Kevin Joseph Leach

Beyster 2909 — kjleach@umich.edu

University of Michigan

 

Publications

  1. Inconsistencies in Crowdsourced Slot-Filling Annotations: A Typology and Identification Methods.
    S. Lardson, A. Cheung, A. Mahendran, K. Leach, J. K. Kummerfeld.
    In the 28th International Conference on Computational Linguistics (COLING 2020). To Appear.
  2. TRUST. IO: Protecting Physical Interfaces on Cyber-physical Systems.
    C. Spensky, A. Machiry, M. Busch, K. Leach, R. Housley, C. Kruegel, G. Vigna.
    In the 2020 Proceedings of the IEEE Conference on Communications and Network Security (CNS 2020). To appear.
  3. Iterative Feature Mining for Constraint-Based Data Collection to Increase Data Diversity and Model Robustness.
    S. Larson, A. Zheng, A. Mahendran, R. Tekriwal, A. Cheung, E. Guldan, K. Leach and J. K. Kummerfeld.
    In the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP 2020). To appear.
  4. MARTINI: Memory Access Traces to Detect Attacks.
    Y. Qin, S. Gonzalez, K. Angstadt, X. Wang, S. Forrest, R. Das, K. Leach, W. Weimer.
    In the Cloud Computing Security Workshop (CCSW) 2020. To appear.
  5. Biases and Differences in Code Review using Medical Imaging and Eye-Tracking: Genders, Humans, and Machines.
    Y. Huang, K. Leach, Z. Sharafi, N. McKay, T. Santander, W. Weimer.
    In the Foundations of Software Engineering (ESEC/FSE) 2020.
    Acceptance Rate: 28%.
  6. KShot: Live Kernel Patching with SMM and SGX.
    L. Zhou, F. Zhang, J. Liao, Z. Ning, J. Xiao, K. Leach, W. Weimer, G. Wang.
    In the 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020). Acceptance Rate: 16.5%. Best Paper Award Runner Up.
  7. A Human Study of Comprehension and Code Summarization.
    S. Stapleton, Y. Gambhir, A. LeClair, Z. Eberhart, W. Weimer, K. Leach, Y. Huang.
    In the 28th International Conference on Program Comprehension (ICPC 2020).
  8. Neurological Divide: An fMRI Study of Prose and Code Writing. []
    R. Krueger, Y. Huang, X. Liu, T. Santander, W. Weimer, K. Leach.
    In the 42nd ACM/IEEE International Conference on Software Engineering (ICSE 2020). Acceptance rate: 20%.
  9. Selective Symbolic Type-Guided Checkpointing and Restoration for Autonomous Vehicle Repair.
    Y. Huang, K. Angstadt, K. Leach, W. Weimer.
    In the 1st International Workshop on Automated Program Repair (APR 2020).
  10. Data Query Language and Corpus Tools for Slot-Filling and Intent Classification Data.
    S. Larson, E. Guldan, K. Leach.
    In the 2020 Language Resources and Evaluation Conference (LREC 2020).
  11. An Evaluation for Intent Classification and Out-of-Scope Prediction.
    S. Larson, A. Mahendran, J. J. Peper, C. Clarke, A. Lee, P. Hill, J. K. Kummerfeld, K. Leach, M. A. Laurenzano, L. Tang, J. Mars.
    In the 2019 Conference on Empirical Methods in Natural Language Processing (EMNLP 2019). Acceptance rate: 23.8%.
  12. Nighthawk: Transparent System Introspection from Ring -3.
    L. Zhou, J. Xiao, K. Leach, W. Weimer, F. Zhang, G. Wang.
    In the 2019 European Symposium on Research in Computer Security (ESORICS 2019). Acceptance rate: 19.5%.
  13. Evolutionary Computation for Improving Malware Analysis. []
    K. Leach, R. Dougherty, C. Spensky, S. Forrest, W. Weimer.
    In the 5th Genetic Improvement Workshop (GI 2019). Best Presentation Award
  14. Open Source Vulnerability Notification. []
    B. Carlson, K. Leach, D. Marinov, M. Nagappan, A. Prakash.
    In the 15th International Conference on Open Source Systems (OSS 2019).
    In press (IEEE Spectrum).
  15. Distilling Neural Representations of Data Structure Manipulation using fMRI and fNIRS. []
    Y. Huang, X. Liu, R. Krueger, T. Santander, X. Hu, K. Leach, W. Weimer.
    In the 41st ACM/IEEE International Conference on Software Engineering (ICSE 2019). Acceptance rate: 20%. Distinguished Paper Award
  16. Towards Transparent Debugging. []
    F. Zhang, K. Leach, A. Stavrou, H. Wang.
    In IEEE Transactions on Dependable and Secure Computing. (TDSC). Volume 15, Issue 2, pages 321-335. Impact factor: 1.592.
  17. Using Hardware Features for Increased Debugging Transparency.
    F. Zhang, K. Leach, A. Stavrou, H. Wang.
    U.S. Patent No. 10,127,137. November 13, 2018.
  18. Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage.
    K. Leach, F. Zhang, W. Weimer.
    In Research on Attacks, Intrusions, and Defenses 2017. Acceptance Rate: 20%.
  19. A 4.4nW Lossless Sensor Data Compression Acclerator for 2.9x System Power Reduction in Wireless Body Sensors
    J. Breiholz, F. Yahya, C.J. Lukas, X. Chen, K. Leach, D. Wentzloff, B.H. Calhoun.
    In IEEE Midwest Symposium on Circuits and Systems, 2017.
  20. Assessing Social Anxiety Using GPS Trajectories and Point-Of-Interest Data.
    Y. Huang, H. Xiong, K. Leach, Y. Zhang, L. Barnes.
    Inthe ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2016). September 2016. Heidelberg, Germany. Acceptance rate: 23%.
  21. An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture. []
    K. Highnam, K. Angstadt, K. Leach, W. Weimer, A. Paulos, P. Hurley.
    In the 46th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016). July 2016. Toulouse, France.
  22. DAEHR: A Discriminant Analysis Framework for Electronic Health Record Data and an Application to Early Detection of Mental Health Disorders.
    H. Xiong, J. Zhang, Y. Huang, K. Leach, L. Barnes.
    In ACM Transactions on Intelligent Systems and Technology (TIST). December 2015. Impact Factor: 2.414.
  23. LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis. []
    C. Spensky, H. Hu, K. Leach.
    In the Networkand Distributed System Security Symposium 2016 (NDSS 2016).
    February 21-24, 2016. San Diego, CA. Acceptance rate: 15%.
  24. Towards Transparent Introspection. []
    K. Leach, C. Spensky, W. Weimer, F. Zhang.
    In the 23rd IEEE Conference on Software Analysis, Evolution, and Reengineering (SANER 2016)
    March 14-18, 2016. Osaka, Japan.
  25. A MapReduce Framework to Improve Template Matching Uncertainty. []
    N.J. Napoli, K. Leach, L. Barnes, W. Weimer.
    In the 3rd International Conference on Big Data and Smart Computing (BigComp 2016)
    January 18-20, 2016. Hong Kong.
  26. M-SEQ: Early Detection of Anxiety and Depression via Temporal Orders of Diagnoses in Electronic Health Data. []
    J. Zhang, H. Xiong, Y. Huang, H. Wu, K. Leach, L. Barnes.
    In the 2015 IEEE International Conference on Big Data (IEEE Big Data 2015)
    October 29-November 1, 2015. Santa Clara, CA.
  27. Using Hardware Features for Increased Debugging Transparency. []
    F. Zhang, K. Leach, A. Stavrou, H. Wang, K. Sun.
    In the 36th IEEE Symposium on Security and Privacy (Oakland 2015)
    May 18-20, 2015. San Jose, CA. Acceptance rate: 13.5%
  28. TrustLogin: Securing Password-Login on Commodity Operating Systems. []
    F. Zhang, K. Leach, H. Wang, A. Stavrou.
    In Proceedings of the 10th ACM Symposium on Information, Computer, and Communications Security (ASIACCS 2015)
    April 14-17, 2015. Singapore. Acceptance rate: 17.8%.
  29. A Framework to Secure Peripherals at Runtime. []
    F. Zhang, H. Wang, K. Leach, A. Stavrou.
    In Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS 2014)
    September 2014. Wroclaw, Poland. Acceptance rate: 24.7%.
  30. Spectre: A Dependable System Introspection Framework. []
    F. Zhang, K. Leach, K. Sun, A. Stavrou.
    In the 43rd IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2013)
    June 24-27, 2013. Budapest, Hungary. Acceptance rate: 19%.
  31. Barley: Combining Control Flow with Resource Consumption to Detect Jump-based ROP Attacks.
    K. Leach.
    In the 43rd IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2013)
    June 24-27, Budapest, Hungary.

Conference acceptance rates are shown where available.