Larry Koved  Larry Koved photo         

contact information

Blockchain; FINTECH; Identity; Mobile Security; Information Security
Thomas J. Watson Research Center, Yorktown Heights, NY 10598


Professional Associations

Professional Associations:  ACM  |  IEEE Computer Society


Usable Multi-Factor Authentication and Risk-Based Authorization
L. Koved; P-C Cheng; D. Marques; N. Ratha; K. Singh; C. Swart; S. Trewin
Technical Report, IBM, 2016

Passive security intelligence to analyze the security risks of mobile/BYOD activities
M. Ph. Stoecklin; K. Singh ; L. Koved ; X. Hu ; S. N. Chari ; J. R. Rao ; P. -C. Cheng ; M. Christodorescu ; R. Sailer ; D. L. Schales
IBM Journal of Research and Development 60(4), 9:1 - 9:13, IBM, 2016
Abstract   Distributed by IEEE

Perceptions of Risk in Mobile Transactions
Shari Trewin, Larry Koved, Cal Swart and Kapil Singh
Mobile Security Technologies (MoST) 2016, USENIX


Usable Multi-Factor Authentication and Risk-Based Authorization
L. Koved, P.C. Cheng, D. Marques, N. Ratha, K. Singh, C. Swart, S. Trewin
Technical Report, Air Force Research Laboratory Information Directorate, 2015

Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015
Abigail Goldsteen, Tyrone Grandison, Mike Just, Larry Koved, Rohan Malcolm, Sean Thorpe
Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015, IEEE

Security and Privacy on the Web [Guest editors' introduction]
T. Grandison, L. Koved
Software 32(4), 36-39, IEEE, 2015


Improving Usability of Complex Authentication Schemes Via Queue Management and Load Shedding
L. Koved, B. Zhang
Who Are You?! Adventures in Authentication Workshop at the Symposium on Usable Privacy and Security (SOUPS), 2014

Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014
L. Koved, K. Singh, H. Chen, M. Just
Third Workshop on Mobile Security Technologies (MoST) 2014, IEEE


Perceived security risks in mobile interaction
Larry Koved, Shari Trewin, Cal Swart, Kapil Singh, Pau-Chen Cheng, Suresh Chari
Workshop on Risk Perception in IT Security and Privacy at the 2013 Symposium On Usable Privacy and Security (SOUPS)

Practical out-of-band authentication for mobile applications
K. Singh, L. Koved
13th ACM/IFIP/USENIX International Middleware Conference, ACM, 2013


Biometric authentication on a mobile device: a study of user effort, error and task disruption
Shari Trewin, Calvin Swart, Larry Koved, Jacquelyn Martino, Kapil Singh, Shay Ben-David
28th Annual Computer Security Applications Conference, ACSAC 2012, ACSA


There's Something Stuck In My Shoe
Koved, Larry
Security & Privacy Usability Technology Transfer: Emerging Research (SPUTTER) Workshop, Carnegie Mellon CyLab and Microsoft, 2010


Using Recommenders for Discretionary Access Control
Suresh Chari, Larry Koved, and Mary Ellen Zurko
Web 2.0 Security and Privacy, 2009


SWORD4J: Security WORkbench Development environment 4 Java
Ted Habeck; Larry Koved; Marco Pistoia
IBM Research Report RC24554, P.O. Box 704, Yorktown Heights, NY 10598, IBM T. J. Watson Research Center, 2008

Secure Delegation for Web 2.0 and Mashups
S Chari, L Koved, M Mcintosh, M Steiner, S Weber
W2SP 2008: Web 2.0 Security and Privacy

Secure Delegation for Web 2.0 and Mashups
P.Austel S. Bhola, S. Chari, L. Koved, M. McIntosh, M. Steiner, S. Weber
Web 2.0 Security and Privacy, Citeseer, 2008


Making Security Accessible to Programmers
Larry koved
Secure Programming Workshop, 2007


The case for analysis preserving language transformation
X Zhang, L Koved, M Pistoia, S Weber, T Jaeger, G Marceau, L Zeng
Proceedings of the 2006 international symposium on Software testing and analysis, pp. 202, ACM

INTELLECT: INTErmediate-Language LEvel C Translator
S K Jain, G Marceau, X Zhang, L Koved, T Jaeger
Technical Report, 2006


Interprocedural analysis for privileged code placement and tainted variable detection
M. Pistoia, R. Flynn, L. Koved, V. Sreedhar
ECOOP 2005-Object-Oriented Programming, 734--734, Springer


Enterprise Java ™ Security: Building Secure and Robust J2EE Applications
M. Pistoia, N. Nagaratnam, L. Koved, A. Nadalin
2004 -, Addison-Wesley Professional

Detecting Unwanted Synchronization in Java Programs
Leeman, G., Kershenbaum, A., Koved, L., and Reimer, D.
Software Engineering and Applications (SEA 2004). Sponsored by International Association of Science and Technology for Development (IASTED)., MIT

SABER: smart analysis based error reduction
D Reimer, E Schonberg, K Srinivas, H Srinivasan, B Alpern, R D Johnson, A Kershenbaum, L Koved
Proceedings of the 2004 ACM SIGSOFT International Symposium on Software Testing and Analysis 29(4), 243--251, IEEE

Enterprise Java 2 Security: Building Secure and Robust J2EE Applications
M Pistoia, N Nagaratnam, L Koved, A Nadalin
2004 -, Addison Wesley Longman Publishing Co., Inc. Redwood City, CA, USA

Applying Static Analysis to Verifying Security Properties
X Zhang, T Jaegert, L Koved
Proceedings of the 2004 Grace Hopper Celebration of Women in Computing Conference

Experiences with Building Security Checking and Understanding Tool
T Habeck, L Koved, O Marquez, VC Sreedhar, M Steiner, W Venema, S Weber, IBM Research, 2004

Validating structural properties of nested objects
D Reimer, E Schonberg, K Srinivas, H Srinivasan, J Dolby, A Kershenbaum, L Koved
Companion to the 19th annual ACM SIGPLAN conference on Object-oriented programming systems, languages, and applications, pp. 294--304, Vancouver, BC, Canada, 2004


User authentication and authorization in the Java platform
C Lai, L Gong, L Koved, A Nadalin, R Schemers
Computer Security Applications Conference, 1999, pp. 285--290, 2002

Elements of visual language
T Selker, L Koved
Visual Languages, 1988, pp. 38--44, 2002

Access rights analysis for Java
L. Koved, M. Pistoia, A. Kershenbaum
ACM SIGPLAN Notices, pp. 359--372, ACM, 2002


Security challenges for Enterprise Java in an e-business environment
L Koved, A Nadalin, N Nagaratnam, M Pistoia, T Shrader
IBM Systems Journal 40(1), 130--152, International Business Machines, 2001


Automatic Detection of Immutable Fields in Java
S Porat, M Biberstein, L Koved, B Mendelson
CASCON, pp. 10, IBM Press, 2000


Room with a view (RWAV): A metaphor for interactive computing
L Koved, T Selker
IBM Reasearch, TJ Watson Reasearch Center, Yorktown Heights, New York, USA, Citeseer, 1999


The evolution of Java security
L Koved, AJ Nadalin, D Neal, T Lawson
IBM Systems Journal 37(3), 349-364, International Business Machines Corporation, 1998



2.1 Embedded menus: selecting items in context
L Koved, B Shneiderman
Sparks of innovation in human-computer interaction, 67, Ablex Pub, 1993

GROOP: an object-oriented toolkit for animated 3D graphics
Larry Koved, Wayne L Wooten
OOPSLA '93: Proceedings of the eighth annual conference on Object-oriented programming systems, languages, and applications, pp. 309--325, ACM, 1993

A toolkit for developing multi-user, distributed virtual environments
C F Codella, R Jalili, L Koved, J B Lewis
Proceedings of IEEE 1993 Virtual Reality Annual International Symposium, VRAIS '93, pp. 401--407, IEEE


Rubber Rocks
L Koved
ACM SIGGRAPH Video Review #87 and The CSCW'92 Formal Video Program, Association for Computing Machinery, Saul Greenberg, ed., 1992

An Architecture for Virtual Worlds
Appino, Perry A., Lewis, J. Bryan, Koved, Lawrence, Ling, Daniel T., Rabenhorst, David A. and Codella, Christopher F.
Presence 1(1), MIT, 1992

Dialog manager support For real-time conferencing In Virutal Worlds
L Koved, C Codella, R Jalili, J B Lewis, D T Ling, J S Lipscomb, D A Rabenhorst, C P Wang
In Virtual Worlds, Research Report RC17968, IBM Research, PO Box 218, Yorktown Heights, NY 10598, Citeseer, 1992

Dialog Manager Support For Real-Time Conferencing In Virtual Worlds
L Koved, Thomas Watson IBM Research J Center
Research Report RC17968, Citeseer, 1992

Interactive simulation in a multi-person virtual world
Christopher Codella, Reza Jalili, Lawrence Koved, Bryan J Lewis, Daniel T Ling, James S Lipscomb, David A Rabenhorst, Chu P Wang, Alan Norton, Paula Sweeney, Greg Turk
CHI '92: Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 329--334, ACM, 1992


Room With a View
L Koved, T Selker
IBM TJ Watson Research Center Tech. Rep. RC, Yorktown Heights, NY, 1991

Dialogue structures for virtual worlds
J B Lewis, L Koved, D T Ling
Proceedings of the SIGCHI conference on Human factors in computing systems: Reaching through technology, pp. 131-136, ACM, 1991


Design for interactive performance in a virtual laboratory
C P Wang, L Koved, S Dukach
Proceedings of the 1990 symposium on Interactive 3D graphics, pp. 39-40, Association for Computing Machinery


A Framework for Comparing Systems with Visual Interfaces
T Selker, C Wolf, L Koved
Human-computer Interaction--INTERACT'87: Proceedings of the Second IFIP Conference on Human-Computer Interaction, Held at the University of Stuttgart, Federal Republic of Germany, 1-4 September, 1987, pp. 683


Embedded menus: Selecting items in context
L Koved, B Shneiderman
Communications of the ACM 29(4), 312-318, Association for Computing Machinery, 1986

Improving availability of software subsystems through on-line error detection
L Koved, G Waldbaum
IBM Systems Journal 25(1), 105--115, IBM Corp., 1986


The structure of information in online and paper technical manuals
L J Weldon, C B Mills, L Koved, B Shneiderman
Human Factors and Ergonomics Society Annual Meeting Proceedings, pp. 1110--1113, 1985

Restructuring textual information for online retrieval
L Koved
Unpublished Masters Thesis, Department of Computer Science, University of Maryland Technical Report1529, University of Maryland, 1985


The Object Model: A Historical Perspective
L Koved
Technical Report RC 10809, IBM Research Division, 1984

Implicit versus Explicit Menus
L Koved
IBM Thomas J. Watson Research Center, Yorktown Heights, NY, 1984