Ciocarlie, Ulf Lindqvist:
Jumping the Air Gap: Modeling Cyber-Physical Attack Paths in the Internet-of-Things. CPS-SPC@CCS 2017: 37-48 - [c56]Richard S. Weiss, Ambareen Siraj, Jens Mache, Elizabeth K. Hawthorne, Blair Taylor, Siddharth Kaza, Michael E. Locasto:
Building and Supporting a Community of CS Educators Teaching Cybersecurity in 2017 (Abstract Only). SIGCSE 2017: 732 - [c55]Richard S. Weiss, Jens Mache, Michael E. Locasto, Franklyn A. Turbak:
Hands-on Cybersecurity Exercises That are Easy to Access and Assess (Abstract Only). SIGCSE 2017: 743 - [c54]Prashant Anantharaman, Michael E. Locasto, Gabriela F. Ciocarlie, Ulf Lindqvist:
Building Hardened Internet-of-Things Clients with Language-Theoretic Security. IEEE Symposium on Security and Privacy Workshops 2017: 120-126 - [c53]Richard S. Weiss, Jens Mache, Michael E. Locasto:
Live Lesson: The EDURange Framework and a Movie-themed Exercise in Network Reconnaissance. ASE @ USENIX Security Symposium 2017 - 2016
- [c52]Benedict Chukuka, Michael E. Locasto:
A Survey of Ethical Agreements in Information Security Courses. SIGCSE 2016: 479-484 - [c51]Richard S. Weiss, Michael E. Locasto, Jens Mache:
A Reflective Approach to Assessing Student Performance in Cybersecurity Exercises. SIGCSE 2016: 597-602 - [c50]Richard Weiss, Michael E. Locasto, Jens Mache, Blair Taylor, Elizabeth K. Hawthorne, Siddharth Kaza, Ambareen Siraj:
Assessment of Security Knowledge, Skills and Abilities using Hands-On Exercises in 2016 (Abstract Only). SIGCSE 2016: 709 - [c49]Katherine Underwood, Michael E. Locasto:
In Search of Shotgun Parsers in Android Applications. IEEE Symposium on Security and Privacy Workshops 2016: 140-155 - [c48]Richard S. Weiss, Franklyn A. Turbak, Jens Mache, Erik Nilsen, Michael E. Locasto:
Finding the Balance Between Guidance and Independence in Cybersecurity Exercises. ASE @ USENIX Security Symposium 2016 - 2015
- [c47]Richard S. Weiss, Stefan Boesen, James F. Sullivan, Michael E. Locasto, Jens Mache, Erik Nilsen:
Teaching Cybersecurity Analysis Skills in the Cloud. SIGCSE 2015: 332-337 - [c46]Richard S. Weiss, Michael E. Locasto, Jens Mache, Blair Taylor, Elizabeth K. Hawthorne, Justin Cappos, Ambareen Siraj:
Teaching Security Using Hands-on Exercises in 2015 (Abstract Only). SIGCSE 2015: 695 - 2014
- [j16]Sergey Bratus, Trey Darley, Michael E. Locasto, Meredith L. Patterson, Rebecca Shapiro, Anna Shubina:
Beyond Planted Bugs in "Trusting Trust": The Input-Processing Frontier. IEEE Secur. Priv. 12(1): 83-87 (2014) - [j15]Sergey Bratus, Iván Arce, Michael E. Locasto, Stefano Zanero:
Why Offensive Security Needs Engineering Textbooks: Or, How to Avoid a Replay of "Crypto Wars" in Security Research. login Usenix Mag. 39(4) (2014) - [j14]Sergey Bratus, Michael E. Locasto, Anna Shubina:
Why Wassenaar Arrangement's Definitions of "Intrusion Software" and "Controlled Items" Put Security Research and Defense At Risk. login Usenix Mag. 39(4) (2014) - [c45]Benjamin Edwards, Michael E. Locasto, Jeremy Epstein:
Panel Summary: The Future of Software Regulation. NSPW 2014: 117-126 - [c44]Jonathan Gallagher, Robin Gonzalez, Michael E. Locasto:
Verifying security patches. PSP 2014: 11-18 - [c43]Richard S. Weiss, Michael E. Locasto, Jens Mache, Elizabeth K. Hawthorne, Justin Cappos:
Teaching security using hands-on exercises (abstract only). SIGCSE 2014: 736 - [c42]Richard S. Weiss, Jens Mache, Michael E. Locasto, Vincent Nestler:
Hands-on cybersecurity exercises in the EDURange framework (abstract only). SIGCSE 2014: 746 - [c41]Stefan Boesen, Richard S. Weiss, James F. Sullivan, Michael E. Locasto, Jens Mache, Erik Nilsen:
EDURange: Meeting the Pedagogical Challenges of Student Participation in Cybertraining Environments. CSET 2014 - [c40]Sarah Laing, Michael E. Locasto, John Aycock:
An Experience Report on Extracting and Viewing Memory Events via Wireshark. WOOT 2014 - [p1]Sergey Bratus, Julian Bangert, Alexandar Gabrovsky, Anna Shubina, Michael E. Locasto, Daniel Bilar:
'Weird Machine' Patterns. Cyberpatterns 2014: 157-171 - 2013
- [j13]Len Sassaman, Meredith L. Patterson, Sergey Bratus, Michael E. Locasto:
Security Applications of Formal Language Theory. IEEE Syst. J. 7(3): 489-500 (2013) - [c39]Richard S. Weiss, Michael E. Locasto, Jens Mache, Blair Taylor, Elizabeth K. Hawthorne:
Teaching security using hands-on exercises (abstract only). SIGCSE 2013: 754 - [c38]Richard S. Weiss, Vincent Nestler, Michael E. Locasto, Jens Mache, Brian Hay:
Hands-on cybersecurity exercises and the rave virtual environment (abstract only). SIGCSE 2013: 759 - [e2]Michael J. Jacobson Jr., Michael E. Locasto, Payman Mohassel, Reihaneh Safavi-Naini:
Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings. Lecture Notes in Computer Science 7954, Springer 2013, ISBN 978-3-642-38979-5 [contents] - 2012
- [j12]Jason Reeves, Ashwin Ramaswamy, Michael E. Locasto, Sergey Bratus, Sean W. Smith:
Intrusion detection for resource-constrained embedded control systems in the power grid. Int. J. Crit. Infrastructure Prot. 5(2): 74-83 (2012) - [c37]John Aycock, Daniel Medeiros Nunes de Castro, Michael E. Locasto, Chris Jarabek:
Babel: a secure computer is a polyglot. CCSW 2012: 43-54 - [c36]Gaven J. Watson, Reihaneh Safavi-Naini, Mohsen Alimomeni, Michael E. Locasto, Shivaramakrishnan Narayan:
LoSt: location based storage. CCSW 2012: 59-70 - [c35]Peter J. DePasquale, Michael E. Locasto, Lisa C. Kaczmarczyk, Mike Martinovic:
// TODO: Help students improve commenting practices. FIE 2012: 1-6 - [c34]Peter DePasquale, Michael E. Locasto, Lisa C. Kaczmarczyk:
Identifying effective pedagogical practices for commenting computer source code (abstract only). SIGCSE 2012: 678 - [c33]Richard S. Weiss, Michael E. Locasto, Jens Mache:
Hacking and the security curriculum: building community (abstract only). SIGCSE 2012: 680 - [c32]Saran Neti, Anil Somayaji, Michael E. Locasto:
Software Diversity: Security, Entropy and Game Theory. HotSec 2012 - 2011
- [j11]Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia, Angelos Stavrou:
The ephemeral legion: producing an expert cyber-security work force from thin air. Commun. ACM 54(1): 129-131 (2011) - [j10]Michael E. Locasto, Matthew C. Little:
A Failure-Based Discipline of Trustworthy Information Systems. IEEE Secur. Priv. 9(4): 71-75 (2011) - [j9]Sergey Bratus, Michael E. Locasto, Meredith L. Patterson, Len Sassaman, Anna Shubina:
Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation. login Usenix Mag. 36(6) (2011) - [c31]Jason Reeves, Ashwin Ramaswamy, Michael E. Locasto, Sergey Bratus, Sean W. Smith:
Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems. Critical Infrastructure Protection 2011: 31-46 - [c30]John F. Williamson, Sergey Bratus, Michael E. Locasto:
Using Active Intrusion Detection to Recover Network Trust. LISA 2011 - [c29]Michael E. Locasto, Michael Massimi, Peter DePasquale:
Security and privacy considerations in digital death. NSPW 2011: 1-10 - [e1]Robert H'obbes' Zakon, John P. McDermott, Michael E. Locasto:
Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011. ACM 2011, ISBN 978-1-4503-0672-0 [contents] - [r1]Michael E. Locasto:
CPU Denial of Service. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 268-269 - 2010
- [j8]Sergey Bratus, James Oakley, Ashwin Ramaswamy, Sean W. Smith, Michael E. Locasto:
Katana: Towards Patching as a Runtime Part of the Compiler-Linker-Loader Toolchain. Int. J. Secur. Softw. Eng. 1(3): 1-17 (2010) - [j7]Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo:
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems. Mach. Learn. 81(2): 179-205 (2010) - [j6]Stephen W. Boyd, Gaurav S. Kc, Michael E. Locasto, Angelos D. Keromytis, Vassilis Prevelakis:
On the General Applicability of Instruction-Set Randomization. IEEE Trans. Dependable Secur. Comput. 7(3): 255-270 (2010) - [c28]Ashwin Ramaswamy, Sergey Bratus, Sean W. Smith, Michael E. Locasto:
Katana: A Hot Patching Framework for ELF Executables. ARES 2010: 507-512 - [c27]Sergey Bratus, Michael E. Locasto, Ashwin Ramaswamy, Sean W. Smith:
VM-based security overkill: a lament for applied systems security research. NSPW 2010: 51-60 - [c26]Sergey Bratus, Anna Shubina, Michael E. Locasto:
Teaching the principles of the hacker curriculum to undergraduates. SIGCSE 2010: 122-126 - [c25]Sergey Bratus, Michael E. Locasto, Brian Schulte:
SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms. TRUST 2010: 228-245
2000 – 2009
- 2009
- [j5]Michael E. Locasto:
Helping Students 0wn Their Own Code. IEEE Secur. Priv. 7(3): 53-56 (2009) - [j4]Michael E. Locasto, Sergey Bratus, Brian Schulte:
Bickering In-Depth: Rethinking the Composition of Competing Security Systems. IEEE Secur. Priv. 7(6): 77-81 (2009) - [c24]Sergey Bratus, Peter C. Johnson, Ashwin Ramaswamy, Sean W. Smith, Michael E. Locasto:
The cake is a lie: privilege rings as a policy resource. VMSec@CCS 2009: 33-38 - [c23]Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Michael E. Locasto, Salvatore J. Stolfo:
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. AISec 2009: 39-46 - [c22]Michael E. Locasto, Matthew Burnside, Darrell Bethea:
Pushing Boulders Uphill: The Difficulty of Network Intrusion Recovery. LISA 2009: 1-13 - [c21]Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo:
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating. RAID 2009: 41-60 - [c20]Sergey Bratus, David Kotz, Keren Tan, William Taylor, Anna Shubina, Bennet Vance, Michael E. Locasto:
Dartmouth Internet Security Testbed (DIST): Building a Campus-wide Wireless Testbed. CSET 2009 - 2008
- [j3]Michael E. Locasto, Angelos Stavrou:
The Hidden Difficulties of Watching and Rebuilding Networks. IEEE Secur. Priv. 6(2): 79-82 (2008) - [c19]Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis:
Pushback for Overlay Networks: Protecting Against Malicious Insiders. ACNS 2008: 39-54 - [c18]Sergey Bratus, Michael E. Locasto, Ashwin Ramaswamy, Sean W. Smith:
Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security. VMSec 2008: 49-58 - [c17]Michael E. Locasto, Matthew Burnside, Angelos D. Keromytis:
Online Network Forensics for Automatic Repair Validation. IWSEC 2008: 136-151 - [c16]Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo:
Return Value Predictability Profiles for Self-healing. IWSEC 2008: 152-166 - [c15]Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis:
Casting out Demons: Sanitizing Training Data for Anomaly Sensors. SP 2008: 81-95 - 2007
- [c14]Adam J. Aviv, Michael E. Locasto, Shaya Potter, Angelos D. Keromytis:
SSARES: Secure Searchable Automated Remote Email Storage. ACSAC 2007: 129-139 - [c13]Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo:
On the infeasibility of modeling polymorphic shellcode. CCS 2007: 541-551 - [c12]Michael E. Locasto:
Self-healing: science, engineering, and fiction. NSPW 2007: 43-48 - [c11]Anil Somayaji, Michael E. Locasto, Jan Feyereisl:
The future of biologically-inspired security: is there anything left to learn? NSPW 2007: 49-54 - [c10]Weidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto:
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. S&P 2007: 252-266 - [c9]Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis:
From STEM to SEAD: Speculative Execution for Automated Defense. USENIX Annual Technical Conference 2007: 219-232 - 2006
- [c8]Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis:
W3Bcrypt: Encryption as a Stylesheet. ACNS 2006: 349-364 - [c7]Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis:
Software Self-Healing Using Collaborative Application Communities. NDSS 2006 - [c6]Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis:
Dark application communities. NSPW 2006: 11-18 - 2005
- [j2]Stelios Sidiroglou, Michael E. Locasto, Angelos D. Keromytis:
Hardware support for self-healing software services. SIGARCH Comput. Archit. News 33(1): 42-47 (2005) - [c5]Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John P. McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov:
Highlights from the 2005 New Security Paradigms Workshop. ACSAC 2005: 393-396 - [c4]Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis:
Speculative virtual verification: policy-constrained speculative execution. NSPW 2005: 119-124 - [c3]Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo:
FLIPS: Hybrid Adaptive Intrusion Prevention. RAID 2005: 82-101 - [c2]Stelios Sidiroglou, Michael E. Locasto, Stephen W. Boyd, Angelos D. Keromytis:
Building a Reactive Immune System for Software Services. USENIX Annual Technical Conference, General Track 2005: 149-161 - 2004
- [c1]Michael E. Locasto, Angelos D. Keromytis:
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap. ACNS 2004: 1-15 - 2003
- [j1]Michael Hulme, Michael E. Locasto:
Using the web to enhance and transform education. ACM Crossroads 10(1): 6 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-12-18 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint