Michael LeMay
Open Menu
Close Menu
Bio
Papers
Talks
Posts
Experience
Projects
Publications
Matthew Kolosick
,
Shravan Narayan
,
Evan Johnson
,
Conrad Watt
,
Michael LeMay
,
Deepak Garg
,
Ranjit Jhala
,
Deian Stefan
(2021).
Isolation Without Taxation: Near Zero Cost Transitions for SFI
. Foundations of Computer Security (FCS).
PDF
Project
Michael LeMay
,
Carl A. Gunter
(2015).
Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware
. Logic, Rewriting, and Concurrency (LRC).
PDF
DOI
Yong Yang
,
Lu Su
,
Mohammad Maifi Khan
,
Michael LeMay
,
Tarek F. Abdelzaher
,
Jiawei Han
(2014).
Power-Based Diagnosis of Node Silence in Remote High-End Sensing Systems
. ACM Transactions on Sensor Networks (ToSN).
PDF
DOI
Jonathan Edwards
,
Ken Grewal
,
Michael LeMay
,
Scott H. Robinson
,
Ravi Sahita
,
Carl Woodward
(2014).
Protecting Sensor Data from Malware Attacks (pages 178-197)
. Intel Technology Journal (ITJ).
PDF
Michael LeMay
,
Carl A. Gunter
(2012).
Cumulative Attestation Kernels for Embedded Systems
. IEEE Transactions on Smart Grid (ToSG).
PDF
DOI
Omid Fatemieh
,
Michael LeMay
,
Carl A. Gunter
(2011).
Reliable telemetry in white spaces using remote attestation
. Annual Computer Security Applications Conference (ACSAC).
PDF
Slides
DOI
Michael LeMay
,
Carl A. Gunter
(2011).
Enforcing Executing-Implies-Verified with the Integrity-Aware Processor
. TRUST.
PDF
Slides
DOI
Yong Yang
,
Lu Su
,
Mohammad Khan
,
Michael LeMay
,
Tarek Abdelzaher
,
Jiawei Han
(2010).
Diagnostic Powertracing for Sensor Node Failure Analysis
. Information Processing in Sensor Networks (IPSN).
PDF
DOI
Alejandro Gutierrez
,
Apeksha Godiyal
,
Matt Stockton
,
Michael LeMay
,
Carl A. Gunter
,
Roy H. Campbell
(2009).
Sh@re: Negotiated audit in social networks
. Systems, Man and Cybernetics (SMC).
PDF
DOI
Michael LeMay
,
Carl A. Gunter
(2009).
Cumulative Attestation Kernels for Embedded Systems
. European Symposium on Research in Computer Security (ESORICS).
PDF
Slides
DOI
« Previous
Next »