Kevin Joseph Leach

Rice 434, cubicle 5 — kjl2y@virginia.edu

School of Engineering and Applied Science, University of Virginia

 

Publications

  1. Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage.
    K. Leach, F. Zhang, W. Weimer.
    In Research on Attacks, Intrusions, and Defenses 2017. To appear. Acceptance Rate: 20%.
  2. A 4.4nW Lossless Sensor Data Compression Acclerator for 2.9x System Power Reduction in Wireless Body Sensors
    J. Breiholz, F. Yahya, C.J. Lukas, X. Chen, K. Leach, D. Wentzloff, B.H. Calhoun.
    In IEEE Midwest Symposium on Circuits and Systems, 2017. Under Review.
  3. Towards Behavior-Aware Computing: Understanding Behavioral Dynamics of Social Anxiety Through Smartphone Sensors.
    Y. Huang, J. Gong, M. Rucker, W. Bonelli, K. Leach, P. Chow, K. Fua, M. Gerber, B. Teachman, L. Barnes.
    In UbiComp 2017 via IMWUT. Under Review.
  4. Assessing Social Anxiety Using GPS Trajectories and Point-Of-Interest Data.
    Y. Huang, H. Xiong, K. Leach, Y. Zhang, L. Barnes.
    Inthe ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2016). September 2016. Heidelberg, Germany. Acceptance rate: 23%.
  5. An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture. []
    K. Highnam, K. Angstadt, K. Leach, W. Weimer, A. Paulos, P. Hurley.
    In the 46th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016). July 2016. Toulouse, France.
  6. Towards Transparent Debugging. []
    F. Zhang, K. Leach, A. Stavrou, H. Wang.
    In IEEE Transactions on Dependable and Secure Computing. (TDSC). March 2016. Impact factor: 1.592.
  7. DAEHR: A Discriminant Analysis Framework for Electronic Health Record Data and an Application to Early Detection of Mental Health Disorders.
    H. Xiong, J. Zhang, Y. Huang, K. Leach, L. Barnes.
    In ACM Transactions on Intelligent Systems and Technology (TIST). December 2015. Impact Factor: 2.414. To Appear.
  8. LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis. []
    C. Spensky, H. Hu, K. Leach.
    In the Networkand Distributed System Security Symposium 2016 (NDSS 2016).
    February 21-24, 2016. San Diego, CA. Acceptance rate: 15%.
  9. Towards Transparent Introspection. []
    K. Leach, C. Spensky, W. Weimer, F. Zhang.
    In the 23rd IEEE Conference on Software Analysis, Evolution, and Reengineering (SANER 2016)
    March 14-18, 2016. Osaka, Japan.
  10. A MapReduce Framework to Improve Template Matching Uncertainty. []
    N.J. Napoli, K. Leach, L. Barnes, W. Weimer.
    In the 3rd International Conference on Big Data and Smart Computing (BigComp 2016)
    January 18-20, 2016. Hong Kong.
  11. Using Hardware Features for Increased Debugging Transparency.
    F. Zhang, K. Leach, A. Stavrou, H. Wang.
    Provisional Patent Application 62/170,155. July 2015.
  12. M-SEQ: Early Detection of Anxiety and Depression via Temporal Orders of Diagnoses in Electronic Health Data. []
    J. Zhang, H. Xiong, Y. Huang, H. Wu, K. Leach, L. Barnes.
    In the 2015 IEEE International Conference on Big Data (IEEE Big Data 2015)
    October 29-November 1, 2015. Santa Clara, CA.
  13. Using Hardware Features for Increased Debugging Transparency. []
    F. Zhang, K. Leach, A. Stavrou, H. Wang, K. Sun.
    In the 36th IEEE Symposium on Security and Privacy (Oakland 2015)
    May 18-20, 2015. San Jose, CA. Acceptance rate: 13.5%
  14. TrustLogin: Securing Password-Login on Commodity Operating Systems. []
    F. Zhang, K. Leach, H. Wang, A. Stavrou.
    In Proceedings of the 10th ACM Symposium on Information, Computer, and Communications Security (ASIACCS 2015)
    April 14-17, 2015. Singapore. Acceptance rate: 17.8%.
  15. A Framework to Secure Peripherals at Runtime. []
    F. Zhang, H. Wang, K. Leach, A. Stavrou.
    In Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS 2014)
    September 2014. Wroclaw, Poland. Acceptance rate: 24.7%.
  16. Spectre: A Dependable System Introspection Framework. []
    F. Zhang, K. Leach, K. Sun, A. Stavrou.
    In the 43rd IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2013)
    June 24-27, 2013. Budapest, Hungary. Acceptance rate: 19%.
  17. Barley: Combining Control Flow with Resource Consumption to Detect Jump-based ROP Attacks.
    K. Leach.
    In the 43rd IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2013)
    June 24-27, Budapest, Hungary.

Conference acceptance rates are shown where available.