Kevin Leach

ORCID: 0000-0002-4001-3442
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Security and Verification in Computing
  • Software Engineering Research
  • Topic Modeling
  • Natural Language Processing Techniques
  • Network Security and Intrusion Detection
  • Software Testing and Debugging Techniques
  • Cloud Data Security Solutions
  • Anomaly Detection Techniques and Applications
  • Software Reliability and Analysis Research
  • Parallel Computing and Optimization Techniques
  • Adversarial Robustness in Machine Learning
  • Speech and dialogue systems
  • Machine Learning and Data Classification
  • Distributed and Parallel Computing Systems
  • Information and Cyber Security
  • Mental Health Research Topics
  • Scientific Computing and Data Management
  • Text and Document Classification Technologies
  • Radiation Effects in Electronics
  • Multimodal Machine Learning Applications
  • Data Quality and Management
  • Software System Performance and Reliability
  • Digital Mental Health Interventions
  • Advanced Database Systems and Queries

Vanderbilt University
2022-2024

Integrated Software (United States)
2023-2024

University of Virginia
2014-2021

University of Michigan
1994-2021

Southern University of Science and Technology
2021

Singapore Management University
2021

Guangzhou University
2021

Boise State University
2021

Ann Arbor Center for Independent Living
2020

MIT Lincoln Laboratory
2016

Stefan Larson, Anish Mahendran, Joseph J. Peper, Christopher Clarke, Andrew Lee, Parker Hill, Jonathan K. Kummerfeld, Kevin Leach, Michael A. Laurenzano, Lingjia Tang, Jason Mars. Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and 9th International Joint (EMNLP-IJCNLP). 2019.

10.18653/v1/d19-1131 article EN cc-by 2019-01-01

Mental health problems are highly prevalent and appear to be increasing in frequency severity among the college student population. The upsurge mobile wearable wireless technologies capable of intense, longitudinal tracking individuals, provide valuable opportunities examine temporal patterns dynamic interactions key variables mental research. In this paper, we present a feasibility study leveraging non-invasive sensing technology passively assess students' social anxiety, one most common...

10.1145/2971648.2971761 article EN 2016-09-09

With the rapid proliferation of malware attacks on Internet, understanding these malicious behaviors plays a critical role in crafting effective defense. Advanced analysis relies virtualization or emulation technology to run samples confined environment, and analyze activities by instrumenting code execution. However, virtual machines emulators inevitably create artifacts execution making approaches vulnerable detection subversion. In this paper, we present MALT, debugging framework that...

10.1109/sp.2015.11 article EN IEEE Symposium on Security and Privacy 2015-05-01

Software developers spend a great deal of time reading and understanding code that is poorly-documented, written by other developers, or developed using differing styles. During the past decade, researchers have investigated techniques for automatically documenting to improve comprehensibility. In particular, recent advances in deep learning led sophisticated summary generation convert functions methods simple English strings succinctly describe code's behavior. However, automatic...

10.1145/3387904.3389258 article EN 2020-07-13

Recent language models have demonstrated proficiency in summarizing source code. However, as many other domains of machine learning, code lack sufficient explainability --- informally, we a formulaic or intuitive understanding what and how learn from Explainability can be partially provided if, the to produce higher-quality summaries, they also align deeming same parts important those identified by human programmers. In this paper, report negative results our investigation summarization...

10.1145/3643916.3644434 preprint EN other-oa 2024-04-15

Virtual Machine Introspection (VMI) systems have been widely adopted for malware detection and analysis. VMI use hypervisor technology system introspection to expose malicious activity. However, recent can detect the presence of virtualization or corrupt state thus avoiding detection. We introduce SPECTRE, a hardware-assisted dependability framework that leverages System Management Mode (SMM) inspect system. Contrary VMI, our trusted code base is limited BIOS SMM implementations. SPECTRE...

10.1109/dsn.2013.6575343 article EN 2013-06-01

Optimizing software performance through automated code refinement offers a promising avenue for enhancing execution speed and efficiency. Despite recent advancements in LLMs, significant gap remains their ability to perform in-depth program analysis. This study introduces AUTOPATCH, an in-context learning approach designed bridge this by enabling LLMs automatically generate optimized code. Inspired how programmers learn apply knowledge optimize software, AUTOPATCH incorporates three key...

10.48550/arxiv.2501.16692 preprint EN arXiv (Cornell University) 2025-01-27

Software engineering involves writing new code or editing existing code. Recent efforts have investigated the neural processes associated with reading and comprehending --- however, we lack a thorough understanding of human cognitive underlying writing. While prose been studied thoroughly, that same scrutiny has not applied to In this paper, leverage functional brain imaging investigate representations in comparison We present first study which participants wrote while undergoing magnetic...

10.1145/3377811.3380348 article EN 2020-06-27

Data structures permeate many aspects of software engineering, but their associated human cognitive processes are not thoroughly understood. We leverage medical imaging and insights from the psychological notion spatial ability to decode neural representations several fundamental data manipulations. In a study involving 76 participants, we examine list, array, tree, mental rotation tasks using both functional near-infrared spectroscopy (fNIRS) magnetic resonance (fMRI). find nuanced...

10.1109/icse.2019.00053 article EN 2019-05-01

Code review is a critical step in modern software quality assurance, yet it vulnerable to human biases. Previous studies have clarified the extent of problem, particularly regarding biases against authors code,but no consensus understanding has emerged. Advances medical imaging are increasingly applied engineering, supporting grounded neurobiological explorations computing activities, including review, reading, and writing source code. In this paper, we present results controlled experiment...

10.1145/3368089.3409681 article EN 2020-11-08

A wide range of Arm endpoints leverage integrated and discrete GPUs to accelerate computation such as image processing numerical applications. However, in spite these important use cases, GPU security has yet be scrutinized by the community. By exploiting vulnerabilities kernel, attackers can directly access sensitive data used during computing, personally-identifiable computer vision tasks. Existing work Trusted Execution Environments (TEEs) address concerns on Intel-based platforms, while...

10.1145/3548606.3560627 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022-11-07

Confidential computing is an emerging technique that provides users and third-party developers with isolated transparent execution environment.To support this technique, Arm introduced the Computing Architecture (CCA), which creates multiple address spaces, known as realms, to ensure data confidentiality integrity in securitysensitive tasks.Arm recently proposed concept of confidential on GPU hardware, widely used generalpurpose, high-performance, artificial intelligence scenarios.However,...

10.14722/ndss.2024.24763 article EN 2024-01-01

In the evolving realm of natural language processing (NLP), generative AI models like ChatGPT are increasingly utilized across various applications. Among possible purposes, many people considering asking for relationship advice. However, lack in-depth examination ChatGPT's response quality could be concerning when it is used personal topics mental health issues and intimate problems. these topics, a piece misleading advice cause harmful repercussions. to people's growing interest in using...

10.1609/icwsm.v18i1.31338 article EN Proceedings of the International AAAI Conference on Web and Social Media 2024-05-28

With the growing ubiquity of uncrewed aerial vehicles (UAVs), mitigating emergent threats in such systems has become increasingly important. In this short paper, we discuss an indicative class UAVs and a potential attack scenario which benign UAV completing mission can be compromised by malicious attacker with antenna commodity computer open-source ground station software. We attest to relevance for both enterprise defense applications. describe system architecture resiliency trustworthiness...

10.1109/dsn-w.2016.63 article EN 2016-06-01

According to a 2014 Spring American College Health Association Survey, almost 50% of college students reported feeling things were hopeless and that it was difficult function within the last 12 months. More than 80% overwhelmed exhausted by their responsibilities. This critical subpopulation Americans is facing significant levels mental health disorders, challenging colleges provide accessible high quality behavioral care. However, psychiatric disorders are frequently unrecognized in primary...

10.1109/bigdata.2015.7364054 article EN 2021 IEEE International Conference on Big Data (Big Data) 2015-10-01

Understanding how developers carry out different computer science activities with objective measures can help to improve productivity and guide the use development of supporting tools in software engineering. In this article, we present two controlled experiments involving 112 students explore multiple computing (code comprehension, code review, data structure manipulations) using three including neuroimaging (functional near-infrared spectroscopy (fNIRS) functional magnetic resonance...

10.1145/3434643 article EN ACM Transactions on Software Engineering and Methodology 2021-03-09

Neural code summarization leverages deep learning models to automatically generate brief natural language summaries of snippets. The development Transformer has led extensive use attention during model design. While existing work primarily and almost exclusively focused on static properties source related structural representations like the Abstract Syntax Tree (AST), few studies have considered human attention, that is, where programmers focus while examining comprehending code. In this...

10.1145/3643732 article EN Proceedings of the ACM on software engineering. 2024-07-12

In software engineering, interruptions during tasks can have significant implications for productivity and well-being. While previous studies investigated the effect of on productivity, to best our knowledge, no prior work has yet distinguished different types engineering activities.

10.1145/3597503.3639079 article EN cc-by 2024-04-12

Malware, or software designed with harmful intent, is an ever-evolving threat that can have drastic effects on both individuals and institutions. Neural network malware classification systems are key tools for combating these threats but vulnerable to adversarial machine learning attacks. These attacks perturb input data cause misclassification, bypassing protective systems. Existing defenses often rely enhancing the training process, thereby increasing model's robustness perturbations,...

10.1145/3644033.3644372 article EN other-oa 2024-04-14

There is a growing body of malware samples that evade automated analysis and detection tools. Malware may measure fingerprints ("artifacts") the underlying tool or environment change their behavior when artifacts are detected. While tools can mitigate to reduce exposure, such concealment expensive. However, not every sample checks for type artifact-analysis efficiency be improved by mitigating only those most likely used sample. Using insight, we propose MIMOSA, system identifies small set...

10.48550/arxiv.2101.07328 preprint EN cc-by arXiv (Cornell University) 2021-01-01

With the increasing prevalence of Web 2.0 and cloud computing, password-based logins play an increasingly important role on user-end systems. We use passwords to authenticate ourselves countless applications services. However, login credentials can be easily stolen by attackers. In this paper, we present a framework, TrustLogin, secure commodity operating TrustLogin leverages System Management Mode protect from malware even when OS is compromised. does not modify any system software in...

10.1145/2714576.2714614 article EN 2015-04-03
Coming Soon ...