Michael LeMay
Michael LeMay
Home
Projects
Talks
Publications
Patents
Skills
Service
Awards
Hobbies
Contact
Posts
Light
Dark
Automatic
Publications
Type
Conference paper
Journal article
Preprint
Date
2024
2023
2022
2021
2015
2014
2012
2011
2010
2009
2008
2007
2006
2004
Bharath Namboothiry
,
David Durham
,
Christoph Dobraunig
,
Michael LeMay
(2024).
Cryptographic Memory Tagging: Towards Stateless Integrity
. Hardware and Architectural Support for Security and Privacy (HASP).
PDF
DOI
David Schrammel
,
Martin Unterguggenberger
,
Lukas Lamster
,
Salmin Sultana
,
Karanvir Grewal
,
Michael LeMay
,
David M. Durham
,
Stefan Mangard
(2024).
Memory Tagging using Cryptographic Memory Integrity on Commodity x86 CPUs (runner-up for distinguished paper award 🏆)
. European Symposium on Security and Privacy (Euro S&P).
PDF
Shravan Narayan
,
Tal Garfinkel
,
Mohammadkazem Taram
,
Joey Rudek
,
Daniel Moghimi
,
Evan Johnson
,
Chris Fallin
,
Anjo Vahldiek-Oberwagner
,
Michael LeMay
,
Ravi Sahita
,
Dean Tullsen
,
Deian Stefan
(2024).
Hardware-Assisted Fault Isolation: Going Beyond the Limits of Software-Based Sandboxing (top picks 🏆)
. IEEE Micro Top Picks 2024.
DOI
David Schrammel
,
Salmin Sultana
,
Michael LeMay
,
David Durham
,
Martin Unterguggenberger
,
Pascal Nasahl
,
Stefan Mangard
(2023).
MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware
. Security and Cryptography (SECRYPT).
DOI
Pascal Nasahl
,
Salmin Sultana
,
Hans Liljestrand
,
Karanvir Grewal
,
Michael LeMay
,
David M. Durham
,
David Schrammel
,
Stefan Mangard
(2023).
EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks
. Hardware Oriented Security and Trust (HOST).
DOI
Shravan Narayan
,
Tal Garfinkel
,
Mohammadkazem Taram
,
Joey Rudek
,
Daniel Moghimi
,
Evan Johnson
,
Chris Fallin
,
Anjo Vahldiek-Oberwagner
,
Michael LeMay
,
Ravi Sahita
,
Dean Tullsen
,
Deian Stefan
(2023).
Going beyond the Limits of SFI: Flexible and Secure Hardware-Assisted In-Process Isolation with HFI (distinguished paper award, Intel Hardware Security Academic Award honorable mention 🏆)
. Architectural Support for Programming Languages and Operating Systems (ASPLOS).
PDF
Video
DOI
Shravan Narayan
,
Tal Garfinkel
,
Evan Johnson
,
David Thien
,
Joey Rudek
,
Michael LeMay
,
Anjo Vahldiek-Oberwagner
,
Dean Tullsen
,
Deian Stefan
(2022).
Segue & ColorGuard: Optimizing SFI Performance and Scalability on Modern x86
. Programming Languages and Analysis for Security (PLAS).
PDF
Matthew Kolosick
,
Shravan Ravi Narayan
,
Evan Johnson
,
Conrad Watt
,
Michael LeMay
,
Deepak Garg
,
Ranjit Jhala
,
Deian Stefan
(2022).
Isolation without Taxation: Near-Zero-Cost Transitions for WebAssembly and SFI
. Principles of Programming Languages (POPL).
PDF
Project
Video
DOI
Michael LeMay
,
Joydeep Rakshit
,
Sergej Deutsch
,
David M. Durham
,
Santosh Ghosh
,
Anant Nori
,
Jayesh Gaur
,
Andrew Weiler
,
Salmin Sultana
,
Karanvir Grewal
,
Sreenivas Subramoney
(2021).
Cryptographic Capability Computing
. MICRO.
DOI
Bumjin Im
,
Fangfei Yang
,
Chia-Che Tsai
,
Michael LeMay
,
Anjo Vahldiek-Oberwagner
,
Nathan Dautenhahn
(2021).
The Endokernel: Fast, Secure, and Programmable Subprocess Virtualization
. arXiv.
PDF
Matthew Kolosick
,
Shravan Narayan
,
Evan Johnson
,
Conrad Watt
,
Michael LeMay
,
Deepak Garg
,
Ranjit Jhala
,
Deian Stefan
(2021).
Isolation Without Taxation: Near Zero Cost Transitions for SFI
. Foundations of Computer Security (FCS).
PDF
Project
Michael LeMay
,
Carl A. Gunter
(2015).
Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware
. Logic, Rewriting, and Concurrency (LRC).
PDF
DOI
Yong Yang
,
Lu Su
,
Mohammad Maifi Khan
,
Michael LeMay
,
Tarek F. Abdelzaher
,
Jiawei Han
(2014).
Power-Based Diagnosis of Node Silence in Remote High-End Sensing Systems
. ACM Transactions on Sensor Networks (ToSN).
PDF
DOI
Jonathan Edwards
,
Ken Grewal
,
Michael LeMay
,
Scott H. Robinson
,
Ravi Sahita
,
Carl Woodward
(2014).
Protecting Sensor Data from Malware Attacks (pages 178-197)
. Intel Technology Journal (ITJ).
PDF
Michael LeMay
,
Carl A. Gunter
(2012).
Cumulative Attestation Kernels for Embedded Systems
. IEEE Transactions on Smart Grid (ToSG).
PDF
DOI
Omid Fatemieh
,
Michael LeMay
,
Carl A. Gunter
(2011).
Reliable telemetry in white spaces using remote attestation
. Annual Computer Security Applications Conference (ACSAC).
PDF
Slides
DOI
Michael LeMay
,
Carl A. Gunter
(2011).
Enforcing Executing-Implies-Verified with the Integrity-Aware Processor
. TRUST.
PDF
Slides
DOI
Yong Yang
,
Lu Su
,
Mohammad Khan
,
Michael LeMay
,
Tarek Abdelzaher
,
Jiawei Han
(2010).
Diagnostic Powertracing for Sensor Node Failure Analysis
. Information Processing in Sensor Networks (IPSN).
PDF
DOI
Alejandro Gutierrez
,
Apeksha Godiyal
,
Matt Stockton
,
Michael LeMay
,
Carl A. Gunter
,
Roy H. Campbell
(2009).
Sh@re: Negotiated audit in social networks
. Systems, Man and Cybernetics (SMC).
PDF
DOI
Michael LeMay
,
Carl A. Gunter
(2009).
Cumulative Attestation Kernels for Embedded Systems
. European Symposium on Research in Computer Security (ESORICS).
PDF
Slides
DOI
Michael LeMay
,
Jason J. Haas
,
Carl A. Gunter
(2009).
Collaborative Recommender Systems for Building Automation
. Hawaii International Conference on System Sciences (HICSS).
PDF
Slides
DOI
Michael LeMay
,
Rajesh Nelli
,
George Gross
,
Carl A. Gunter
(2008).
An Integrated Architecture for Demand Response Communications and Control (best paper award 🏆)
. Hawaii International Conference on System Sciences (HICSS).
PDF
Slides
DOI
Michael LeMay
,
Carl A. Gunter
(2007).
Supporting Emergency-Response by Retasking Network Infrastructures
. HotNets.
PDF
Slides
Michael LeMay
,
Omid Fatemieh
,
Carl A. Gunter
(2007).
PolicyMorph: interactive policy transformations for a logical attribute-based access control framework
. Symposium on Access Control Models and Technologies (SACMAT).
PDF
Slides
DOI
Michael LeMay
,
George Gross
,
Carl A. Gunter
,
Sanjam Garg
(2007).
Unified Architecture for Large-Scale Attested Metering
. Hawaii International Conference on System Sciences (HICSS).
PDF
Slides
DOI
Michael LeMay
,
Jack Tan
(2006).
Acoustic Surveillance of Physically Unmodified PCs
. Security and Management (SAM).
PDF
Slides
Michael D. LeMay
,
Jack S.E. Tan
(2004).
Comprehensive message control and assurance with the secure email transport protocol
. Electro/Information Technology (EIT).
DOI
Michael LeMay
,
Jack Tan
(2004).
Abstracting Low-Level Network Programming With ACE, a Pattern-Oriented Network Programming Framework
. Software Engineering Research and Practice (SERP).
PDF
Cite
×