Michael LeMay
  • Bio
  • Experience
  • Patents
  • Papers
  • Talks
  • Posts
  • Projects
  • Patents
  • Projects
    • Cryptographic Capability Computing (C3)
    • Memory safety with no additional metadata
    • FPGA-powered candy dispenser
    • Using Intel MPX or segmentation to harden SafeStack
    • HTTP-controlled MIDI alert bell connected via Ethernet
    • Python X10 CM19A driver (unofficial)
    • X86 lightweight protection domain support for Contiki
  • Projects
  • Experience
  • Blog
    • Combining tools to detach Delta single-hole kitchen faucets
    • Adding a heat pump alongside a natural gas furnace with tight duct turns
    • Gardening in a suburb of Portland, Oregon
  • Publications
    • Segue & ColorGuard: Optimizing SFI Performance and Scalability on Modern Architectures
    • Cryptographic Memory Tagging: Towards Stateless Integrity
    • Memory Tagging using Cryptographic Memory Integrity on Commodity x86 CPUs (runner-up for distinguished paper award ๐Ÿ†)
    • Hardware-Assisted Fault Isolation: Going Beyond the Limits of Software-Based Sandboxing (top picks ๐Ÿ†)
    • MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware
    • EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks
    • Going beyond the Limits of SFI: Flexible and Secure Hardware-Assisted In-Process Isolation with HFI (distinguished paper award, Intel Hardware Security Academic Award honorable mention ๐Ÿ†)
    • Segue & ColorGuard: Optimizing SFI Performance and Scalability on Modern x86
    • Isolation without Taxation: Near-Zero-Cost Transitions for WebAssembly and SFI
    • Cryptographic Capability Computing
    • The Endokernel: Fast, Secure, and Programmable Subprocess Virtualization
    • Isolation Without Taxation: Near Zero Cost Transitions for SFI
    • Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware
    • Power-Based Diagnosis of Node Silence in Remote High-End Sensing Systems
    • Protecting Sensor Data from Malware Attacks (pages 178-197)
    • Cumulative Attestation Kernels for Embedded Systems
    • Reliable telemetry in white spaces using remote attestation
    • Enforcing Executing-Implies-Verified with the Integrity-Aware Processor
    • Diagnostic Powertracing for Sensor Node Failure Analysis
    • Sh@re: Negotiated audit in social networks
    • Cumulative Attestation Kernels for Embedded Systems
    • Collaborative Recommender Systems for Building Automation
    • An Integrated Architecture for Demand Response Communications and Control (best paper award ๐Ÿ†)
    • Supporting Emergency-Response by Retasking Network Infrastructures
    • PolicyMorph: interactive policy transformations for a logical attribute-based access control framework
    • Unified Architecture for Large-Scale Attested Metering
    • Acoustic Surveillance of Physically Unmodified PCs
    • Comprehensive message control and assurance with the secure email transport protocol
    • Abstracting Low-Level Network Programming With ACE, a Pattern-Oriented Network Programming Framework
  • Recent & Upcoming Talks
    • Keynote: Lightening the Shadows: Metadata-Light Exploit Mitigation Based on Novel Cryptography and X86
  • Teaching

Comprehensive message control and assurance with the secure email transport protocol

Aug 26, 2004ยท
Michael D. LeMay
,
Jack S.E. Tan
ยท 0 min read
DOI
Type
Conference paper
Publication
IEEE Electro/Information Technology Conference
Last updated on Nov 29, 2024

โ† Acoustic Surveillance of Physically Unmodified PCs Jun 1, 2006
Abstracting Low-Level Network Programming With ACE, a Pattern-Oriented Network Programming Framework Jun 1, 2004 โ†’

ยฉ 2025 Michael LeMay.

Published with Hugo Blox Builder โ€” the free, open source website builder that empowers creators.