Project opportunities for students
I am not currently seeking students at this time.
Current and former students
I have supervised M.S. projects/theses or undergraduate independent studies with
the following students (does not include project committees):
- Reece Adkins - societal and ethical issues in computing independent study
- Ian Kenten, Rawaz Rahim, Joelle Ramiandrisoa - reconstructing and modernizing
the Ethical Computer
- Steven Young - advanced operating systems independent study
- Andrew Hutchson (M.S.) - 32- vs. 64-bit GCC behavior and its security implications
- Ken Trumpoldt - Android app for storing and sharing children's info in a protected manner
- Wooyoung Chung (M.S.) - security analysis of a smart meter
- Diane Bartell (M.S.) - regulatory compliant change control in cloud computing
Publications
You can view my slightly outdated CV,
(updated as of October 26, 2016). Additionally, you can view my DBLP
listing.
My Erdõs number
is 3 (through Elisa Bertino and Samuel S. Wagstaff):
- Michael S. Kirkpatrick and Elisa Bertino, "Enforcing Spatial Constraints for Mobile RBAC Systems."
15th ACM Symposium on Access Control Models and Technologies (SACMAT), Pittsburgh, PA, June 9-11, 2010.
- Elisa Bertino, Ning Shang, and Samuel S. Wagstaff Jr., "An Efficient Time-Bound Hierarchical Key Management
Scheme for Secure Broadcasting." IEEE Trans. Dependable Sec. Comput. 5(2): 65-70 (2008)
- Paul Erdõs and Samuel S. Wagstaff, "The Fractional Parts of the Bernoulli Numbers." Illinois J. Math. 24,
pages 104-112, 1980.
Books and pamphlets
- Michael S. Kirkpatrick, Computer Systems Fundamentals: Principles of Concurrent
Systems. To appear.
- Don Gotterbarn, Marty J. Wolf, and Michael S. Kirkpatrick, ACM Code of Ethics and
Professional Conduct. Booklet containing the revised ACM Code of Ethics and supporting material.
ISBN 978-1-4503-6626-7, DOI 10.1145/3274591, August 2018. Available for download from the
ACM.
Journal articles
- Aditi Gupta, Javid Habibi, Michael S. Kirkpatrick, and Elisa Bertino, "Marlin: Mitigating
Code Reuse Attacks Using Code Randomization." IEEE Transactions on Dependable and Secure Computing (TDSC),
volume 12, number 3, May/June 2015, 12 pages. [PDF]
- Aditi Gupta, Michael S. Kirkpatrick, and Elisa Bertino, "A Formal Proximity Model for RBAC
Systems." Computers & Security, volume 41, March 2014, 16 pages. [PDF]
- Michael S. Kirkpatrick, Gabriel Ghinita, and Elisa Bertino, "A Privacy-preserving Framework
for Spatially Aware RBAC Enforcement." IEEE Transactions on Dependable and Secure Computing (TDSC),
volume 9, number 5, September/October 2012, 14 pages. [PDF]
- Michael S. Kirkpatrick, Gabriel Ghinita, and Elisa Bertino, "Resilient Authenticated Execution
of Critical Applications in Untrusted Environments." IEEE Transactions on Dependable and Secure Computing
(TDSC), volume 9, number 4, July/August 2012, 13 pages. [PDF]
Peer-reviewed conference and workshop papers
- Michael S. Kirkpatrick, "Access Control Meets Genetics: The Challenges of Information Leakage and Non-users." Ethicomp 2022, 15 pages, Turku, Finland, July 2022.
- Michael S. Kirkpatrick, Emmanuelle Burton, and Marty J. Wolf, "Free Speech and Computing Professionals: Moral Considerations and Tensions." Ethicomp 2022, 17 pages, Turku, Finland, July 2022.
- Don Gotterbarn, Michael S. Kirkpatrick, and Marty J. Wolf, "From the Page to Practice: Support for Computing Professionals Using a Code of Ethics." Ethicomp 2022, 15 pages, Turku, Finland, July 2022.
- Dee A. B. Weikle, Michael O. Lam, and Michael S. Kirkpatrick, "Automating Systems
Course Unit and Integration Testing: An Experience Report." 50th
SIGCSE Technical Symposium, 6 pages, Minneapolis, MN, February 2019. [PDF]
- Michael S. Kirkpatrick "Student Perspectives of Team-Based Learning in a CS Course:
Summary of Qualitative Findings." 48th SIGCSE Technical
Symposium, 6 pages, Seattle, WA, March 2017. [PDF]
- Michael S. Kirkpatrick and Chris Mayfield, "Evaluating an Alternative CS1 for Students
with Prior Programming Experience." 48th SIGCSE Technical
Symposium, 6 pages, Seattle, WA, March 2017. [PDF]
- Michael S. Kirkpatrick and Samantha Prins, "Using the Readiness Assurance Process and
Metacognition in an Operating Systems Course." 20th Annual
Conference on Innovation and Technology in Computer Science Education (ITiCSE), 6 pages, Vilnius,
Lithuania, July 2015. [PDF]
- Michael S. Kirkpatrick, Mohamed Aboutabl, David Bernstein, and Sharon Simmons, "Backward
Design: An Integrated Approach to a Systems Curriculum." 46th
SIGCSE Technical Symposium, 6 pages, Kansas City, MO, March 2015. [PDF]
- Aditi Gupta, Sam Kerr, Michael S. Kirkpatrick, and Elisa Bertino, "Marlin: A Fine-grained
Randomization Approach to Defend Against ROP Attacks." 7th International
Conference on Network and System Security (NSS), 14 pages, Madrid, Spain, June 2013.
[PDF]
- Aditi Gupta, Michael S. Kirkpatrick, and Elisa Bertino, "A Formal Proximity Model for RBAC
Systems." 8th IEEE International Conference on Collaborative Computing:
Networking, Applications, and Worksharing (CollaborateCom), 10 pages, Pittsburgh, PA, October 2012.
[PDF]
- Michael S. Kirkpatrick, Maria Luisa Damiani, and Elisa Bertino, "Prox-RBAC: A Proximity-based
Spatially Aware RBAC." 19th ACM SIGSPATIAL International Conference on
Advances in Geographic Information Systems (ACM SIGSPATIAL GIS), 10 pages, Chicago, IL, November 2011.
[PDF]
- Michael S. Kirkpatrick, Sam Kerr, and Elisa Bertino, "PUF ROKs: A Hardware-Based Approach to Generating
Read-Once Keys." 6th ACM Symposium on Information, Computer and Communications
Security (ASIACCS), 10 pages, Hong Kong, March 2011. [PDF]
- Michael S. Kirkpatrick and Sam Kerr, "Enforcing Physically Restricted Access Control for Remote Data."
1st ACM Conference on Data and Application Security and Privacy (CODASPY), 11
pages, San Antonio, Texas, February 2011. [PDF] (Best Paper Award, First Runner-up)
- Sam Kerr, Michael S. Kirkpatrick, and Elisa Bertino, "PEAR: A Hardware-based
Authentication System." 3rd ACM SIGSPATIAL
International Workshop on Security and Privacy in GIS and LBS (SPRINGL), 8 pages, San
Jose, California, November 2010. [PDF]
- Michael S. Kirkpatrick and Elisa Bertino, "Enforcing Spatial Constraints for Mobile RBAC Systems."
15th ACM Symposium on Access Control Models and Technologies (SACMAT),
10 pages, Pittsburgh, PA, June 9-11, 2010. [PDF]
- Michael S. Kirkpatrick and Elisa Bertino, "Software Techniques to Combat Drift in PUF-based Authentication
Systems." Secure Component and System Identification (SECSI),
9 pages, Cologne, Germany, April 26-27, 2010. [PDF]
- Michael S. Kirkpatrick, Sam Kerr, and Elisa Bertino, "PUF ROKs: Generating Read-Once Keys
with Physically Unclonable Functions." Extended abstract, 6th Annual Cyber Security
and Information Intelligence Research Workshop (CSIIRW), 4 pages, Oak Ridge, TN, April 21-23, 2010.
[PDF]
- Michael S. Kirkpatrick and Elisa Bertino, "Physically Restricted Authentication with Trusted Hardware."
Fourth Annual Workshop on Scalable Trusted
Computing (STC), in conjunction with the 16th ACM Conference
on Computer and Communications Security (CCS), 10 pages, Chicago, IL, November 13, 2009.
[PDF]
-
Michael S. Kirkpatrick and Elisa Bertino, "Context-Dependent Authentication and Access Control."
Open Research Problems in Network Security (iNetSec), 13 pages,
Zurich, Switzerland, April 23-24, 2009. [PDF]
Encyclopedia articles & book chapters
- Michael S. Kirkpatrick, "Access Control Models." McGraw-Hill
Encyclopedia of Science & Technology, edited by David Blumel, 2013.
- Elisa Bertino, Stephen J. Elliott, Michael S. Kirkpatrick, and Shimon K. Modi, "Digital Identity Management."
Chapter included in Security in Computing and Networking Systems -- The State of the Art, edited by
William McQuay and Waleed W. Smari, 2012.
Invited papers
- Elisa Bertino and Michael S. Kirkpatrick, "Location-Based Access Control Systems for Mobile Users
-- Concepts and Research Directions." 4th SIGSPATIAL ACM GIS
International Workshop on Security and Privacy in GIS and LBS (SPRINGL), 4 pages, Chicago, IL, November 1, 2011.
[PDF]
- Aditi Gupta, Salmin Sultana, Michael S. Kirkpatrick, and Elisa Bertino, "A Selective
Encryption Approach to Fine-Grained Access Control for P2P File Sharing." The
6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom),
10 pages, Chicago, IL, October 2010. [PDF]
- Elisa Bertino and Michael S. Kirkpatrick, "Location-Aware Authentication and Access Control - Concepts and Issues."
Invited paper, IEEE 23rd International Conference on
Advanced Information Network and Applications (AINA), 6 pages, Bradford, UK, May 26-29, 2009. [PDF]
Position papers, conference posters, & technical reports
- Aditi Gupta, Michael S. Kirkpatrick, and Elisa Bertino, "A Secure Architecture Design Based on
Code Minimization and Application Isolation."
CERIAS TR 2013-4, 7 pages, Purdue
University, West Lafayette, IN, July 2013. [PDF]
- Aditi Gupta, Sam Kerr, Michael S. Kirkpatrick, and Elisa Bertino, "Marlin - Making it Harder to
Fish for Gadgets." Poster, 19th ACM Conference on Computer and Communications
Security (CCS), Raleigh, NC, October 16-18, 2012.
- Carmen R. Vicente, Michael S. Kirkpatrick, Gabriel Ghinita, Elisa Bertino, and Christian S. Jensen, "Requirements
and Challenges of Location-Based Access Control in Healthcare Emergency Response."
2nd SIGSPATIAL ACM GIS International Workshop on Security
and Privacy in GIS and LBS (SPRINGL), 5 pages, Seattle, WA, November 3, 2009. [PDF]
- Michael S. Kirkpatrick, Elisa Bertino, and Frederick T. Sheldon, "Restricted Authentication and Access
Control for Cyber-physical Systems." DHS
Workshop on Future Directions in Cyber-physical Systems Security, 5 pages, Newark, NJ, July 22-24, 2009.
[PDF]
Theses
- Michael S. Kirkpatrick, "Trusted Enforcement of Contextual Access Control." Doctoral Dissertation,
Purdue University, August 2011. [PDF]
- Michael S. Kirkpatrick, "Canary Bit: Extending Secure Bit for Data Pointer Protection from Buffer
Overflow Attacks." Master's Thesis, Michigan State University, 2007.
[PDF]