Kevin Joseph Leach

Beyster 2909 — kjleach@umich.edu

University of Michigan

 

Publications

  1. An Evaluation for Intent Classification and Out-of-Scope Prediction.
    S. Larson, A. Mahendran, J. J. Peper, C. Clarke, A. Lee, P. Hill, J. K. Kummerfeld, K. Leach, M. A. Laurenzano, L. Tang, J. Mars.
    To appear in the 2019 Conference on Empirical Methods in Natural Language Processing (EMNLP 2019). Acceptance rate: 23.8%.
  2. Nighthawk: Transparent System Introspection from Ring -3.
    L. Zhou, J. Xiao, K. Leach, W. Weimer, F. Zhang, G. Wang.
    To appear in the 2019 European Symposium on Research in Computer Security (ESORICS 2019). Acceptance rate: 19.5%.
  3. Evolutionary Computation for Improving Malware Analysis. []
    K. Leach, R. Dougherty, C. Spensky, S. Forrest, W. Weimer.
    In the 5th Genetic Improvement Workshop (GI). Best Presentation Award
  4. Open Source Vulnerability Notification. []
    B. Carlson, K. Leach, D. Marinov, M. Nagappan, A. Prakash.
    In the 15th International Conference on Open Source Systems (OSS).
    In press (IEEE Spectrum).
  5. Distilling Neural Representations of Data Structure Manipulation using fMRI and fNIRS. []
    Y. Huang, X. Liu, R. Krueger, T. Santander, X. Hu, K. Leach, W. Weimer.
    In the 41st ACM/IEEE International Conference on Software Engineering (ICSE). Acceptance rate: 20%. Distinguished Paper Award
  6. Towards Transparent Debugging. []
    F. Zhang, K. Leach, A. Stavrou, H. Wang.
    In IEEE Transactions on Dependable and Secure Computing. (TDSC). Volume 15, Issue 2, pages 321-335. Impact factor: 1.592.
  7. Using Hardware Features for Increased Debugging Transparency.
    F. Zhang, K. Leach, A. Stavrou, H. Wang.
    U.S. Patent No. 10,127,137. November 13, 2018.
  8. Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage.
    K. Leach, F. Zhang, W. Weimer.
    In Research on Attacks, Intrusions, and Defenses 2017. Acceptance Rate: 20%.
  9. A 4.4nW Lossless Sensor Data Compression Acclerator for 2.9x System Power Reduction in Wireless Body Sensors
    J. Breiholz, F. Yahya, C.J. Lukas, X. Chen, K. Leach, D. Wentzloff, B.H. Calhoun.
    In IEEE Midwest Symposium on Circuits and Systems, 2017.
  10. Assessing Social Anxiety Using GPS Trajectories and Point-Of-Interest Data.
    Y. Huang, H. Xiong, K. Leach, Y. Zhang, L. Barnes.
    Inthe ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2016). September 2016. Heidelberg, Germany. Acceptance rate: 23%.
  11. An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture. []
    K. Highnam, K. Angstadt, K. Leach, W. Weimer, A. Paulos, P. Hurley.
    In the 46th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016). July 2016. Toulouse, France.
  12. DAEHR: A Discriminant Analysis Framework for Electronic Health Record Data and an Application to Early Detection of Mental Health Disorders.
    H. Xiong, J. Zhang, Y. Huang, K. Leach, L. Barnes.
    In ACM Transactions on Intelligent Systems and Technology (TIST). December 2015. Impact Factor: 2.414.
  13. LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis. []
    C. Spensky, H. Hu, K. Leach.
    In the Networkand Distributed System Security Symposium 2016 (NDSS 2016).
    February 21-24, 2016. San Diego, CA. Acceptance rate: 15%.
  14. Towards Transparent Introspection. []
    K. Leach, C. Spensky, W. Weimer, F. Zhang.
    In the 23rd IEEE Conference on Software Analysis, Evolution, and Reengineering (SANER 2016)
    March 14-18, 2016. Osaka, Japan.
  15. A MapReduce Framework to Improve Template Matching Uncertainty. []
    N.J. Napoli, K. Leach, L. Barnes, W. Weimer.
    In the 3rd International Conference on Big Data and Smart Computing (BigComp 2016)
    January 18-20, 2016. Hong Kong.
  16. M-SEQ: Early Detection of Anxiety and Depression via Temporal Orders of Diagnoses in Electronic Health Data. []
    J. Zhang, H. Xiong, Y. Huang, H. Wu, K. Leach, L. Barnes.
    In the 2015 IEEE International Conference on Big Data (IEEE Big Data 2015)
    October 29-November 1, 2015. Santa Clara, CA.
  17. Using Hardware Features for Increased Debugging Transparency. []
    F. Zhang, K. Leach, A. Stavrou, H. Wang, K. Sun.
    In the 36th IEEE Symposium on Security and Privacy (Oakland 2015)
    May 18-20, 2015. San Jose, CA. Acceptance rate: 13.5%
  18. TrustLogin: Securing Password-Login on Commodity Operating Systems. []
    F. Zhang, K. Leach, H. Wang, A. Stavrou.
    In Proceedings of the 10th ACM Symposium on Information, Computer, and Communications Security (ASIACCS 2015)
    April 14-17, 2015. Singapore. Acceptance rate: 17.8%.
  19. A Framework to Secure Peripherals at Runtime. []
    F. Zhang, H. Wang, K. Leach, A. Stavrou.
    In Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS 2014)
    September 2014. Wroclaw, Poland. Acceptance rate: 24.7%.
  20. Spectre: A Dependable System Introspection Framework. []
    F. Zhang, K. Leach, K. Sun, A. Stavrou.
    In the 43rd IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2013)
    June 24-27, 2013. Budapest, Hungary. Acceptance rate: 19%.
  21. Barley: Combining Control Flow with Resource Consumption to Detect Jump-based ROP Attacks.
    K. Leach.
    In the 43rd IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2013)
    June 24-27, Budapest, Hungary.

Conference acceptance rates are shown where available.