Publications

Journal publications

  1. Angelos D. Keromytis, Theo de Raadt, Jason Wright, and Matthew Burnside. Cryptography as an operating system service: A case study. ACM Transactions on Computer Systems (ToCS), 24(1):1-38, 2006. [pdf]
  2. Matthew Burnside and Angelos D. Keromytis. The case for crypto protocol awareness inside the OS kernel. ACM SIGARCH Computer Architecture News, 33(1):58-64, March 2005. [pdf]

Conference proceedings

  1. Michael E. Locasto, Matthew Burnside, and Angelos D. Keromytis. Online network forensics for automatic repair validation. In Proceedings of the 3rd International Workshop on Security (IWSEC '08), November 2008. (Acceptance rate: 19.1%). [pdf]
  2. Matthew Burnside, Mack Lu, and Angelos Keromytis. Authentication on untrusted remote hosts with public-key Sudo. In 22nd Large Installation System Administration Conference (LISA '08), November 2008.
  3. Matthew Burnside and Angelos D. Keromytis. Asynchronous policy evaluation and enforcement. In Proceedings of the 2nd Computer Security Architecture Workshop (CSAW 2), October 2008.
  4. Matthew Burnside and Angelos Keromytis. Path-based access control for enterprise networks. In 11th Information Security Conference (ISC '08), September 2008. (Acceptance rate: 23.9%). [pdf]
  5. Michael E. Locasto, Matthew Burnside, and Darrell Bethea. Research directions for network intrusion recovery. In SOUPS Workshop on Usable IT Security Management (USM '08), July 2008. Invited paper.
  6. Matthew Burnside and Angelos D. Keromytis. Arachne: Integrated enterprise security management. In 8th Annual IEEE SMC Information Assurance Workshop, pages 214-220, June 2007. [pdf]
  7. Matthew Burnside and Angelos D. Keromytis. Low latency anonymity with mix rings. In Proceedings of the 9th Information Security Conference (ISC '06), pages 32-45, 2006. [pdf]
  8. Matthew Burnside and Angelos D. Keromytis. The case for crypto protocol awareness inside the OS kernel. In Proceedings of the Workshop on Architectural Support for Security and Anti-Virus (WASSA '04), pages 54-60, October 2004. [pdf]
  9. Matthew Burnside and Angelos D. Keromytis. Accelerating application-level security protocols. In Proceedings of the 11th IEEE International Conference on Networks (ICON '03), pages 313-318. September/October 2003. [pdf]
  10. Matthew Burnside and Angelos D. Keromytis. High-Speed I/O: The operating system as a signalling mechanism. In Proceedings of ACM SIGCOMM Workshop on Network-I/O Convergence: Experience, Lessons, Implications (NICELI '03), pages 220-227, November 2003. [pdf]
  11. Sanjay Raman, Dwaine Clarke, Matthew Burnside, Srinivas Devadas, and Ronald Rivest. Access-controlled resource discovery for pervasive networks. In Proceedings of ACM Symposium on Applied Computing (SAC '03). March 2003. [pdf]
  12. Dwaine Clarke, Blaise Gassend, Thomas Kotwal, Matthew Burnside, Marten van Dijk, Srinivas Devadas, and Ronald Rivest. The untrusted computer problem and camera-based authentication. In Proceedings of First International Conference on Pervasive Computing (Pervasive '02), pages 114-124, August 2002. [pdf]
  13. Matthew Burnside, Dwaine Clarke, Todd Mills, Srinivas Devadas, and Ronald Rivest. Proxy-based security protocols in networked mobile devices. In Proceedings of ACM Symposium on Applied Computing (SAC2002). March 2002. [pdf]

Technical reports

  1. Michael Locasto, Matthew Burnside, and Angelos D. Keromytis. Bloodhound: Searching out malicious input in network flows for automatic repair validation. Technical Report CUCS-016-06, Columbia University, April 2006. [pdf]
  2. Matthew Burnside, Dwaine Clarke, Srinivas Devadas, and Ronald Rivest. Distributed SPKI/SDSI-based security for networks of devices. Technical report, MIT Laboratory for Computer Science, December 2002. [pdf]
  3. Todd Mills, Matthew Burnside, John Ankcorn, and Srinivas Devadas. A proxy-based architecture for secure networked wearable devices. Technical report, MIT Laboratory for Computer Science, May 2001. [pdf]