Kevin Leach
TitoloCitata daAnno
Spectre: A dependable introspection framework via system management mode
F Zhang, K Leach, K Sun, A Stavrou
2013 43rd Annual IEEE/IFIP international conference on dependable systemsá…, 2013
612013
Using hardware features for increased debugging transparency
F Zhang, K Leach, A Stavrou, H Wang, K Sun
2015 IEEE Symposium on Security and Privacy, 55-69, 2015
502015
A framework to secure peripherals at runtime
F Zhang, H Wang, K Leach, A Stavrou
European Symposium on Research in Computer Security, 219-238, 2014
342014
Assessing social anxiety using gps trajectories and point-of-interest data
Y Huang, H Xiong, K Leach, Y Zhang, P Chow, K Fua, BA Teachman, ...
Proceedings of the 2016 ACM International Joint Conference on Pervasive andá…, 2016
302016
LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis.
C Spensky, H Hu, K Leach
NDSS, 2016
282016
M-SEQ: Early detection of anxiety and depression via temporal orders of diagnoses in electronic health data
J Zhang, H Xiong, Y Huang, H Wu, K Leach, LE Barnes
2015 IEEE International Conference on Big Data (Big Data), 2569-2577, 2015
142015
Trustlogin: Securing password-login on commodity operating systems
F Zhang, K Leach, H Wang, A Stavrou
Proceedings of the 10th ACM Symposium on Information, Computer andá…, 2015
142015
Dyspnea and tracheal mass in an elderly man
KR Leach, FJ Martinez, JW Morelock, MT Korobkin, MB Orringer
Chest 105 (5), 1555-1557, 1994
111994
An uncrewed aerial vehicle attack scenario and trustworthy repair architecture
K Highnam, K Angstadt, K Leach, W Weimer, A Paulos, P Hurley
2016 46th Annual IEEE/IFIP International Conference on Dependable Systemsá…, 2016
102016
Towards transparent introspection
K Leach, C Spensky, W Weimer, F Zhang
2016 IEEE 23rd International Conference on Software Analysis, Evolution, andá…, 2016
92016
Scotch: Combining Software Guard Extensions and system management mode to monitor cloud resource usage
K Leach, F Zhang, W Weimer
International Symposium on Research in Attacks, Intrusions, and Defensesá…, 2017
62017
Towards transparent debugging
F Zhang, K Leach, A Stavrou, H Wang
IEEE Transactions on Dependable and Secure Computing 15 (2), 321-335, 2016
42016
Daehr: A discriminant analysis framework for electronic health record data and an application to early detection of mental health disorders
H Xiong, J Zhang, Y Huang, K Leach, LE Barnes
ACM Transactions on Intelligent Systems and Technology (TIST) 8 (3), 47, 2017
32017
Methods and systems for increased debugging transparency
F Zhang, K Leach, A Stavrou, H Wang
US Patent App. 10/127,137, 2018
22018
A MapReduce framework to improve template matching uncertainty
N Napoli, K Leach, L Barnes, W Weimer
2016 International Conference on Big Data and Smart Computing (BigComp), 77-84, 2016
22016
A 4.4 nW lossless sensor data compression accelerator for 2.9 x system power reduction in wireless body sensors
J Breiholz, F Yahya, CJ Lukas, X Chen, K Leach, D Wentzloff, ...
2017 IEEE 60th International Midwest Symposium on Circuits and Systemsá…, 2017
12017
Methods and Systems for Increased Debugging Transparency
F Zhang, K Leach, A Stavrou, H Wang
US Patent App. 15/173,462, 2016
12016
The State and Future of Genetic Improvement
WB Langdon, W Weimer, C Timperley, O Krauss, ZY Ding, Y Lyu, ...
ACM SIGSOFT Software Engineering Notes 44 (3), 25-29, 2019
2019
Nighthawk: Transparent System Introspection from Ring-3
L Zhou, J Xiao, K Leach, W Weimer, F Zhang, G Wang
European Symposium on Research in Computer Security, 217-238, 2019
2019
Evolutionary computation for improving malware analysis
K Leach, R Dougherty, C Spensky, S Forrest, W Weimer
Proceedings of the 6th International Workshop on Genetic Improvement, 18-19, 2019
2019
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20