Systems Group (TSG) is engaged in experimental computer science
research that investigates cross-layer methods of creating efficient,
trustworthy computer systems. We seek to understand why it seems
difficult to build trustworthy systems and how we can get better at
it. Our areas of research include tools and patterns for trust design
and coordination, operating systems and architectural support for
security, debugging, intrusion defense, and infosec education.
The TSG is affiliated with the University of Calgary's
Institute for Security, Privacy, and
Information Assurance (ISPIA).
Classifying the Data Semantics of Patches Robin Gonzalez and Michael E. Locasto. CPSC Tech Report 2013-1047-14.
"Babel: A Secure Computer is a Polyglot."
John Aycock, Daniel Medeiros Nunes de Castro, Michael E. Locasto, and Chris Jarabek. Proceedings of the ACM Cloud Computing Security Workshop (CCSW) October 2012.
"LoSt: Location Based Storage."
Gaven J. Watson, Reihaneh Safavi-Naini, Mohsen Alimomeni, Michael E. Locasto, and Shivaramakrishnan Narayan. Proceedings of the ACM Cloud Computing Security Workshop (CCSW) October 2012.
"Security Applications of Formal Language Theory." Len Sassaman, Meredith L. Patterson, Sergey Bratus, and Michael Locasto.
IEEE Systems Journal: Special Issue on Security and Privacy in Complex Systems. Sushil Jajodia and Pierangela Samarati, Ed. 2012. (to appear)
"// TODO: Help Students Improve Commenting Practices"
Peter J. DePasquale, Michael E. Locasto, Lisa Kaczmarczyk, and Mike Martinovic. Proceedings of the IEEE Frontiers in Education Conference (FIE 2012). October 2012.
"Empirical Evaluation and Pushback of Malicious Web Advertisements" Robin Gonzalez. (Poster, USENIX Security 2012)
"Software diversity: Security, Entropy and Game Theory."
Saran Neti, Anil Somayaji, and Michael E. Locasto. Proceedings of the 7th USENIX Workshop on Hot Topics in Security August 2012. Bellvue, WA, USA.
"Composition Patterns of Hacking."
Sergey Bratus, Julian Bangert, Alexandar Gabrovsky, Anna Shubina, Daniel Bilar, and Michael E. Locasto.
Proceedings of the 1st International Workshop on Cyber Patterns. pp. 80-85. 9-10 July 2012, Abingdon, Oxfordshire, UK
"Intrusion Detection For Resource-constrained Embedded Control Systems in the Power Grid."
Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus and Sean Smith. International Journal of Critical Infrastructure Protection. (2012)
"Exploit Programming: From Buffer Overflows to 'Weird Machines' and Theory of Computation". Sergey Bratus, Michael E. Locasto, Meredith L. Patterson, Len Sassaman, and Anna Shubina. USENIX ;login: vol. 36, no. 6, pp. 13--21 December 2011.
"Using Active Intrusion Detection to Recover Network Trust"
John F. Williamson, Sergey Bratus, Michael E. Locasto, Sean W. Smith. Proceedings of USENIX LISA 2011
"Security and Privacy Considerations in Digital Death."
Michael E. Locasto, Michael Massimi, and Peter J. DePasquale. Proceedings of the 20th New Security Paradigms Workshop (NSPW 2011). September 12-15 2011. Marin County, CA, USA. [pre-proceedings version]