Michael E. Locasto
Affiliations:- Columbia University, New York City, USA
According to our database1,
Michael E. Locasto
authored at least 86 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
The HTTP Garden: Discovering Parsing Vulnerabilities in HTTP/1.1 Implementations by Differential Fuzzing of Request Streams.
CoRR, 2024
Weird Machines in Package Managers: A Case Study of Input Language Complexity and Emergent Execution in Software Systems.
Proceedings of the IEEE Security and Privacy, 2024
2023
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023
2022
Proceedings of the 43rd IEEE Security and Privacy, 2022
2021
Proceedings of the Critical Infrastructure Protection XV, 2021
2020
Proceedings of the IoT '20: 10th International Conference on the Internet of Things, 2020
2019
Proceedings of the Critical Infrastructure Protection XIII, 2019
2018
Integrating Hands-on Cybersecurity Exercises into the Curriculum in 2018: (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018
Proceedings of the 21st International Conference on Information Fusion, 2018
2017
login Usenix Mag., 2017
Live Lesson: The EDURange Framework and a Movie-themed Exercise in Network Reconnaissance.
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
Building and Supporting a Community of CS Educators Teaching Cybersecurity in 2017 (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017
2016
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016
Assessment of Security Knowledge, Skills and Abilities using Hands-On Exercises in 2016 (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016
2015
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015
2014
Why Wassenaar Arrangement's Definitions of "Intrusion Software" and "Controlled Items" Put Security Research and Defense At Risk.
login Usenix Mag., 2014
Why Offensive Security Needs Engineering Textbooks: Or, How to Avoid a Replay of "Crypto Wars" in Security Research.
login Usenix Mag., 2014
IEEE Secur. Priv., 2014
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014
EDURange: Meeting the Pedagogical Challenges of Student Participation in Cybertraining Environments.
Proceedings of the 7th Workshop on Cyber Security Experimentation and Test, 2014
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014
Proceedings of the 2014 International Workshop on Privacy & Security in Programming, 2014
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014
2013
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013
2012
Intrusion detection for resource-constrained embedded control systems in the power grid.
Int. J. Crit. Infrastructure Prot., 2012
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012
Identifying effective pedagogical practices for commenting computer source code (abstract only).
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012
Proceedings of the IEEE Frontiers in Education Conference, 2012
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation.
login Usenix Mag., 2011
IEEE Secur. Priv., 2011
Commun. ACM, 2011
Proceedings of the 2011 New Security Paradigms Workshop, 2011
Proceedings of the Past, 2011
Proceedings of the Critical Infrastructure Protection V, 2011
2010
IEEE Trans. Dependable Secur. Comput., 2010
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems.
Mach. Learn., 2010
Int. J. Secur. Softw. Eng., 2010
SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the 41st ACM technical symposium on Computer science education, 2010
Proceedings of the 2010 Workshop on New Security Paradigms, 2010
Proceedings of the ARES 2010, 2010
2009
IEEE Secur. Priv., 2009
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the 23rd Large Installation System Administration Conference, 2009
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes.
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2009
2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the Advances in Information and Computer Security, 2008
Proceedings of the Advances in Information and Computer Security, 2008
Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
Proceedings of the 2007 USENIX Annual Technical Conference, 2007
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, USA, 2007
Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, USA, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Proceedings of the New Security Paradigms Workshop 2006, 2006
Proceedings of the Network and Distributed System Security Symposium, 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
SIGARCH Comput. Archit. News, 2005
Proceedings of the 2005 USENIX Annual Technical Conference, 2005
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005
Proceedings of the New Security Paradigms Workshop 2005, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap.
Proceedings of the Applied Cryptography and Network Security, 2004
2003