Michael LeMay

Orcid: 0000-0001-6206-9642

According to our database1, Michael LeMay authored at least 22 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023

Going beyond the Limits of SFI: Flexible and Secure Hardware-Assisted In-Process Isolation with HFI.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2022
Isolation without taxation: near-zero-cost transitions for WebAssembly and SFI.
Proc. ACM Program. Lang., 2022

2021
The Endokernel: Fast, Secure, and Programmable Subprocess Virtualization.
CoRR, 2021

Isolation Without Taxation: Near Zero Cost Transitions for SFI.
CoRR, 2021

Cryptographic Capability Computing.
Proceedings of the MICRO '21: 54th Annual IEEE/ACM International Symposium on Microarchitecture, 2021

2015
Power-Based Diagnosis of Node Silence in Remote High-End Sensing Systems.
ACM Trans. Sens. Networks, 2015

Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware.
Proceedings of the Logic, Rewriting, and Concurrency, 2015

2012
Cumulative Attestation Kernels for Embedded Systems.
IEEE Trans. Smart Grid, 2012

2011
Enforcing Executing-Implies-Verified with the Integrity-Aware Processor.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Power watermarking: Facilitating power-based diagnosis of node silence in remote high-end sensing systems.
Proceedings of the 10th International Conference on Information Processing in Sensor Networks, 2011

Reliable telemetry in white spaces using remote attestation.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Diagnostic powertracing for sensor node failure analysis.
Proceedings of the 9th International Conference on Information Processing in Sensor Networks, 2010

2009
Sh@re: Negotiated Audit in Social Networks.
Proceedings of the IEEE International Conference on Systems, 2009

Collaborative Recommender Systems for Building Automation.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

2008
An Integrated Architecture for Demand Response Communications and Control.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

2007
PolicyMorph: interactive policy transformations for a logical attribute-based access control framework.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Supporting Emergency-Response by Retasking Network Infrastructures.
Proceedings of the 6th ACM Workshop on Hot Topics in Networks, 2007

Unified Architecture for Large-Scale Attested Metering.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2006
Acoustic Surveillance of Physically Unmodified PCs.
Proceedings of the 2006 International Conference on Security & Management, 2006

2004
Abstracting Low-Level Network Programming with ACE, A Pattern-Oriented Network Programming Framework.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004


  Loading...