Michael LeMay
  • Bio
  • Experience
  • Patents
  • Papers
  • Talks
  • Posts
  • Projects
  • Patents
  • Projects
    • Cryptographic Capability Computing (C3)
    • Memory safety with no additional metadata
    • FPGA-powered candy dispenser
    • Using Intel MPX or segmentation to harden SafeStack
    • HTTP-controlled MIDI alert bell connected via Ethernet
    • Python X10 CM19A driver (unofficial)
    • X86 lightweight protection domain support for Contiki
  • Projects
  • Experience
  • Blog
    • Combining tools to detach Delta single-hole kitchen faucets
    • Adding a heat pump alongside a natural gas furnace with tight duct turns
    • Gardening in a suburb of Portland, Oregon
  • Publications
    • Segue & ColorGuard: Optimizing SFI Performance and Scalability on Modern Architectures
    • Cryptographic Memory Tagging: Towards Stateless Integrity
    • Memory Tagging using Cryptographic Memory Integrity on Commodity x86 CPUs (runner-up for distinguished paper award ๐Ÿ†)
    • Hardware-Assisted Fault Isolation: Going Beyond the Limits of Software-Based Sandboxing (top picks ๐Ÿ†)
    • MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware
    • EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks
    • Going beyond the Limits of SFI: Flexible and Secure Hardware-Assisted In-Process Isolation with HFI (distinguished paper award, Intel Hardware Security Academic Award honorable mention ๐Ÿ†)
    • Segue & ColorGuard: Optimizing SFI Performance and Scalability on Modern x86
    • Isolation without Taxation: Near-Zero-Cost Transitions for WebAssembly and SFI
    • Cryptographic Capability Computing
    • The Endokernel: Fast, Secure, and Programmable Subprocess Virtualization
    • Isolation Without Taxation: Near Zero Cost Transitions for SFI
    • Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware
    • Power-Based Diagnosis of Node Silence in Remote High-End Sensing Systems
    • Protecting Sensor Data from Malware Attacks (pages 178-197)
    • Cumulative Attestation Kernels for Embedded Systems
    • Reliable telemetry in white spaces using remote attestation
    • Enforcing Executing-Implies-Verified with the Integrity-Aware Processor
    • Diagnostic Powertracing for Sensor Node Failure Analysis
    • Sh@re: Negotiated audit in social networks
    • Cumulative Attestation Kernels for Embedded Systems
    • Collaborative Recommender Systems for Building Automation
    • An Integrated Architecture for Demand Response Communications and Control (best paper award ๐Ÿ†)
    • Supporting Emergency-Response by Retasking Network Infrastructures
    • PolicyMorph: interactive policy transformations for a logical attribute-based access control framework
    • Unified Architecture for Large-Scale Attested Metering
    • Acoustic Surveillance of Physically Unmodified PCs
    • Comprehensive message control and assurance with the secure email transport protocol
    • Abstracting Low-Level Network Programming With ACE, a Pattern-Oriented Network Programming Framework
  • Recent & Upcoming Talks
    • Keynote: Lightening the Shadows: Metadata-Light Exploit Mitigation Based on Novel Cryptography and X86
  • Teaching

HTTP-controlled MIDI alert bell connected via Ethernet

Jan 21, 2017ยท
Michael LeMay
Michael LeMay
ยท 0 min read
Go to Project Site
Last updated on Apr 24, 2022
Michael LeMay
Authors
Michael LeMay
Senior Staff Research Scientist
Views expressed are my own and do not necessarily represent those of my employer. #IamIntel

โ† Using Intel MPX or segmentation to harden SafeStack Feb 7, 2017
Python X10 CM19A driver (unofficial) Jan 16, 2017 โ†’

ยฉ 2025 Michael LeMay.

Published with Hugo Blox Builder โ€” the free, open source website builder that empowers creators.