Publications
Journal publications
- Angelos D. Keromytis, Theo de Raadt, Jason Wright, and Matthew
Burnside. Cryptography as an operating system service: A case study.
ACM Transactions on Computer Systems (ToCS), 24(1):1-38,
2006. [pdf]
- Matthew Burnside and Angelos D. Keromytis. The case for crypto
protocol awareness inside the OS kernel. ACM SIGARCH Computer
Architecture News, 33(1):58-64, March 2005. [pdf]
Conference proceedings
- Michael E. Locasto, Matthew Burnside, and Angelos
D. Keromytis. Online network forensics for automatic repair
validation. In Proceedings of the 3rd International Workshop on
Security (IWSEC '08), November 2008. (Acceptance rate: 19.1%).
[pdf]
- Matthew Burnside, Mack Lu, and Angelos Keromytis. Authentication
on untrusted remote hosts with public-key Sudo. In 22nd Large
Installation System Administration Conference (LISA '08), November
2008.
- Matthew Burnside and Angelos D. Keromytis. Asynchronous policy
evaluation and enforcement. In Proceedings of the 2nd Computer
Security Architecture Workshop (CSAW 2), October 2008.
- Matthew Burnside and Angelos Keromytis. Path-based access control
for enterprise networks. In 11th Information Security Conference
(ISC '08), September 2008. (Acceptance rate: 23.9%).
[pdf]
- Michael E. Locasto, Matthew Burnside, and Darrell Bethea. Research
directions for network intrusion recovery. In SOUPS Workshop on
Usable IT Security Management (USM '08), July 2008. Invited
paper.
- Matthew Burnside and Angelos D. Keromytis. Arachne: Integrated
enterprise security management. In 8th Annual IEEE SMC Information
Assurance Workshop, pages 214-220, June 2007.
[pdf]
- Matthew Burnside and Angelos D. Keromytis. Low latency anonymity
with mix rings. In Proceedings of the 9th Information Security
Conference (ISC '06), pages 32-45, 2006.
[pdf]
- Matthew Burnside and Angelos D. Keromytis. The case for crypto
protocol awareness inside the OS kernel. In Proceedings of the
Workshop on Architectural Support for Security and Anti-Virus
(WASSA '04), pages 54-60, October 2004.
[pdf]
- Matthew Burnside and Angelos D. Keromytis. Accelerating
application-level security protocols. In Proceedings of the 11th
IEEE International Conference on Networks (ICON '03), pages
313-318. September/October 2003.
[pdf]
- Matthew Burnside and Angelos D. Keromytis. High-Speed I/O: The
operating system as a signalling mechanism. In Proceedings of ACM
SIGCOMM Workshop on Network-I/O Convergence: Experience, Lessons,
Implications (NICELI '03), pages 220-227, November 2003.
[pdf]
- Sanjay Raman, Dwaine Clarke, Matthew Burnside, Srinivas Devadas,
and Ronald Rivest. Access-controlled resource discovery for pervasive
networks. In Proceedings of ACM Symposium on Applied Computing
(SAC '03). March 2003.
[pdf]
- Dwaine Clarke, Blaise Gassend, Thomas Kotwal, Matthew Burnside,
Marten van Dijk, Srinivas Devadas, and Ronald Rivest. The untrusted
computer problem and camera-based authentication. In Proceedings of
First International Conference on Pervasive Computing (Pervasive
'02), pages 114-124, August 2002.
[pdf]
- Matthew Burnside, Dwaine Clarke, Todd Mills, Srinivas Devadas, and
Ronald Rivest. Proxy-based security protocols in networked mobile
devices. In Proceedings of ACM Symposium on Applied Computing
(SAC2002). March 2002.
[pdf]
Technical reports
- Michael Locasto, Matthew Burnside, and Angelos D. Keromytis.
Bloodhound: Searching out malicious input in network flows for
automatic repair validation. Technical Report CUCS-016-06, Columbia
University, April 2006.
[pdf]
- Matthew Burnside, Dwaine Clarke, Srinivas Devadas, and Ronald
Rivest. Distributed SPKI/SDSI-based security for networks of devices.
Technical report, MIT Laboratory for Computer Science, December 2002.
[pdf]
- Todd Mills, Matthew Burnside, John Ankcorn, and Srinivas
Devadas. A proxy-based architecture for secure networked wearable
devices. Technical report, MIT Laboratory for Computer Science, May
2001.
[pdf]