Larry Koved  Larry Koved photo         

contact information

Blockchain; FINTECH; Identity; Mobile Security; Information Security
Thomas J. Watson Research Center, Yorktown Heights, NY 10598
  

links

Professional Associations

Professional Associations:  ACM  |  IEEE Computer Society


2016

Usable Multi-Factor Authentication and Risk-Based Authorization
L. Koved; P-C Cheng; D. Marques; N. Ratha; K. Singh; C. Swart; S. Trewin
Technical Report RC25619, IBM Research, 2016
Abstract

Passive security intelligence to analyze the security risks of mobile/BYOD activities
M. Ph. Stoecklin; K. Singh ; L. Koved ; X. Hu ; S. N. Chari ; J. R. Rao ; P. -C. Cheng ; M. Christodorescu ; R. Sailer ; D. L. Schales
IBM Journal of Research and Development 60(4), 9:1 - 9:13, IBM, 2016
Abstract   Distributed by IEEE

Perceptions of Risk in Mobile Transactions
Shari Trewin, Larry Koved, Cal Swart and Kapil Singh
Mobile Security Technologies (MoST) 2016, IEEE
Abstract   Held as part of the IEEE Computer Society Security and Privacy Workshops, in conjunction with the IEEE Symposium on Security and Privacy.


2015

Usable Multi-Factor Authentication and Risk-Based Authorization
L. Koved, P.C. Cheng, D. Marques, N. Ratha, K. Singh, C. Swart, S. Trewin
Technical Report, Air Force Research Laboratory Information Directorate, 2015

Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015
Abigail Goldsteen, Tyrone Grandison, Mike Just, Larry Koved, Rohan Malcolm, Sean Thorpe
Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015, IEEE
Abstract

Security and Privacy on the Web [Guest editors' introduction]
T. Grandison, L. Koved
Software 32(4), 36-39, IEEE, 2015
Abstract


2014

Syntropic Authentication
Suresh Chari; Pau-Chen Cheng; Larry Koved; Ian Molloy; Youngja Park
Who are you?! Adventures in Authentication: WAY Workshop, SOUPS: Symposium on Usable Privacy and Security 2014
Abstract

Improving Usability of Complex Authentication Schemes Via Queue Management and Load Shedding
L. Koved, B. Zhang
Who Are You?! Adventures in Authentication Workshop at the Symposium on Usable Privacy and Security (SOUPS), 2014
Abstract

Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014
L. Koved, K. Singh, H. Chen, M. Just
Third Workshop on Mobile Security Technologies (MoST) 2014, IEEE
Abstract


2013

Perceived security risks in mobile interaction
Larry Koved, Shari Trewin, Cal Swart, Kapil Singh, Pau-Chen Cheng, Suresh Chari
Workshop on Risk Perception in IT Security and Privacy at the 2013 Symposium On Usable Privacy and Security (SOUPS)
Abstract

Practical out-of-band authentication for mobile applications
K. Singh, L. Koved
13th ACM/IFIP/USENIX International Middleware Conference, ACM, 2013
Abstract


2012

Biometric authentication on a mobile device: a study of user effort, error and task disruption
Shari Trewin, Calvin Swart, Larry Koved, Jacquelyn Martino, Kapil Singh, Shay Ben-David
28th Annual Computer Security Applications Conference, ACSAC 2012, ACSA
Abstract


2010

There's Something Stuck In My Shoe
Koved, Larry
Security & Privacy Usability Technology Transfer: Emerging Research (SPUTTER) Workshop, Carnegie Mellon CyLab and Microsoft, 2010
Abstract


2009

Using Recommenders for Discretionary Access Control
Suresh Chari, Larry Koved, and Mary Ellen Zurko
Web 2.0 Security and Privacy, IEEE, 2009
Abstract   Held in conjunction with the 2009 IEEE Symposium on Security and Privacy


2008

SWORD4J: Security WORkbench Development environment 4 Java
Ted Habeck; Larry Koved; Marco Pistoia
IBM Research Report RC24554, IBM T. J. Watson Research Center, 2008
Abstract

Secure Delegation for Web 2.0 and Mashups
P.Austel S. Bhola, S. Chari, L. Koved, M. McIntosh, M. Steiner, S. Weber
Web 2.0 Security and Privacy, IEEE, 2008
Abstract   Held in conjunction with the 2008 IEEE Symposium on Security and Privacy


2007

Making Security Accessible to Programmers
Larry koved
Secure Programming Workshop, 2007


2006

The case for analysis preserving language transformation
X Zhang, L Koved, M Pistoia, S Weber, T Jaeger, G Marceau, L Zeng
Proceedings of the 2006 international symposium on Software testing and analysis, pp. 202, ACM
Abstract

INTELLECT: INTErmediate-Language LEvel C Translator
S K Jain, G Marceau, X Zhang, L Koved, T Jaeger
Technical Report RC23907, IBM Research, 2006
Abstract


2005

Interprocedural analysis for privileged code placement and tainted variable detection
M. Pistoia, R. Flynn, L. Koved, V. Sreedhar
ECOOP 2005-Object-Oriented Programming, 734--734, Springer
Abstract


2004

Enterprise Java ™ Security: Building Secure and Robust J2EE Applications
M. Pistoia, N. Nagaratnam, L. Koved, A. Nadalin
2004 - books.google.com, Addison-Wesley Professional

Detecting Unwanted Synchronization in Java Programs
Leeman, G., Kershenbaum, A., Koved, L., and Reimer, D.
Software Engineering and Applications (SEA 2004). Sponsored by International Association of Science and Technology for Development (IASTED)., MIT
Abstract

SABER: smart analysis based error reduction
D Reimer, E Schonberg, K Srinivas, H Srinivasan, B Alpern, R D Johnson, A Kershenbaum, L Koved
Proceedings of the 2004 ACM SIGSOFT International Symposium on Software Testing and Analysis 29(4), 243--251, ACM
Abstract

Enterprise Java 2 Security: Building Secure and Robust J2EE Applications
M Pistoia, N Nagaratnam, L Koved, A Nadalin
2004 - portal.acm.org, Addison Wesley Longman Publishing Co., Inc. Redwood City, CA, USA
Abstract

Applying Static Analysis to Verifying Security Properties
X Zhang, T Jaegert, L Koved
Proceedings of the 2004 Grace Hopper Celebration of Women in Computing Conference
Abstract

Experiences with Building Security Checking and Understanding Tool
T Habeck, L Koved, O Marquez, VC Sreedhar, M Steiner, W Venema, S Weber
Technical Report RC24243, IBM Research, 2004
Abstract

Validating structural properties of nested objects
D Reimer, E Schonberg, K Srinivas, H Srinivasan, J Dolby, A Kershenbaum, L Koved
Companion to the 19th annual ACM SIGPLAN conference on Object-oriented programming systems, languages, and applications, pp. 294--304, ACM, 2004
Abstract


2002

User authentication and authorization in the Java platform
C Lai, L Gong, L Koved, A Nadalin, R Schemers
Computer Security Applications Conference, 1999, pp. 285--290, 2002
Abstract

Access rights analysis for Java
L. Koved, M. Pistoia, A. Kershenbaum
OOPSLA '02 Proceedings of the 17th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, pp. 359--372, ACM, 2002
Abstract


2001

Security challenges for Enterprise Java in an e-business environment
L Koved, A Nadalin, N Nagaratnam, M Pistoia, T Shrader
IBM Systems Journal 40(1), 130--152, International Business Machines, 2001
Abstract


2000

Automatic Detection of Immutable Fields in Java
S Porat, M Biberstein, L Koved, B Mendelson
CASCON, pp. 10, IBM Press, 2000
Abstract


1999

Room with a view (RWAV): A metaphor for interactive computing
L Koved, T Selker
IBM Reasearch, TJ Watson Reasearch Center, Yorktown Heights, New York, USA, IBM Reasearch, TJ Watson Reasearch Center, 1999
Abstract


1998

The evolution of Java security
L Koved, AJ Nadalin, D Neal, T Lawson
IBM Systems Journal 37(3), 349-364, International Business Machines Corporation, 1998
Abstract


1995

Ubiquitous mail: Speech and graphical user interfaces to an integrated voice/E-mail mailbox
CG Wolf, L Koved, E Kunzinger
Interact '95, North-Holland, 1995
Abstract


1993


2.1 Embedded menus: selecting items in context
L Koved, B Shneiderman
Sparks of innovation in human-computer interaction, 67, Ablex Pub, 1993
Abstract

GROOP: an object-oriented toolkit for animated 3D graphics
Larry Koved, Wayne L Wooten
OOPSLA '93: Proceedings of the eighth annual conference on Object-oriented programming systems, languages, and applications, pp. 309--325, ACM, 1993
Abstract

A toolkit for developing multi-user, distributed virtual environments
C F Codella, R Jalili, L Koved, J B Lewis
Proceedings of IEEE 1993 Virtual Reality Annual International Symposium, VRAIS '93, pp. 401--407, IEEE
Abstract


1992

Rubber Rocks
L Koved
ACM SIGGRAPH Video Review #87 and The CSCW'92 Formal Video Program, Association for Computing Machinery, Saul Greenberg, ed., 1992

An Architecture for Virtual Worlds
Appino, Perry A., Lewis, J. Bryan, Koved, Lawrence, Ling, Daniel T., Rabenhorst, David A. and Codella, Christopher F.
Presence 1(1), MIT, 1992
Abstract

Dialog manager support For real-time conferencing In Virutal Worlds
L Koved, C Codella, R Jalili, J B Lewis, D T Ling, J S Lipscomb, D A Rabenhorst, C P Wang
Technical Report RC17968, IBM Research, 1992
Abstract

Interactive simulation in a multi-person virtual world
Christopher Codella, Reza Jalili, Lawrence Koved, Bryan J Lewis, Daniel T Ling, James S Lipscomb, David A Rabenhorst, Chu P Wang, Alan Norton, Paula Sweeney, Greg Turk
CHI '92: Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 329--334, ACM, 1992
Abstract


1991

Room With a View
L Koved, T Selker
Technical Report, IBM Research, 1991

Dialogue structures for virtual worlds
J B Lewis, L Koved, D T Ling
Proceedings of the SIGCHI conference on Human factors in computing systems: Reaching through technology, pp. 131-136, ACM, 1991


1990

CVIEW: A Real-Time Interactive Conferencing System
L Koved
Technical Report RC16138, IBM Research, 1990
Abstract

Design for interactive performance in a virtual laboratory
C P Wang, L Koved, S Dukach
Proceedings of the 1990 symposium on Interactive 3D graphics, pp. 39-40, Association for Computing Machinery
Abstract


1988

Elements of visual language
T Selker, L Koved
1988 IEEE Workshop on Visual Languages, pp. 38--44, IEEE
Abstract


1987

A Framework for Comparing Systems with Visual Interfaces
T Selker, C Wolf, L Koved
Human-computer Interaction--INTERACT'87: Proceedings of the Second IFIP Conference on Human-Computer Interaction, Held at the University of Stuttgart, Federal Republic of Germany, 1-4 September, 1987, pp. 683
Abstract


1986

Embedded menus: Selecting items in context
L Koved, B Shneiderman
Communications of the ACM 29(4), 312-318, Association for Computing Machinery, 1986
Abstract

Improving availability of software subsystems through on-line error detection
L Koved, G Waldbaum
IBM Systems Journal 25(1), 105--115, IBM Corp., 1986
Abstract


1985

The structure of information in online and paper technical manuals
L J Weldon, C B Mills, L Koved, B Shneiderman
Human Factors and Ergonomics Society Annual Meeting Proceedings, pp. 1110--1113, 1985
Abstract


Restructuring textual information for online retrieval
L Koved
Unpublished Masters Thesis, Department of Computer Science, University of Maryland Technical Report1529, University of Maryland, 1985


1984

The Object Model: A Historical Perspective
L Koved
Technical Report RC 10809, IBM Research Division, 1984

Implicit versus Explicit Menus
L Koved
IBM Thomas J. Watson Research Center, Yorktown Heights, NY, 1984