Larry Koved  Larry Koved photo       

contact information

Blockchain; FINTECH; Identity; Mobile Security; Information Security
Thomas J. Watson Research Center, Yorktown Heights, NY 10598

links

Professional Associations

Professional Associations:  ACM  |  IEEE Computer Society


2016

Usable Multi-Factor Authentication and Risk-Based Authorization
L. Koved; P-C Cheng; D. Marques; N. Ratha; K. Singh; C. Swart; S. Trewin
Technical Report, IBM, 2016
Abstract

Passive security intelligence to analyze the security risks of mobile/BYOD activities
M. Ph. Stoecklin; K. Singh ; L. Koved ; X. Hu ; S. N. Chari ; J. R. Rao ; P. -C. Cheng ; M. Christodorescu ; R. Sailer ; D. L. Schales
IBM Journal of Research and Development 60(4), 9:1 - 9:13, IBM, 2016
Abstract   Distributed by IEEE

Perceptions of Risk in Mobile Transactions
Shari Trewin, Larry Koved, Cal Swart and Kapil Singh
Mobile Security Technologies (MoST) 2016, USENIX
Abstract


2015

Usable Multi-Factor Authentication and Risk-Based Authorization
L. Koved, P.C. Cheng, D. Marques, N. Ratha, K. Singh, C. Swart, S. Trewin
Technical Report, Air Force Research Laboratory Information Directorate, 2015

Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015
Abigail Goldsteen, Tyrone Grandison, Mike Just, Larry Koved, Rohan Malcolm, Sean Thorpe
Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015, IEEE
Abstract

Security and Privacy on the Web [Guest editors' introduction]
T. Grandison, L. Koved
Software 32(4), 36-39, IEEE, 2015
Abstract


2014

Improving Usability of Complex Authentication Schemes Via Queue Management and Load Shedding
L. Koved, B. Zhang
Who Are You?! Adventures in Authentication Workshop at the Symposium on Usable Privacy and Security (SOUPS), 2014
Abstract

Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014
L. Koved, K. Singh, H. Chen, M. Just
Third Workshop on Mobile Security Technologies (MoST) 2014, IEEE
Abstract


2013

Perceived security risks in mobile interaction
Larry Koved, Shari Trewin, Cal Swart, Kapil Singh, Pau-Chen Cheng, Suresh Chari
Workshop on Risk Perception in IT Security and Privacy at the 2013 Symposium On Usable Privacy and Security (SOUPS)
Abstract

Practical out-of-band authentication for mobile applications
K. Singh, L. Koved
13th ACM/IFIP/USENIX International Middleware Conference, ACM, 2013
Abstract


2012

Biometric authentication on a mobile device: a study of user effort, error and task disruption
Shari Trewin, Calvin Swart, Larry Koved, Jacquelyn Martino, Kapil Singh, Shay Ben-David
28th Annual Computer Security Applications Conference, ACSAC 2012, ACSA
Abstract


2010

There's Something Stuck In My Shoe
Koved, Larry
Security & Privacy Usability Technology Transfer: Emerging Research (SPUTTER) Workshop, Carnegie Mellon CyLab and Microsoft, 2010


2009

Using Recommenders for Discretionary Access Control
Suresh Chari, Larry Koved, and Mary Ellen Zurko
Web 2.0 Security and Privacy, 2009


2008

SWORD4J: Security WORkbench Development environment 4 Java
Ted Habeck; Larry Koved; Marco Pistoia
IBM Research Report RC24554, P.O. Box 704, Yorktown Heights, NY 10598, IBM T. J. Watson Research Center, 2008

Secure Delegation for Web 2.0 and Mashups
S Chari, L Koved, M Mcintosh, M Steiner, S Weber
W2SP 2008: Web 2.0 Security and Privacy

Secure Delegation for Web 2.0 and Mashups
P.Austel S. Bhola, S. Chari, L. Koved, M. McIntosh, M. Steiner, S. Weber
Web 2.0 Security and Privacy, Citeseer, 2008


2007

Making Security Accessible to Programmers
Larry koved
Secure Programming Workshop, 2007


2006

The case for analysis preserving language transformation
X Zhang, L Koved, M Pistoia, S Weber, T Jaeger, G Marceau, L Zeng
Proceedings of the 2006 international symposium on Software testing and analysis, pp. 202, ACM
Abstract

INTELLECT: INTErmediate-Language LEvel C Translator
S K Jain, G Marceau, X Zhang, L Koved, T Jaeger
Technical Report, 2006


2005

Interprocedural analysis for privileged code placement and tainted variable detection
M. Pistoia, R. Flynn, L. Koved, V. Sreedhar
ECOOP 2005-Object-Oriented Programming, 734--734, Springer


2004

Enterprise Java ™ Security: Building Secure and Robust J2EE Applications
M. Pistoia, N. Nagaratnam, L. Koved, A. Nadalin
2004 - books.google.com, Addison-Wesley Professional

Detecting Unwanted Synchronization in Java Programs
Leeman, G., Kershenbaum, A., Koved, L., and Reimer, D.
Software Engineering and Applications (SEA 2004). Sponsored by International Association of Science and Technology for Development (IASTED)., MIT

SABER: smart analysis based error reduction
D Reimer, E Schonberg, K Srinivas, H Srinivasan, B Alpern, R D Johnson, A Kershenbaum, L Koved
Proceedings of the 2004 ACM SIGSOFT International Symposium on Software Testing and Analysis 29(4), 243--251, IEEE
Abstract

Enterprise Java 2 Security: Building Secure and Robust J2EE Applications
M Pistoia, N Nagaratnam, L Koved, A Nadalin
2004 - portal.acm.org, Addison Wesley Longman Publishing Co., Inc. Redwood City, CA, USA
Abstract

Applying Static Analysis to Verifying Security Properties
X Zhang, T Jaegert, L Koved
Proceedings of the 2004 Grace Hopper Celebration of Women in Computing Conference

Experiences with Building Security Checking and Understanding Tool
T Habeck, L Koved, O Marquez, VC Sreedhar, M Steiner, W Venema, S Weber
domino.research.ibm.com, IBM Research, 2004

Validating structural properties of nested objects
D Reimer, E Schonberg, K Srinivas, H Srinivasan, J Dolby, A Kershenbaum, L Koved
Companion to the 19th annual ACM SIGPLAN conference on Object-oriented programming systems, languages, and applications, pp. 294--304, Vancouver, BC, Canada, 2004
Abstract


2002

User authentication and authorization in the Java platform
C Lai, L Gong, L Koved, A Nadalin, R Schemers
Computer Security Applications Conference, 1999, pp. 285--290, 2002

Elements of visual language
T Selker, L Koved
Visual Languages, 1988, pp. 38--44, 2002

Access rights analysis for Java
L. Koved, M. Pistoia, A. Kershenbaum
ACM SIGPLAN Notices, pp. 359--372, ACM, 2002


2001

Security challenges for Enterprise Java in an e-business environment
L Koved, A Nadalin, N Nagaratnam, M Pistoia, T Shrader
IBM Systems Journal 40(1), 130--152, International Business Machines, 2001


2000

Automatic Detection of Immutable Fields in Java
S Porat, M Biberstein, L Koved, B Mendelson
CASCON, pp. 10, IBM Press, 2000
Abstract


1999

Room with a view (RWAV): A metaphor for interactive computing
L Koved, T Selker
IBM Reasearch, TJ Watson Reasearch Center, Yorktown Heights, New York, USA, Citeseer, 1999


1998

The evolution of Java security
L Koved, AJ Nadalin, D Neal, T Lawson
IBM Systems Journal 37(3), 349-364, International Business Machines Corporation, 1998


1995



1993


2.1 Embedded menus: selecting items in context
L Koved, B Shneiderman
Sparks of innovation in human-computer interaction, 67, Ablex Pub, 1993

GROOP: an object-oriented toolkit for animated 3D graphics
Larry Koved, Wayne L Wooten
OOPSLA '93: Proceedings of the eighth annual conference on Object-oriented programming systems, languages, and applications, pp. 309--325, ACM, 1993

A toolkit for developing multi-user, distributed virtual environments
C F Codella, R Jalili, L Koved, J B Lewis
Proceedings of IEEE 1993 Virtual Reality Annual International Symposium, VRAIS '93, pp. 401--407, IEEE


1992

Rubber Rocks
L Koved
ACM SIGGRAPH Video Review #87 and The CSCW'92 Formal Video Program, Association for Computing Machinery, Saul Greenberg, ed., 1992

An Architecture for Virtual Worlds
Appino, Perry A., Lewis, J. Bryan, Koved, Lawrence, Ling, Daniel T., Rabenhorst, David A. and Codella, Christopher F.
Presence 1(1), MIT, 1992

Dialog manager support For real-time conferencing In Virutal Worlds
L Koved, C Codella, R Jalili, J B Lewis, D T Ling, J S Lipscomb, D A Rabenhorst, C P Wang
In Virtual Worlds, Research Report RC17968, IBM Research, PO Box 218, Yorktown Heights, NY 10598, Citeseer, 1992

Dialog Manager Support For Real-Time Conferencing In Virtual Worlds
L Koved, Thomas Watson IBM Research J Center
Research Report RC17968, Citeseer, 1992

Interactive simulation in a multi-person virtual world
Christopher Codella, Reza Jalili, Lawrence Koved, Bryan J Lewis, Daniel T Ling, James S Lipscomb, David A Rabenhorst, Chu P Wang, Alan Norton, Paula Sweeney, Greg Turk
CHI '92: Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 329--334, ACM, 1992
Abstract


1991

Room With a View
L Koved, T Selker
IBM TJ Watson Research Center Tech. Rep. RC, Yorktown Heights, NY, 1991

Dialogue structures for virtual worlds
J B Lewis, L Koved, D T Ling
Proceedings of the SIGCHI conference on Human factors in computing systems: Reaching through technology, pp. 131-136, ACM, 1991


1990


Design for interactive performance in a virtual laboratory
C P Wang, L Koved, S Dukach
Proceedings of the 1990 symposium on Interactive 3D graphics, pp. 39-40, Association for Computing Machinery
Abstract


1987

A Framework for Comparing Systems with Visual Interfaces
T Selker, C Wolf, L Koved
Human-computer Interaction--INTERACT'87: Proceedings of the Second IFIP Conference on Human-Computer Interaction, Held at the University of Stuttgart, Federal Republic of Germany, 1-4 September, 1987, pp. 683


1986

Embedded menus: Selecting items in context
L Koved, B Shneiderman
Communications of the ACM 29(4), 312-318, Association for Computing Machinery, 1986

Improving availability of software subsystems through on-line error detection
L Koved, G Waldbaum
IBM Systems Journal 25(1), 105--115, IBM Corp., 1986
Abstract


1985

The structure of information in online and paper technical manuals
L J Weldon, C B Mills, L Koved, B Shneiderman
Human Factors and Ergonomics Society Annual Meeting Proceedings, pp. 1110--1113, 1985


Restructuring textual information for online retrieval
L Koved
Unpublished Masters Thesis, Department of Computer Science, University of Maryland Technical Report1529, University of Maryland, 1985


1984

The Object Model: A Historical Perspective
L Koved
Technical Report RC 10809, IBM Research Division, 1984

Implicit versus Explicit Menus
L Koved
IBM Thomas J. Watson Research Center, Yorktown Heights, NY, 1984