Research

My current research interests focus on applied computing ethics and effective teaching practices for systems courses, with an emphasis on collaborative and active learning techniques. My computing research background has focused on information security, access control, applied cryptography, embedded systems, high-assurance platforms, OS, and virtualization.

Project opportunities for students

I am not currently seeking students at this time.

Current and former students

I have supervised M.S. projects/theses or undergraduate independent studies with the following students (does not include project committees):

  • Reece Adkins - societal and ethical issues in computing independent study
  • Ian Kenten, Rawaz Rahim, Joelle Ramiandrisoa - reconstructing and modernizing the Ethical Computer
  • Steven Young - advanced operating systems independent study
  • Andrew Hutchson (M.S.) - 32- vs. 64-bit GCC behavior and its security implications
  • Ken Trumpoldt - Android app for storing and sharing children's info in a protected manner
  • Wooyoung Chung (M.S.) - security analysis of a smart meter
  • Diane Bartell (M.S.) - regulatory compliant change control in cloud computing

Publications

You can view my slightly outdated CV, (updated as of October 26, 2016). Additionally, you can view my DBLP listing.

My Erdõs number is 3 (through Elisa Bertino and Samuel S. Wagstaff):

  1. Michael S. Kirkpatrick and Elisa Bertino, "Enforcing Spatial Constraints for Mobile RBAC Systems." 15th ACM Symposium on Access Control Models and Technologies (SACMAT), Pittsburgh, PA, June 9-11, 2010.
  2. Elisa Bertino, Ning Shang, and Samuel S. Wagstaff Jr., "An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting." IEEE Trans. Dependable Sec. Comput. 5(2): 65-70 (2008)
  3. Paul Erdõs and Samuel S. Wagstaff, "The Fractional Parts of the Bernoulli Numbers." Illinois J. Math. 24, pages 104-112, 1980.

Books and pamphlets

  1. Michael S. Kirkpatrick, Computer Systems Fundamentals: Principles of Concurrent Systems. To appear.
  2. Don Gotterbarn, Marty J. Wolf, and Michael S. Kirkpatrick, ACM Code of Ethics and Professional Conduct. Booklet containing the revised ACM Code of Ethics and supporting material. ISBN 978-1-4503-6626-7, DOI 10.1145/3274591, August 2018. Available for download from the ACM.

Journal articles

  1. Aditi Gupta, Javid Habibi, Michael S. Kirkpatrick, and Elisa Bertino, "Marlin: Mitigating Code Reuse Attacks Using Code Randomization." IEEE Transactions on Dependable and Secure Computing (TDSC), volume 12, number 3, May/June 2015, 12 pages. [PDF]
  2. Aditi Gupta, Michael S. Kirkpatrick, and Elisa Bertino, "A Formal Proximity Model for RBAC Systems." Computers & Security, volume 41, March 2014, 16 pages. [PDF]
  3. Michael S. Kirkpatrick, Gabriel Ghinita, and Elisa Bertino, "A Privacy-preserving Framework for Spatially Aware RBAC Enforcement." IEEE Transactions on Dependable and Secure Computing (TDSC), volume 9, number 5, September/October 2012, 14 pages. [PDF]
  4. Michael S. Kirkpatrick, Gabriel Ghinita, and Elisa Bertino, "Resilient Authenticated Execution of Critical Applications in Untrusted Environments." IEEE Transactions on Dependable and Secure Computing (TDSC), volume 9, number 4, July/August 2012, 13 pages. [PDF]

Peer-reviewed conference and workshop papers

  1. Michael S. Kirkpatrick, "Access Control Meets Genetics: The Challenges of Information Leakage and Non-users." Ethicomp 2022, 15 pages, Turku, Finland, July 2022.
  2. Michael S. Kirkpatrick, Emmanuelle Burton, and Marty J. Wolf, "Free Speech and Computing Professionals: Moral Considerations and Tensions." Ethicomp 2022, 17 pages, Turku, Finland, July 2022.
  3. Don Gotterbarn, Michael S. Kirkpatrick, and Marty J. Wolf, "From the Page to Practice: Support for Computing Professionals Using a Code of Ethics." Ethicomp 2022, 15 pages, Turku, Finland, July 2022.
  4. Dee A. B. Weikle, Michael O. Lam, and Michael S. Kirkpatrick, "Automating Systems Course Unit and Integration Testing: An Experience Report." 50th SIGCSE Technical Symposium, 6 pages, Minneapolis, MN, February 2019. [PDF]
  5. Michael S. Kirkpatrick "Student Perspectives of Team-Based Learning in a CS Course: Summary of Qualitative Findings." 48th SIGCSE Technical Symposium, 6 pages, Seattle, WA, March 2017. [PDF]
  6. Michael S. Kirkpatrick and Chris Mayfield, "Evaluating an Alternative CS1 for Students with Prior Programming Experience." 48th SIGCSE Technical Symposium, 6 pages, Seattle, WA, March 2017. [PDF]
  7. Michael S. Kirkpatrick and Samantha Prins, "Using the Readiness Assurance Process and Metacognition in an Operating Systems Course." 20th Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE), 6 pages, Vilnius, Lithuania, July 2015. [PDF]
  8. Michael S. Kirkpatrick, Mohamed Aboutabl, David Bernstein, and Sharon Simmons, "Backward Design: An Integrated Approach to a Systems Curriculum." 46th SIGCSE Technical Symposium, 6 pages, Kansas City, MO, March 2015. [PDF]
  9. Aditi Gupta, Sam Kerr, Michael S. Kirkpatrick, and Elisa Bertino, "Marlin: A Fine-grained Randomization Approach to Defend Against ROP Attacks." 7th International Conference on Network and System Security (NSS), 14 pages, Madrid, Spain, June 2013. [PDF]
  10. Aditi Gupta, Michael S. Kirkpatrick, and Elisa Bertino, "A Formal Proximity Model for RBAC Systems." 8th IEEE International Conference on Collaborative Computing: Networking, Applications, and Worksharing (CollaborateCom), 10 pages, Pittsburgh, PA, October 2012. [PDF]
  11. Michael S. Kirkpatrick, Maria Luisa Damiani, and Elisa Bertino, "Prox-RBAC: A Proximity-based Spatially Aware RBAC." 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL GIS), 10 pages, Chicago, IL, November 2011. [PDF]
  12. Michael S. Kirkpatrick, Sam Kerr, and Elisa Bertino, "PUF ROKs: A Hardware-Based Approach to Generating Read-Once Keys." 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 10 pages, Hong Kong, March 2011. [PDF]
  13. Michael S. Kirkpatrick and Sam Kerr, "Enforcing Physically Restricted Access Control for Remote Data." 1st ACM Conference on Data and Application Security and Privacy (CODASPY), 11 pages, San Antonio, Texas, February 2011. [PDF] (Best Paper Award, First Runner-up)
  14. Sam Kerr, Michael S. Kirkpatrick, and Elisa Bertino, "PEAR: A Hardware-based Authentication System." 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS (SPRINGL), 8 pages, San Jose, California, November 2010. [PDF]
  15. Michael S. Kirkpatrick and Elisa Bertino, "Enforcing Spatial Constraints for Mobile RBAC Systems." 15th ACM Symposium on Access Control Models and Technologies (SACMAT), 10 pages, Pittsburgh, PA, June 9-11, 2010. [PDF]
  16. Michael S. Kirkpatrick and Elisa Bertino, "Software Techniques to Combat Drift in PUF-based Authentication Systems." Secure Component and System Identification (SECSI), 9 pages, Cologne, Germany, April 26-27, 2010. [PDF]
  17. Michael S. Kirkpatrick, Sam Kerr, and Elisa Bertino, "PUF ROKs: Generating Read-Once Keys with Physically Unclonable Functions." Extended abstract, 6th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW), 4 pages, Oak Ridge, TN, April 21-23, 2010. [PDF]
  18. Michael S. Kirkpatrick and Elisa Bertino, "Physically Restricted Authentication with Trusted Hardware." Fourth Annual Workshop on Scalable Trusted Computing (STC), in conjunction with the 16th ACM Conference on Computer and Communications Security (CCS), 10 pages, Chicago, IL, November 13, 2009. [PDF]
  19. Michael S. Kirkpatrick and Elisa Bertino, "Context-Dependent Authentication and Access Control." Open Research Problems in Network Security (iNetSec), 13 pages, Zurich, Switzerland, April 23-24, 2009. [PDF]

Encyclopedia articles & book chapters

  1. Michael S. Kirkpatrick, "Access Control Models." McGraw-Hill Encyclopedia of Science & Technology, edited by David Blumel, 2013.
  2. Elisa Bertino, Stephen J. Elliott, Michael S. Kirkpatrick, and Shimon K. Modi, "Digital Identity Management." Chapter included in Security in Computing and Networking Systems -- The State of the Art, edited by William McQuay and Waleed W. Smari, 2012.

Invited papers

  1. Elisa Bertino and Michael S. Kirkpatrick, "Location-Based Access Control Systems for Mobile Users -- Concepts and Research Directions." 4th SIGSPATIAL ACM GIS International Workshop on Security and Privacy in GIS and LBS (SPRINGL), 4 pages, Chicago, IL, November 1, 2011. [PDF]
  2. Aditi Gupta, Salmin Sultana, Michael S. Kirkpatrick, and Elisa Bertino, "A Selective Encryption Approach to Fine-Grained Access Control for P2P File Sharing." The 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 10 pages, Chicago, IL, October 2010. [PDF]
  3. Elisa Bertino and Michael S. Kirkpatrick, "Location-Aware Authentication and Access Control - Concepts and Issues." Invited paper, IEEE 23rd International Conference on Advanced Information Network and Applications (AINA), 6 pages, Bradford, UK, May 26-29, 2009. [PDF]

Position papers, conference posters, & technical reports

  1. Aditi Gupta, Michael S. Kirkpatrick, and Elisa Bertino, "A Secure Architecture Design Based on Code Minimization and Application Isolation." CERIAS TR 2013-4, 7 pages, Purdue University, West Lafayette, IN, July 2013. [PDF]
  2. Aditi Gupta, Sam Kerr, Michael S. Kirkpatrick, and Elisa Bertino, "Marlin - Making it Harder to Fish for Gadgets." Poster, 19th ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, October 16-18, 2012.
  3. Carmen R. Vicente, Michael S. Kirkpatrick, Gabriel Ghinita, Elisa Bertino, and Christian S. Jensen, "Requirements and Challenges of Location-Based Access Control in Healthcare Emergency Response." 2nd SIGSPATIAL ACM GIS International Workshop on Security and Privacy in GIS and LBS (SPRINGL), 5 pages, Seattle, WA, November 3, 2009. [PDF]
  4. Michael S. Kirkpatrick, Elisa Bertino, and Frederick T. Sheldon, "Restricted Authentication and Access Control for Cyber-physical Systems." DHS Workshop on Future Directions in Cyber-physical Systems Security, 5 pages, Newark, NJ, July 22-24, 2009. [PDF]

Theses

  1. Michael S. Kirkpatrick, "Trusted Enforcement of Contextual Access Control." Doctoral Dissertation, Purdue University, August 2011. [PDF]
  2. Michael S. Kirkpatrick, "Canary Bit: Extending Secure Bit for Data Pointer Protection from Buffer Overflow Attacks." Master's Thesis, Michigan State University, 2007. [PDF]


James Madison University logo


© 2011-2024 Michael S. Kirkpatrick.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.