


default search action
Michael K. Reiter
Person information
- affiliation: Duke University, Durham, NC, USA
- affiliation (former): Carnegie Mellon University, Pittsburgh, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c231]Lulu Zhou, Zeyu Liu, Fan Zhang, Michael K. Reiter:
CrudiTEE: A Stick-And-Carrot Approach to Building Trustworthy Cryptocurrency Wallets with TEEs. AFT 2024: 16:1-16:25 - [c230]Keane Lucas
, Weiran Lin
, Lujo Bauer
, Michael K. Reiter
, Mahmood Sharif
:
Training Robust ML-based Raw-Binary Malware Detectors in Hours, not Months. CCS 2024: 124-138 - [c229]Zonghao Huang
, Neil Zhenqiang Gong
, Michael K. Reiter
:
A General Framework for Data-Use Auditing of ML Models. CCS 2024: 1300-1314 - [c228]Akhil Bandarupalli
, Adithya Bhat
, Saurabh Bagchi
, Aniket Kate
, Michael K. Reiter
:
Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography. CCS 2024: 2621-2635 - [c227]Chenglu Jin
, Chao Yin
, Marten van Dijk
, Sisi Duan
, Fabio Massacci
, Michael K. Reiter
, Haibin Zhang
:
PG: Byzantine Fault-Tolerant and Privacy-Preserving Sensor Fusion with Guaranteed Output Delivery. CCS 2024: 3272-3286 - [c226]Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Chen-Da Liu-Zhang, Michael K. Reiter:
Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles. DSN 2024: 456-469 - [c225]Weili Wang, Jianyu Niu, Michael K. Reiter, Yinqian Zhang:
Formally Verifying a Rollback-Prevention Protocol for TEEs. FORTE 2024: 155-173 - [c224]Akhil Bandarupalli, Adithya Bhat, Somali Chaterji, Michael K. Reiter, Aniket Kate, Saurabh Bagchi:
SensorBFT: Fault-Tolerant Target Localization Using Voronoi Diagrams and Approximate Agreement. ICDCS 2024: 186-197 - [c223]Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Group-based Robustness: A General Framework for Customized Robustness in the Real World. NDSS 2024 - [c222]Ke Coby Wang, Michael K. Reiter:
Bernoulli Honeywords. NDSS 2024 - [c221]Hongbin Liu, Michael K. Reiter, Neil Zhenqiang Gong:
Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models. USENIX Security Symposium 2024 - [c220]Zonghao Huang, Lujo Bauer, Michael K. Reiter:
The Impact of Exposed Passwords on Honeyword Efficacy. USENIX Security Symposium 2024 - [c219]Pranay Jain, Andrew C. Reed, Michael K. Reiter:
Near-Optimal Constrained Padding for Object Retrievals with Dependencies. USENIX Security Symposium 2024 - [c218]Jiarong Xing, Sophia Yoo, Xenofon Foukas, Daehyeok Kim, Michael K. Reiter:
On the Criticality of Integrity Protection in 5G Fronthaul Networks. USENIX Security Symposium 2024 - [d2]Akhil Bandarupalli
, Adithya Bhat
, Saurabh Bagchi
, Aniket Kate
, Michael K. Reiter
:
Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography. Version 1. Zenodo, 2024 [all versions] - [d1]Akhil Bandarupalli
, Adithya Bhat
, Saurabh Bagchi
, Aniket Kate
, Michael K. Reiter
:
Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography. Version 2. Zenodo, 2024 [all versions] - [i40]Hongbin Liu, Michael K. Reiter, Neil Zhenqiang Gong:
Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models. CoRR abs/2402.14977 (2024) - [i39]Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Chen-Da Liu-Zhang, Michael K. Reiter:
Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles. CoRR abs/2405.02431 (2024) - [i38]Yujie Zhang, Neil Gong, Michael K. Reiter:
Concealing Backdoor Model Updates in Federated Learning by Trigger-Optimized Data Poisoning. CoRR abs/2405.06206 (2024) - [i37]Peiyao Sheng, Chenyuan Wu, Dahlia Malkhi, Michael K. Reiter, Chrysoula Stathakopoulou, Michael Wei, Maofan Yin:
On Orchestrating Parallel Broadcasts for Distributed Ledgers. CoRR abs/2407.00030 (2024) - [i36]Zonghao Huang, Neil Zhenqiang Gong, Michael K. Reiter:
A General Framework for Data-Use Auditing of ML Models. CoRR abs/2407.15100 (2024) - [i35]Lulu Zhou, Zeyu Liu, Fan Zhang, Michael K. Reiter:
CrudiTEE: A Stick-and-Carrot Approach to Building Trustworthy Cryptocurrency Wallets with TEEs. CoRR abs/2407.16473 (2024) - [i34]Peiyao Sheng, Chenyuan Wu, Dahlia Malkhi, Michael K. Reiter, Chrysoula Stathakopoulou, Michael Wei, Maofan Yin:
On Orchestrating Parallel Broadcasts for Distributed Ledgers. IACR Cryptol. ePrint Arch. 2024: 923 (2024) - 2023
- [j55]Carl E. Landwehr
, Michael K. Reiter
, Laurie A. Williams
, Gene Tsudik
, Trent Jaeger
, Tadayoshi Kohno
, Apu Kapadia
:
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription. IEEE Secur. Priv. 21(2): 32-42 (2023) - [c217]Andrew Chi
, Blake Anderson
, Michael K. Reiter
:
Prioritizing Remediation of Enterprise Hosts by Malware Execution Risk. ACSAC 2023: 550-564 - [c216]Michael K. Reiter
:
Tackling Credential Abuse Together. CODASPY 2023: 1 - [c215]Andrew C. Reed, Michael K. Reiter:
Optimally Hiding Object Sizes with Constrained Padding. CSF 2023: 505-520 - [c214]Anrin Chakraborti, Michael K. Reiter:
Privately Evaluating Region Overlaps with Applications to Collaborative Sensor Output Validation. EuroS&P 2023: 1013-1029 - [c213]Adithya Bhat, Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
The Unique Chain Rule and Its Applications. FC (1) 2023: 38-55 - [c212]Sheng Liu, Michael K. Reiter, Theophilus A. Benson:
Nimble: Fast and Safe Migration of Network Functions. INFOCOM 2023: 1-10 - [c211]Adithya Bhat
, Akhil Bandarupalli
, Manish Nagaraj
, Saurabh Bagchi
, Aniket Kate
, Michael K. Reiter
:
EESMR: Energy Efficient BFT - SMR for the masses. Middleware 2023: 1-14 - [c210]Anrin Chakraborti, Giulia Fanti, Michael K. Reiter:
Distance-Aware Private Set Intersection. USENIX Security Symposium 2023: 319-336 - [c209]Keane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Adversarial Training for Raw-Binary Malware Classifiers. USENIX Security Symposium 2023: 1163-1180 - [i33]Adithya Bhat, Akhil Bandarupalli, Manish Nagaraj
, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
EESMR: Energy Efficient BFT-SMR for the masses. CoRR abs/2304.04998 (2023) - [i32]Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer
, Michael K. Reiter, Mahmood Sharif:
Group-based Robustness: A General Framework for Customized Robustness in the Real World. CoRR abs/2306.16614 (2023) - [i31]Zonghao Huang, Lujo Bauer
, Michael K. Reiter:
The Impact of Exposed Passwords on Honeyword Efficacy. CoRR abs/2309.10323 (2023) - [i30]Zonghao Huang, Neil Gong, Michael K. Reiter:
Mendata: A Framework to Purify Manipulated Training Data. CoRR abs/2312.01281 (2023) - [i29]Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
HashRand: Efficient Asynchronous Random Beacon without Threshold Cryptographic Setup. IACR Cryptol. ePrint Arch. 2023: 1755 (2023) - 2022
- [j54]Xiaokuan Zhang
, Jihun Hamm, Michael K. Reiter, Yinqian Zhang:
Defeating traffic analysis via differential privacy: a case study on streaming traffic. Int. J. Inf. Sec. 21(3): 689-706 (2022) - [c208]Kai Wang, Lily Xu, Andrew Perrault, Michael K. Reiter, Milind Tambe:
Coordinating Followers to Reach Better Equilibria: End-to-End Gradient Descent for Stackelberg Games. AAAI 2022: 5219-5227 - [c207]Weili Wang, Sen Deng, Jianyu Niu, Michael K. Reiter, Yinqian Zhang:
ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes. CCS 2022: 2841-2855 - [c206]Christopher M. Bender, Patrick Emmanuel, Michael K. Reiter, Junier Oliva:
Practical Integration via Separable Bijective Networks. ICLR 2022 - [c205]Weiran Lin, Keane Lucas, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks. ICML 2022: 13405-13430 - [c204]Sravya Yandamuri, Ittai Abraham, Kartik Nayak, Michael K. Reiter:
Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption. OPODIS 2022: 24:1-24:23 - [i28]Ke Coby Wang, Michael K. Reiter:
Bernoulli honeywords. CoRR abs/2212.12759 (2022) - 2021
- [j53]Joseph Severini, Radhika Niranjan Mysore, Vyas Sekar, Sujata Banerjee, Michael K. Reiter:
The Netivus Manifesto: making collaborative network management easier for the rest of us. Comput. Commun. Rev. 51(2): 10-17 (2021) - [j52]Ziqiao Zhou, Michael K. Reiter:
Interpretable noninterference measurement and its application to processor designs. Proc. ACM Program. Lang. 5(OOPSLA): 1-30 (2021) - [c203]Keane Lucas
, Mahmood Sharif
, Lujo Bauer
, Michael K. Reiter
, Saurabh Shintre:
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes. AsiaCCS 2021: 744-758 - [c202]Iffat Anjum, Mu Zhu, Isaac Polinsky
, William Enck, Michael K. Reiter
, Munindar P. Singh:
Role-Based Deception in Enterprise Networks. CODASPY 2021: 65-76 - [c201]Adam Humphries, Kartik Cating-Subramanian, Michael K. Reiter:
TASE: Reducing Latency of Symbolic Execution with Transactional Memory. NDSS 2021 - [c200]Cheng Guo, Brianne Campbell, Apu Kapadia, Michael K. Reiter, Kelly Caine:
Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication. USENIX Security Symposium 2021: 1-18 - [c199]Ke Coby Wang, Michael K. Reiter:
Using Amnesia to Detect Credential Database Breaches. USENIX Security Symposium 2021: 839-855 - [c198]Sravya Yandamuri, Ittai Abraham, Kartik Nayak, Michael K. Reiter:
Brief Announcement: Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption. DISC 2021: 62:1-62:4 - [i27]Kai Wang, Lily Xu, Andrew Perrault, Michael K. Reiter, Milind Tambe:
Coordinating Followers to Reach Better Equilibria: End-to-End Gradient Descent for Stackelberg Games. CoRR abs/2106.03278 (2021) - [i26]Andrew C. Reed, Michael K. Reiter:
Optimally Hiding Object Sizes with Constrained Padding. CoRR abs/2108.01753 (2021) - [i25]Weiran Lin, Keane Lucas, Lujo Bauer
, Michael K. Reiter, Mahmood Sharif:
Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks. CoRR abs/2112.14232 (2021) - [i24]Anrin Chakraborti, Giulia Fanti, Michael K. Reiter:
Distance-Aware Private Set Intersection. CoRR abs/2112.14737 (2021) - [i23]Adithya Bhat, Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
Apollo - Optimistically Linear and Responsive SMR. IACR Cryptol. ePrint Arch. 2021: 180 (2021) - [i22]Sravya Yandamuri, Ittai Abraham, Kartik Nayak, Michael K. Reiter:
Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption. IACR Cryptol. ePrint Arch. 2021: 184 (2021) - 2020
- [j51]Zeyu Mi
, Haibo Chen
, Yinqian Zhang, ShuangHe Peng, Xiaofeng Wang, Michael K. Reiter
:
CPU Elasticity to Mitigate Cross-VM Runtime Monitoring. IEEE Trans. Dependable Secur. Comput. 17(5): 1094-1108 (2020) - [c197]Isaac Polinsky
, Kyle Martin, William Enck, Michael K. Reiter:
n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications. CODASPY 2020: 235-246 - [c196]Christopher M. Bender, Yang Li, Yifeng Shi, Michael K. Reiter, Junier Oliva:
Defense Through Diverse Directions. ICML 2020: 756-766 - [c195]Qiuyu Xiao, Brittany Subialdea, Lujo Bauer
, Michael K. Reiter:
Metering Graphical Data Leakage with Snowman. SACMAT 2020: 1-12 - [c194]Ke Coby Wang, Michael K. Reiter:
Detecting Stuffing of a User's Credentials at Her Own Accounts. USENIX Security Symposium 2020: 2201-2218 - [i21]Christopher M. Bender, Yang Li, Yifeng Shi, Michael K. Reiter, Junier B. Oliva:
Defense Through Diverse Directions. CoRR abs/2003.10602 (2020) - [i20]Iffat Anjum, Mu Zhu, Isaac Polinsky, William Enck, Michael K. Reiter, Munindar P. Singh:
Role-Based Deception in Enterprise Networks. CoRR abs/2008.02979 (2020)
2010 – 2019
- 2019
- [j50]Mahmood Sharif
, Sruti Bhagavatula, Lujo Bauer
, Michael K. Reiter:
A General Framework for Adversarial Examples with Objectives. ACM Trans. Priv. Secur. 22(3): 16:1-16:30 (2019) - [c193]Soumya Basu, Alin Tomescu, Ittai Abraham, Dahlia Malkhi, Michael K. Reiter, Emin Gün Sirer:
Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols. CCS 2019: 2387-2402 - [c192]Guy Golan-Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael K. Reiter, Dragos-Adrian Seredinschi, Orr Tamir, Alin Tomescu:
SBFT: A Scalable and Decentralized Trust Infrastructure. DSN 2019: 568-580 - [c191]Sheng Liu, Theophilus A. Benson, Michael K. Reiter:
Efficient and Safe Network Updates with Suffix Causal Consistency. EuroSys 2019: 23:1-23:15 - [c190]Ke Coby Wang, Michael K. Reiter:
How to End Password Reuse on the Web. NDSS 2019 - [c189]Xiaokuan Zhang, Jihun Hamm, Michael K. Reiter, Yinqian Zhang:
Statistical Privacy for Streaming Traffic. NDSS 2019 - [c188]Maofan Yin, Dahlia Malkhi, Michael K. Reiter
, Guy Golan-Gueta, Ittai Abraham:
HotStuff: BFT Consensus with Linearity and Responsiveness. PODC 2019: 347-356 - [i19]Isaac Polinsky, Kyle Martin, William Enck, Michael K. Reiter:
n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications. CoRR abs/1910.08648 (2019) - [i18]Mahmood Sharif, Lujo Bauer
, Michael K. Reiter:
n-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers. CoRR abs/1912.09059 (2019) - [i17]Mahmood Sharif, Keane Lucas, Lujo Bauer
, Michael K. Reiter, Saurabh Shintre:
Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection. CoRR abs/1912.09064 (2019) - [i16]Ke Coby Wang, Michael K. Reiter:
Detecting stuffing of a user's credentials at her own accounts. CoRR abs/1912.11118 (2019) - [i15]Adam Humphries, Kartik Cating-Subramanian, Michael K. Reiter:
TASE: Reducing latency of symbolic execution with transactional memory. CoRR abs/1912.12363 (2019) - 2018
- [c187]Sisi Duan, Michael K. Reiter, Haibin Zhang:
BEAT: Asynchronous BFT Made Practical. CCS 2018: 2028-2041 - [c186]Victor Heorhiadi, Sanjay Chandrasekaran, Michael K. Reiter, Vyas Sekar:
Intent-driven composition of resource-management SDN applications. CoNEXT 2018: 86-97 - [c185]Mahmood Sharif, Lujo Bauer
, Michael K. Reiter:
On the Suitability of Lp-Norms for Creating and Preventing Adversarial Examples. CVPR Workshops 2018: 1605-1613 - [c184]Guoxing Chen, Ten-Hwang Lai, Michael K. Reiter, Yinqian Zhang:
Differentially Private Access Patterns for Searchable Symmetric Encryption. INFOCOM 2018: 810-818 - [c183]Ziqiao Zhou, Zhiyun Qian
, Michael K. Reiter, Yinqian Zhang:
Static Evaluation of Noninterference Using Approximate Model Counting. IEEE Symposium on Security and Privacy 2018: 514-528 - [i14]Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter:
Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition. CoRR abs/1801.00349 (2018) - [i13]Mahmood Sharif, Lujo Bauer
, Michael K. Reiter:
On the Suitability of Lp-norms for Creating and Preventing Adversarial Examples. CoRR abs/1802.09653 (2018) - [i12]Guy Golan-Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael K. Reiter, Dragos-Adrian Seredinschi, Orr Tamir, Alin Tomescu:
SBFT: a Scalable Decentralized Trust Infrastructure for Blockchains. CoRR abs/1804.01626 (2018) - [i11]Ke Coby Wang, Michael K. Reiter:
How to end password reuse on the web. CoRR abs/1805.00566 (2018) - [i10]Chenglu Jin, Marten van Dijk, Michael K. Reiter, Haibin Zhang:
PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion. IACR Cryptol. ePrint Arch. 2018: 1171 (2018) - 2017
- [j49]Jay Aikat, Aditya Akella, Jeffrey S. Chase
, Ari Juels, Michael K. Reiter, Thomas Ristenpart, Vyas Sekar, Michael M. Swift:
Rethinking Security in the Era of Cloud Computing. IEEE Secur. Priv. 15(3): 60-69 (2017) - [j48]Qatrunnada Ismail, Tousif Ahmed, Kelly Caine, Apu Kapadia, Michael K. Reiter:
To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps' Privacy Permission Settings. Proc. Priv. Enhancing Technol. 2017(4): 119-137 (2017) - [j47]Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang:
Personalized Pseudonyms for Servers in the Cloud. Proc. Priv. Enhancing Technol. 2017(4): 271-289 (2017) - [c182]Sanchuan Chen, Xiaokuan Zhang, Michael K. Reiter, Yinqian Zhang:
Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu. AsiaCCS 2017: 7-18 - [c181]Sisi Duan, Michael K. Reiter, Haibin Zhang:
Secure Causal Atomic Broadcast, Revisited. DSN 2017: 61-72 - [c180]Weijie Liu
, Debin Gao
, Michael K. Reiter:
On-Demand Time Blurring to Support Side-Channel Defense. ESORICS (2) 2017: 210-228 - [c179]Sheng Liu, Michael K. Reiter, Vyas Sekar:
Flow Reconnaissance via Timing Attacks on SDN Switches. ICDCS 2017: 196-206 - [c178]Andrew Chi, Robert A. Cochran, Marie Nesfield, Michael K. Reiter, Cynthia Sturton:
A System to Verify Network Behavior of Known Cryptographic Clients. NSDI 2017: 177-195 - 2016
- [c177]Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang:
A Software Approach to Defeating Side Channels in Last-Level Caches. CCS 2016: 871-882 - [c176]Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer
, Michael K. Reiter
:
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition. CCS 2016: 1528-1540 - [c175]Elli Androulaki, Michael K. Reiter:
CCSW'16: 8th ACM Cloud Computing Security Workshop. CCS 2016: 1882-1883 - [c174]Jassim Aljuraidan, Lujo Bauer
, Michael K. Reiter, Matthias Beckerle:
Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational Workers. Financial Cryptography 2016: 60-77 - [c173]Victor Heorhiadi, Shriram Rajagopalan, Hani Jamjoom, Michael K. Reiter, Vyas Sekar:
Gremlin: Systematic Resilience Testing of Microservices. ICDCS 2016: 57-66 - [c172]Victor Heorhiadi, Michael K. Reiter, Vyas Sekar:
Simplifying Software-Defined Network Optimization Using SOL. NSDI 2016: 223-237 - [c171]Jay Aikat, Michael K. Reiter, Kevin Jeffay:
Education Modules for Networking, Cloud Computing, and Security in Systems Courses. SIGCSE 2016: 400 - [c170]Florian Tramèr
, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Stealing Machine Learning Models via Prediction APIs. USENIX Security Symposium 2016: 601-618 - [e5]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Elli Androulaki, Michael K. Reiter:
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, CCSW 2016, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4572-9 [contents] - [i9]Andrew Chi, Robert A. Cochran, Marie Nesfield, Michael K. Reiter, Cynthia Sturton:
Server-side verification of client behavior in cryptographic protocols. CoRR abs/1603.04085 (2016) - [i8]Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang:
A software approach to defeating side channels in last-level caches. CoRR abs/1603.05615 (2016) - [i7]Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Stealing Machine Learning Models via Prediction APIs. CoRR abs/1609.02943 (2016) - 2015
- [j46]Lei Wei, Michael K. Reiter:
Toward practical encrypted email that supports private, regular-expression searches. Int. J. Inf. Sec. 14(5): 397-416 (2015) - [c169]Mehrdad Moradi, Feng Qian, Qiang Xu, Zhuoqing Morley Mao, Darrell Bethea, Michael K. Reiter:
Caesar: High-Speed and Memory-Efficient Forwarding Engine for Future Internet Architecture. ANCS 2015: 171-182 - [c168]Michael K. Reiter:
Side Channels in Multi-Tenant Environments. CCSW 2015: 1 - [c167]Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang:
Mitigating Storage Side Channels Using Statistical Privacy Mechanisms. CCS 2015: 1582-1594 - [c166]Soo-Jin Moon, Vyas Sekar, Michael K. Reiter:
Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration. CCS 2015: 1595-1606 - [c165]Qatrunnada Ismail, Tousif Ahmed
, Apu Kapadia, Michael K. Reiter:
Crowdsourced Exploration of Security Configurations. CHI 2015: 467-476 - [c164]Darrell Bethea, Michael K. Reiter, Feng Qian, Qiang Xu, Zhuoqing Morley Mao:
WACCO and LOKO: Strong Consistency at Global Scale. CIC 2015: 130-141 - [c163]Peng Li, Debin Gao
, Michael K. Reiter:
Replica Placement for Availability in the Worst Case. ICDCS 2015: 599-608 - [c162]Sarah J. Andrabi, Michael K. Reiter, Cynthia Sturton:
Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices. SOUPS 2015: 89-102 - [e4]Michael K. Reiter, David Naccache:
Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings. Lecture Notes in Computer Science 9476, Springer 2015, ISBN 978-3-319-26822-4 [contents] - [i6]Victor Heorhiadi, Michael K. Reiter, Vyas Sekar:
Accelerating the Development of Software-Defined Network Optimization Applications Using SOL. CoRR abs/1504.07704 (2015) - 2014
- [j45]Hye-Chung Kum, Ashok K. Krishnamurthy, Ashwin Machanavajjhala, Michael K. Reiter, Stanley C. Ahalt:
Privacy preserving interactive record linkage (PPIRL). J. Am. Medical Informatics Assoc. 21(2): 212-220 (2014) - [j44]Peng Li, Debin Gao
, Michael K. Reiter:
StopWatch: A Cloud Architecture for Timing Channel Mitigation. ACM Trans. Inf. Syst. Secur. 17(2): 8:1-8:28 (2014) - [c161]Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Cross-Tenant Side-Channel Attacks in PaaS Clouds. CCS 2014: 990-1003 - [c160]Ting-Fang Yen, Victor Heorhiadi, Alina Oprea, Michael K. Reiter, Ari Juels:
An Epidemiological Study of Malware Encounters in a Large Enterprise. CCS 2014: 1117-1130 - [c159]Alana Libonati, Kelly Caine, Apu Kapadia, Michael K. Reiter:
Defending against device theft with human notarization. CollaborateCom 2014: 8-17 - [c158]Michelle L. Mazurek, Yuan Liang, William Melicher, Manya Sleeper, Lujo Bauer, Gregory R. Ganger, Nitin Gupta, Michael K. Reiter:
Toward strong, usable access control for shared distributed data. FAST 2014: 89-103 - [c157]Victor Heorhiadi, Seyed Kaveh Fayaz, Michael K. Reiter, Vyas Sekar:
SNIPS: A Software-Defined Approach for Scaling Intrusion Prevention Systems via Offloading. ICISS 2014: 9-29 - 2013
- [c156]Hye-Chung Kum, Ashok Kumar Krishnamurthy, Darshana Pathak, Michael K. Reiter, Stanley C. Ahalt:
Secure Decoupled Linkage (SDLink) system for building a social genome. IEEE BigData 2013: 7-11 - [c155]Yinqian Zhang, Michael K. Reiter:
Düppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud. CCS 2013: 827-838 - [c154]Seyed Kaveh Fayazbakhsh, Michael K. Reiter, Vyas Sekar:
Verifiable network function outsourcing: requirements, challenges, and roadmap. HotMiddlebox@CoNEXT 2013: 25-30 - [c153]Peng Li, Debin Gao
, Michael K. Reiter:
Mitigating access-driven timing channels in clouds using StopWatch. DSN 2013: 1-12 - [c152]Lei Wei, Michael K. Reiter:
Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud. ESORICS 2013: 147-163 - [c151]Robert A. Cochran, Michael K. Reiter:
Toward Online Verification of Client Behavior in Distributed Applications. NDSS 2013 - [c150]Lujo Bauer
, Lorrie Faith Cranor
, Saranga Komanduri, Michelle L. Mazurek, Michael K. Reiter, Manya Sleeper, Blase Ur:
The post anachronism: the temporal dimension of facebook privacy. WPES 2013: 1-12 - 2012
- [j43]Scott E. Coull, Andrew M. White, Ting-Fang Yen, Fabian Monrose, Michael K. Reiter:
Understanding domain registration abuses. Comput. Secur. 31(7): 806-815 (2012) - [j42]Attila Altay Yavuz
, Peng Ning, Michael K. Reiter:
BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems. ACM Trans. Inf. Syst. Secur. 15(2): 9:1-9:28 (2012) - [j41]Michael Abd-El-Malek, Matthew Wachs, James Cipar, Karan Sanghi, Gregory R. Ganger, Garth A. Gibson
, Michael K. Reiter:
File system virtual appliances: Portable file system implementations. ACM Trans. Storage 8(3): 9:1-9:26 (2012) - [c149]Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Cross-VM side channels and their use to extract private keys. CCS 2012: 305-316 - [c148]Peter F. Klemperer, Yuan Liang, Michelle L. Mazurek, Manya Sleeper, Blase Ur, Lujo Bauer
, Lorrie Faith Cranor
, Nitin Gupta, Michael K. Reiter:
Tag, you can see it!: using tags for access control in photo sharing. CHI 2012: 377-386 - [c147]Lujo Bauer
, Yuan Liang, Michael K. Reiter, Chad Spensky:
Discovering access-control misconfigurations: new approaches and evaluation methodologies. CODASPY 2012: 95-104 - [c146]Victor Heorhiadi, Michael K. Reiter, Vyas Sekar:
New opportunities for load balancing in network-wide intrusion detection systems. CoNEXT 2012: 361-372 - [c145]Lei Wei, Michael K. Reiter:
Third-Party Private DFA Evaluation on Encrypted Files in the Cloud. ESORICS 2012: 523-540 - [c144]Attila Altay Yavuz
, Peng Ning, Michael K. Reiter:
Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging. Financial Cryptography 2012: 148-163 - [c143]Vyas Sekar, Norbert Egi, Sylvia Ratnasamy, Michael K. Reiter, Guangyu Shi:
Design and Implementation of a Consolidated Middlebox Architecture. NSDI 2012: 323-336 - [c142]Ting-Fang Yen, Michael K. Reiter:
Revisiting Botnet Models and Their Implications for Takedown Strategies. POST 2012: 249-268 - [c141]Kami Vaniea, Lujo Bauer
, Lorrie Faith Cranor
, Michael K. Reiter:
Out of sight, out of mind: Effects of displaying access-control information near the item it controls. PST 2012: 128-136 - 2011
- [j40]Lujo Bauer
, Scott Garriss, Michael K. Reiter:
Detecting and resolving policy misconfigurations in access-control systems. ACM Trans. Inf. Syst. Secur. 14(1): 2:1-2:28 (2011) - [j39]Yao Liu, Peng Ning, Michael K. Reiter:
False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 14(1): 13:1-13:33 (2011) - [j38]Darrell Bethea, Robert A. Cochran, Michael K. Reiter:
Server-side verification of client behavior in online games. ACM Trans. Inf. Syst. Secur. 14(4): 32:1-32:27 (2011) - [c140]Lei Wei, Scott E. Coull, Michael K. Reiter:
Bounded vector signatures and their applications. AsiaCCS 2011: 277-285 - [c139]Robert W. Reeder, Lujo Bauer
, Lorrie Faith Cranor
, Michael K. Reiter, Kami Vaniea:
More than skin deep: measuring effects of the underlying model on access-control system usability. CHI 2011: 2065-2074 - [c138]Xin Huang, Fabian Monrose, Michael K. Reiter:
Amplifying limited expert input to sanitize large network traces. DSN 2011: 494-505 - [c137]Vyas Sekar, Sylvia Ratnasamy, Michael K. Reiter, Norbert Egi, Guangyu Shi:
The middlebox manifesto: enabling innovation in middlebox deployment. HotNets 2011: 21 - [c136]Alana Libonati, Jonathan M. McCune, Michael K. Reiter:
Usability Testing a Malware-Resistant Input Mechanism. NDSS 2011 - [c135]Yinqian Zhang, Ari Juels, Alina Oprea, Michael K. Reiter:
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis. IEEE Symposium on Security and Privacy 2011: 313-328 - [i5]Lei Wei, Scott E. Coull, Michael K. Reiter:
Bounded Vector Signatures and their Applications. IACR Cryptol. ePrint Arch. 2011: 117 (2011) - 2010
- [j37]XiaoFeng Wang, Michael K. Reiter:
Using Web-Referral Architectures to Mitigate Denial-of-Service Threats. IEEE Trans. Dependable Secur. Comput. 7(2): 203-216 (2010) - [c134]Yinqian Zhang, Fabian Monrose, Michael K. Reiter:
The security of modern password expiration: an algorithmic framework and empirical analysis. CCS 2010: 176-186 - [c133]Michelle L. Mazurek, J. P. Arsenault, Joanna Bresee, Nitin Gupta, Iulia Ion, Christina Johns, Daniel Lee, Yuan Liang, Jenny Olsen, Brandon Salmon, Richard Shay, Kami Vaniea, Lujo Bauer
, Lorrie Faith Cranor
, Gregory R. Ganger, Michael K. Reiter:
Access control for home data sharing: evaluating social acceptability. CHI 2010: 645-654 - [c132]Vyas Sekar, Ravishankar Krishnaswamy, Anupam Gupta, Michael K. Reiter:
Network-wide deployment of intrusion detection and prevention systems. CoNEXT 2010: 18 - [c131]James Hendricks, Shafeeq Sinnamohideen, Gregory R. Ganger, Michael K. Reiter:
Zzyzx: Scalable fault tolerance through Byzantine locking. DSN 2010: 363-372 - [c130]Ting-Fang Yen, Michael K. Reiter:
Are Your Hosts Trading or Plotting? Telling P2P File-Sharing and Bots Apart. ICDCS 2010: 241-252 - [c129]Vyas Sekar, Michael K. Reiter, Hui Zhang:
Revisiting the case for a minimalist approach for network flow monitoring. Internet Measurement Conference 2010: 328-341 - [c128]Lei Wei, Michael K. Reiter, Ketan Mayer-Patel:
Summary-Invisible Networking: Techniques and Defenses. ISC 2010: 210-225 - [c127]Darrell Bethea, Robert A. Cochran, Michael K. Reiter:
Server-side Verification of Client Behavior in Online Games. NDSS 2010 - [c126]Peng Li, Limin Liu, Debin Gao
, Michael K. Reiter:
On Challenges in Evaluating Malware Clustering. RAID 2010: 238-255 - [c125]Michael G. Merideth, Michael K. Reiter:
Selected Results from the Latest Decade of Quorum Systems Research. Replication 2010: 185-206 - [c124]Scott E. Coull, Andrew M. White, Ting-Fang Yen, Fabian Monrose, Michael K. Reiter:
Understanding Domain Registration Abuses. SEC 2010: 68-79
2000 – 2009
- 2009
- [j36]Jonathan M. McCune, Adrian Perrig, Michael K. Reiter:
Seeing-Is-Believing: using camera phones for human-verifiable authentication. Int. J. Secur. Networks 4(1/2): 43-56 (2009) - [j35]Debin Gao
, Michael K. Reiter, Dawn Xiaodong Song:
Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance. IEEE Trans. Dependable Secur. Comput. 6(2): 96-110 (2009) - [c123]Yao Liu, Michael K. Reiter, Peng Ning:
False data injection attacks against state estimation in electric power grids. CCS 2009: 21-32 - [c122]Rui Wang, XiaoFeng Wang, Zhou Li
, Haixu Tang, Michael K. Reiter, Zheng Dong:
Privacy-preserving genomic computation through program specialization. CCS 2009: 338-347 - [c121]Lujo Bauer
, Lorrie Faith Cranor
, Robert W. Reeder, Michael K. Reiter, Kami Vaniea:
Real life challenges in access-control management. CHI 2009: 899-908 - [c120]Ting-Fang Yen, Xin Huang, Fabian Monrose, Michael K. Reiter:
Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications. DIMVA 2009: 157-175 - [c119]Darrell Bethea, Michael K. Reiter:
Data Structures with Unpredictable Timing. ESORICS 2009: 456-471 - [c118]Michael K. Reiter:
Better Architectures and New Security Applications for Network Monitoring. ICDCS 2009: 542 - [c117]Michael K. Reiter, Vyas Sekar, Chad Spensky, Zhenghao Zhang:
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles. ICISS 2009: 132-147 - [c116]Jonathan M. McCune, Adrian Perrig, Michael K. Reiter:
Safe Passage for Passwords and Other Sensitive Data. NDSS 2009 - [c115]Peng Li, Debin Gao
, Michael K. Reiter:
Automatically Adapting a Trained Anomaly Detector to Software Patches. RAID 2009: 142-160 - [c114]Lujo Bauer
, Limin Jia
, Michael K. Reiter, David Swasey:
xDomain: cross-border proofs of access. SACMAT 2009: 43-52 - [c113]Michael G. Merideth, Florian Oprea, Michael K. Reiter:
When and How to Change Quorums on Wide Area Networks. SRDS 2009: 12-21 - 2008
- [j34]XiaoFeng Wang, Michael K. Reiter:
A multi-layer framework for puzzle-based denial-of-service defense. Int. J. Inf. Sec. 7(4): 243-263 (2008) - [j33]XiaoFeng Wang, Zhuowei Li, Jong Youl Choi, Jun Xu, Michael K. Reiter, Chongkyung Kil:
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software. ACM Trans. Inf. Syst. Secur. 12(2): 11:1-11:35 (2008) - [j32]Michael K. Reiter, Asad Samar:
Quiver: Consistent and Scalable Object Sharing for Edge Services. IEEE Trans. Parallel Distributed Syst. 19(7): 878-889 (2008) - [c112]Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri:
How low can you go?: recommendations for hardware-supported minimal TCB code execution. ASPLOS 2008: 14-25 - [c111]Lucas Ballard, Seny Kamara, Fabian Monrose, Michael K. Reiter:
Towards practical biometric key generation with randomized biometric templates. CCS 2008: 235-244 - [c110]Lujo Bauer
, Lorrie Faith Cranor
, Robert W. Reeder, Michael K. Reiter, Kami Vaniea:
A user study of policy creation in a flexible access-control system. CHI 2008: 543-552 - [c109]Robert W. Reeder, Lujo Bauer
, Lorrie Faith Cranor
, Michael K. Reiter, Kelli Bacon, Keisha How, Heather Strong:
Expandable grids for visualizing and authoring computer security policies. CHI 2008: 1473-1482 - [c108]Ting-Fang Yen, Michael K. Reiter:
Traffic Aggregation for Malware Detection. DIMVA 2008: 207-227 - [c107]Zhuowei Li, XiaoFeng Wang, Zhenkai Liang
, Michael K. Reiter:
AGIS: Towards automatic generation of infection signatures. DSN 2008: 237-246 - [c106]Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Hiroshi Isozaki:
Flicker: an execution infrastructure for tcb minimization. EuroSys 2008: 315-328 - [c105]Debin Gao
, Michael K. Reiter, Dawn Xiaodong Song:
BinHunt: Automatically Finding Semantic Differences in Binary Programs. ICICS 2008: 238-255 - [c104]Michael K. Reiter, Asad Samar, Chenxi Wang:
Self-optimizing distributed trees. IPDPS 2008: 1-12 - [c103]Scott E. Coull, Charles V. Wright, Angelos D. Keromytis, Fabian Monrose, Michael K. Reiter:
Taming the Devil: Techniques for Evaluating Anonymized Network Data. NDSS 2008 - [c102]Vyas Sekar, Michael K. Reiter, Walter Willinger, Hui Zhang, Ramana Rao Kompella, David G. Andersen:
cSamp: A System for Network-Wide Flow Monitoring. NSDI 2008: 233-246 - [c101]Michael G. Merideth, Michael K. Reiter:
Write Markers for Probabilistic Quorum Systems. OPODIS 2008: 5-21 - [c100]M. Patrick Collins, Michael K. Reiter:
On the Limits of Payload-Oblivious Network Attack Detection. RAID 2008: 251-270 - [c99]Lujo Bauer, Scott Garriss, Michael K. Reiter:
Detecting and resolving policy misconfigurations in access-control systems. SACMAT 2008: 185-194 - [c98]Michael K. Reiter:
Keynote: Trustworthy Services and the Biological Analogy. SSS 2008: 2 - [c97]Lucas Ballard, Seny Kamara, Michael K. Reiter:
The Practical Subtleties of Biometric Key Generation. USENIX Security Symposium 2008: 61-74 - 2007
- [c96]Florian Oprea, Michael K. Reiter:
Minimizing Response Time for Quorum-System Protocols over Wide-Area Networks. DSN 2007: 409-418 - [c95]Michael K. Reiter:
Trustworthy Services and the Biological Analogy. ESORICS 2007: 1 - [c94]Lujo Bauer
, Scott Garriss, Michael K. Reiter:
Efficient Proving for Practical Distributed Access-Control Systems. ESORICS 2007: 19-37 - [c93]Kevin D. Bowers, Lujo Bauer, Deepak Garg, Frank Pfenning, Michael K. Reiter:
Consumable Credentials in Linear-Logic-Based Access-Control Systems. NDSS 2007 - [c92]Scott E. Coull, Charles V. Wright, Fabian Monrose, Michael P. Collins, Michael K. Reiter:
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. NDSS 2007 - [c91]James Hendricks, Gregory R. Ganger, Michael K. Reiter:
Verifying distributed erasure-coded data. PODC 2007: 139-146 - [c90]M. Patrick Collins, Michael K. Reiter:
Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs. RAID 2007: 276-295 - [c89]James Hendricks
, Gregory R. Ganger, Michael K. Reiter:
Low-overhead byzantine fault-tolerant storage. SOSP 2007: 73-86 - [c88]Lujo Bauer
, Lorrie Faith Cranor
, Michael K. Reiter, Kami Vaniea:
Lessons learned from the deployment of a smartphone-based access-control system. SOUPS 2007: 64-75 - [c87]Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri:
Minimal TCB Code Execution. S&P 2007: 267-272 - [c86]Scott E. Coull, Michael P. Collins, Charles V. Wright, Fabian Monrose, Michael K. Reiter:
On Web Browsing Privacy in Anonymized NetFlows. USENIX Security Symposium 2007 - [c85]Alina Oprea, Michael K. Reiter:
Integrity Checking in Cryptographic File Systems with Constant Trusted Storage. USENIX Security Symposium 2007 - [c84]Michael G. Merideth, Michael K. Reiter:
Probabilistic Opaque Quorum Systems. DISC 2007: 403-419 - 2006
- [c83]Yinglian Xie, Michael K. Reiter, David R. O'Hallaron:
Protecting Privacy in Key-Value Search Systems. ACSAC 2006: 493-504 - [c82]XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi:
Packet vaccine: black-box exploit detection and signature generation. CCS 2006: 37-46 - [c81]Vyas Sekar, Yinglian Xie, Michael K. Reiter, Hui Zhang:
A Multi-Resolution Approach for Worm Detection and Containment. DSN 2006: 189-198 - [c80]Michael P. Collins, Michael K. Reiter:
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors. ESORICS 2006: 1-17 - [c79]Deepak Garg, Lujo Bauer
, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter:
A Linear Logic of Authorization and Knowledge. ESORICS 2006: 297-312 - [c78]Ginger Perng, Michael K. Reiter, Chenxi Wang:
M2: Multicasting Mixes for Efficient and Anonymous Communication. ICDCS 2006: 59 - [c77]Yinglian Xie, Vyas Sekar, Michael K. Reiter, Hui Zhang:
Forensic Analysis for Epidemic Attacks in Federated Networks. ICNP 2006: 43-53 - [c76]Daniel Golovin, Anupam Gupta, Bruce M. Maggs, Florian Oprea, Michael K. Reiter:
Quorum placement in networks: minimizing network congestion. PODC 2006: 16-25 - [c75]Debin Gao
, Michael K. Reiter, Dawn Xiaodong Song:
Behavioral Distance Measurement Using Hidden Markov Models. RAID 2006: 19-40 - [c74]XiaoFeng Wang, Michael K. Reiter:
WRAPS: Denial-of-Service Defense through Web Referrals. SRDS 2006: 51-60 - [c73]Jonathan M. McCune, Adrian Perrig, Michael K. Reiter:
Bump in the Ether: A Framework for Securing Sensitive User Input. USENIX ATC, General Track 2006: 185-198 - [c72]Alina Oprea, Michael K. Reiter:
On Consistency of Encrypted Files. DISC 2006: 254-268 - [i4]Michael Abd-El-Malek, Gregory R. Ganger, Garth R. Goodson, Michael K. Reiter, Jay J. Wylie:
Towards bounded wait-free PASIS. From Security to Dependability 2006 - 2005
- [c71]Michael K. Reiter, XiaoFeng Wang, Matthew K. Wright:
Building Reliable Mix Networks with Fair Exchange. ACNS 2005: 378-392 - [c70]Ginger Perng, Michael K. Reiter, Chenxi Wang:
Censorship Resistance Revisited. Information Hiding 2005: 62-76 - [c69]Lujo Bauer
, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, Peter Rutenbar:
Device-Enabled Authorization in the Grey-System. ISC 2005: 431-445 - [c68]Alina Oprea, Michael K. Reiter:
Space-Efficient Block Storage Integrity. NDSS 2005 - [c67]Anupam Gupta, Bruce M. Maggs, Florian Oprea, Michael K. Reiter:
Quorum placement in networks to minimize access delays. PODC 2005: 87-96 - [c66]Debin Gao
, Michael K. Reiter, Dawn Xiaodong Song:
Behavioral Distance for Intrusion Detection. RAID 2005: 63-81 - [c65]Michael Abd-El-Malek, Gregory R. Ganger, Garth R. Goodson, Michael K. Reiter, Jay J. Wylie:
Fault-scalable Byzantine fault-tolerant services. SOSP 2005: 59-74 - [c64]Jonathan M. McCune, Elaine Shi, Adrian Perrig, Michael K. Reiter:
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. S&P 2005: 64-78 - [c63]Lujo Bauer
, Scott Garriss, Michael K. Reiter:
Distributed Proving in Access-Control Systems. S&P 2005: 81-95 - [c62]Jonathan M. McCune, Adrian Perrig, Michael K. Reiter:
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication. S&P 2005: 110-124 - [c61]Yinglian Xie, Vyas Sekar, David A. Maltz, Michael K. Reiter, Hui Zhang:
Worm Origin Identification Using Random Moonwalks. S&P 2005: 242-256 - [c60]Michael K. Reiter, Asad Samar, Chenxi Wang:
Distributed Construction of a Fault-Tolerant Network from a Tree. SRDS 2005: 155-165 - [c59]Michael Abd-El-Malek, Gregory R. Ganger, Michael K. Reiter, Jay J. Wylie, Garth R. Goodson:
Lazy Verification in Fault-Tolerant Distributed Storage Systems. SRDS 2005: 179-190 - [e3]John Riedl, Michael J. Kearns, Michael K. Reiter:
Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), Vancouver, BC, Canada, June 5-8, 2005. ACM 2005, ISBN 1-59593-049-3 [contents] - 2004
- [j31]Philip D. MacKenzie, Michael K. Reiter:
Two-party generation of DSA signatures. Int. J. Inf. Sec. 2(3-4): 218-239 (2004) - [j30]Michael K. Reiter, Pankaj Rohatgi:
Homeland Security. IEEE Internet Comput. 8(6): 16-17 (2004) - [c58]Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Xiaodong Song, Ke Yang:
Private Keyword-Based Push and Pull with Applications to Anonymous Communication. ACNS 2004: 16-30 - [c57]Michael K. Reiter, XiaoFeng Wang:
Fragile mixing. CCS 2004: 227-235 - [c56]XiaoFeng Wang, Michael K. Reiter:
Mitigating bandwidth-exhaustion attacks using congestion puzzles. CCS 2004: 257-267 - [c55]Debin Gao
, Michael K. Reiter, Dawn Xiaodong Song:
Gray-box extraction of execution graphs for anomaly detection. CCS 2004: 318-329 - [c54]Garth R. Goodson, Jay J. Wylie, Gregory R. Ganger, Michael K. Reiter:
Efficient Byzantine-Tolerant Erasure-Coded Storage. DSN 2004: 135-144 - [c53]Brian Neil Levine, Michael K. Reiter, Chenxi Wang, Matthew K. Wright:
Timing Attacks in Low-Latency Mix Systems (Extended Abstract). Financial Cryptography 2004: 251-265 - [c52]Darren Davis, Fabian Monrose, Michael K. Reiter:
Time-Scoped Searching of Encrypted Audit Logs. ICICS 2004: 532-545 - [c51]Michael K. Reiter:
Security by, and for, Converged Mobile Devices. ICISC 2004: 1 - [c50]Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, Michael K. Reiter, Hui Zhang:
Seurat: A Pointillist Approach to Anomaly Detection. RAID 2004: 238-257 - [c49]Michael P. Collins, Michael K. Reiter:
An Empirical Analysis of Target-Resident DoS Filters. S&P 2004: 103-114 - [c48]Charles P. Fry, Michael K. Reiter:
Nested Objects in a Byzantine Quorum-Replicated System. SRDS 2004: 79-89 - [c47]Philip D. MacKenzie, Michael K. Reiter, Ke Yang:
Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract). TCC 2004: 171-190 - [c46]Debin Gao, Michael K. Reiter, Dawn Xiaodong Song:
On Gray-Box Program Tracking for Anomaly Detection. USENIX Security Symposium 2004: 103-118 - [c45]Darren Davis, Fabian Monrose, Michael K. Reiter:
On User Choice in Graphical Password Schemes. USENIX Security Symposium 2004: 151-164 - 2003
- [j29]Dahlia Malkhi, Michael Merritt, Michael K. Reiter, Gadi Taubenfeld:
Objects shared by Byzantine processes. Distributed Comput. 16(1): 37-48 (2003) - [j28]Philip D. MacKenzie, Michael K. Reiter:
Delegation of cryptographic servers for capture-resilient devices. Distributed Comput. 16(4): 307-327 (2003) - [j27]Philip D. MacKenzie, Michael K. Reiter:
Networked cryptographic devices resilient to capture. Int. J. Inf. Sec. 2(1): 1-20 (2003) - [j26]Dahlia Malkhi, Yishay Mansour, Michael K. Reiter:
Diffusion without false rumors: on propagating updates in a Byzantine environment. Theor. Comput. Sci. 299(1-3): 289-306 (2003) - [c44]Philip D. MacKenzie, Alina Oprea, Michael K. Reiter:
Automatic generation of two-party computations. CCS 2003: 210-219 - [c43]XiaoFeng Wang, Michael K. Reiter:
Defending Against Denial-of-Service Attacks with Puzzle Auction. S&P 2003: 78-92 - [c42]Michael K. Reiter, Asad Samar, Chenxi Wang:
The Design and Implementation of a JCA-Compliant Capture Protection Infrastructure. SRDS 2003: 339-348 - 2002
- [j25]Pascal Felber
, Michael K. Reiter:
Advanced concurrency control in Java. Concurr. Comput. Pract. Exp. 14(4): 261-285 (2002) - [j24]Fabian Monrose, Michael K. Reiter, Susanne Wetzel:
Password hardening based on keystroke dynamics. Int. J. Inf. Sec. 1(2): 69-83 (2002) - [c41]Yinglian Xie, David R. O'Hallaron, Michael K. Reiter:
A Secure Distributed Search System. HPDC 2002: 321- - [c40]Fabian Monrose, Michael K. Reiter, Qi Li, Daniel P. Lopresti, Chilin Shih:
Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices. USENIX Security Symposium 2002: 283-296 - 2001
- [j23]Dahlia Malkhi, Michael K. Reiter, Avishai Wool
, Rebecca N. Wright:
Probabilistic Quorum Systems. Inf. Comput. 170(2): 184-206 (2001) - [j22]Pierangela Samarati
, Michael K. Reiter, Sushil Jajodia:
An authorization model for a public key management service. ACM Trans. Inf. Syst. Secur. 4(4): 453-482 (2001) - [j21]Roberto De Prisco
, Dahlia Malkhi, Michael K. Reiter:
On k-Set Consensus Problems in Asynchronous Systems. IEEE Trans. Parallel Distributed Syst. 12(1): 7-21 (2001) - [j20]Lorenzo Alvisi, Dahlia Malkhi, Evelyn Tumlin Pierce, Michael K. Reiter:
Fault Detection for Byzantine Quorum Systems. IEEE Trans. Parallel Distributed Syst. 12(9): 996-1007 (2001) - [c39]Markus Jakobsson, Michael K. Reiter:
Discouraging Software Piracy Using Software Aging. Digital Rights Management Workshop 2001: 1-12 - [c38]Philip D. MacKenzie, Michael K. Reiter:
Delegation of cryptographic servers for capture-resilient devices. CCS 2001: 10-19 - [c37]Philip D. MacKenzie, Michael K. Reiter:
Two-Party Generation of DSA Signatures. CRYPTO 2001: 137-154 - [c36]Gregory V. Chockler, Dahlia Malkhi, Michael K. Reiter:
Backoff Protocols for Distributed Mutual Exclusion and Ordering. ICDCS 2001: 11-20 - [c35]Fabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel:
Using voice to generate cryptographic keys. Odyssey 2001: 237-242 - [c34]Ran Canetti, Yuval Ishai, Ravi Kumar, Michael K. Reiter, Ronitt Rubinfeld, Rebecca N. Wright:
Selective private function evaluation with applications to private statistics. PODC 2001: 293-304 - [c33]Philip D. MacKenzie, Michael K. Reiter:
Networked Cryptographic Devices Resilient to Capture. S&P 2001: 12-25 - [c32]Fabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel:
Cryptographic Key Generation from Voice. S&P 2001: 202-213 - [c31]Dahlia Malkhi, Ohad Rodeh, Michael K. Reiter, Yaron Sella:
Efficient Update Diffusion in Byzantine Environments. SRDS 2001: 90-98 - [e2]Michael K. Reiter, Pierangela Samarati:
CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001. ACM 2001, ISBN 1-58113-385-5 [contents] - 2000
- [j19]Dahlia Malkhi, Michael K. Reiter, Avishai Wool
:
The Load and Availability of Byzantine Quorum Systems. SIAM J. Comput. 29(6): 1889-1906 (2000) - [j18]Dahlia Malkhi, Michael K. Reiter:
An Architecture for Survivable Coordination in Large Distributed Systems. IEEE Trans. Knowl. Data Eng. 12(2): 187-202 (2000) - [j17]Dahlia Malkhi, Michael K. Reiter:
Secure Execution of Java Applets Using a Remote Playground. IEEE Trans. Software Eng. 26(12): 1197-1209 (2000) - [c30]Carlisle M. Adams, Mike Burmester, Yvo Desmedt, Michael K. Reiter, Philip R. Zimmermann:
Which PKI (public key infrastructure) is the right one? (panel session). CCS 2000: 98-101 - [c29]Lorenzo Alvisi, Evelyn Tumlin Pierce, Dahlia Malkhi, Michael K. Reiter, Rebecca N. Wright:
Dynamic Byzantine Quorum Systems. DSN 2000: 283-292 - [c28]Robert M. Arlein, Ben Jai, Markus Jakobsson, Fabian Monrose, Michael K. Reiter:
Privacy-preserving global customization. EC 2000: 176-184 - [c27]Dahlia Malkhi, Michael Merritt, Michael K. Reiter, Gadi Taubenfeld:
Objects Shared by Byzantine Processes. DISC 2000: 345-359
1990 – 1999
- 1999
- [j16]Michael K. Reiter, Aviel D. Rubin:
Anonymous Web Transactions with Crowds. Commun. ACM 42(2): 32-38 (1999) - [j15]Vinod Anupam, Alain J. Mayer, Kobbi Nissim, Benny Pinkas, Michael K. Reiter:
On the Security of Pay-per-Click and Other Web Advertising Schemes. Comput. Networks 31(11-16): 1091-1100 (1999) - [j14]Michael K. Reiter:
High-Confidence Distributed Systems - Guest Editor's Introduction. IEEE Internet Comput. 3(6): 52-54 (1999) - [j13]Michael K. Reiter, Stuart G. Stubblebine:
Authentication Metric Analysis and Design. ACM Trans. Inf. Syst. Secur. 2(2): 138-158 (1999) - [c26]Fabian Monrose, Michael K. Reiter, Susanne Wetzel:
Password Hardening Based on Keystroke Dynamics. CCS 1999: 73-82 - [c25]Roberto De Prisco, Dahlia Malkhi, Michael K. Reiter:
On k-Set Consensus Problems in Asynchronous Systems. PODC 1999: 257-265 - [c24]Dahlia Malkhi, Yishay Mansour, Michael K. Reiter:
On Diffusing Updates in a Byzantine Environment. SRDS 1999: 134-143 - [c23]Ian Jermyn, Alain J. Mayer, Fabian Monrose, Michael K. Reiter, Aviel D. Rubin:
The Design and Analysis of Graphical Passwords. USENIX Security Symposium 1999 - [i3]Dahlia Malkhi, Michael K. Reiter:
Secure Execution of Java Applets using a Remote Playground. CoRR cs.CR/9908009 (1999) - [i2]Dahlia Malkhi, Yishay Mansour, Michael K. Reiter:
On Propagating Updates in a Byzantine Environment. CoRR cs.DC/9908010 (1999) - [i1]Dahlia Malkhi, Michael K. Reiter, Avishai Wool:
The Load and Availability of Byzantine Quorum Systems. CoRR cs.DC/9908011 (1999) - 1998
- [j12]Dahlia Malkhi, Michael K. Reiter:
Byzantine Quorum Systems. Distributed Comput. 11(4): 203-213 (1998) - [j11]Michael K. Reiter, Stuart G. Stubblebine:
Resilient Authentication Using Path Independence. IEEE Trans. Computers 47(12): 1351-1362 (1998) - [j10]Michael K. Reiter, Aviel D. Rubin:
Crowds: Anonymity for Web Transactions. ACM Trans. Inf. Syst. Secur. 1(1): 66-92 (1998) - [c22]Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright:
Probabilistic Byzantine Quorum Systems. PODC 1998: 321 - [c21]Dahlia Malkhi, Michael K. Reiter, Aviel D. Rubin:
Secure Execution of Java Applets using a Remote Playground. S&P 1998: 40-51 - [c20]Dahlia Malkhi, Michael K. Reiter:
Secure and Scalable Replication in Phalanx. SRDS 1998: 51-58 - [c19]Dahlia Malkhi, Michael K. Reiter:
Survivable Consensus Objects. SRDS 1998: 271-279 - [c18]Michael K. Reiter, Vinod Anupam, Alain J. Mayer:
Detecting Hit Shaving in Click-Through Payment Schemes. USENIX Workshop on Electronic Commerce 1998 - [e1]Li Gong, Michael K. Reiter:
CCS '98, Proceedings of the 5th ACM Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998. ACM 1998, ISBN 1-58113-007-4 [contents] - 1997
- [j9]Dahlia Malkhi, Michael K. Reiter:
A High-Throughput Secure Reliable Multicast Protocol. J. Comput. Secur. 5(2): 113-128 (1997) - [c17]Matthew K. Franklin, Michael K. Reiter:
Fair Exchange with a Semi-Trusted Third Party (extended abstract). CCS 1997: 1-6 - [c16]Michael K. Reiter, Stuart G. Stubblebine:
Path Independence for Authentication in Large-Scale Systems. CCS 1997: 57-66 - [c15]Dahlia Malkhi, Michael K. Reiter:
Unreliable Intrusion Detection in Distributed Computations. CSFW 1997: 116-125 - [c14]Dahlia Malkhi, Michael K. Reiter, Avishai Wool
:
The Load and Availability of Byzantine Quorum Systems. PODC 1997: 249-257 - [c13]Dahlia Malkhi, Michael K. Reiter, Rebecca N. Wright:
Probabilistic Quorum Systems. PODC 1997: 267-273 - [c12]Michael K. Reiter, Stuart G. Stubblebine:
Toward Acceptable Metrics of Authentication. S&P 1997: 10-20 - [c11]Dahlia Malkhi, Michael K. Reiter:
Byzantine Quorum Systems. STOC 1997: 569-578 - 1996
- [j8]Michael K. Reiter:
Distributed Trust with the Rampart Toolkit. Commun. ACM 39(4): 71-74 (1996) - [j7]Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright:
The Omega Key Management Service. J. Comput. Secur. 4(4): 267-288 (1996) - [j6]Michael K. Reiter:
A Secure Group Membership Protocol. IEEE Trans. Software Eng. 22(1): 31-42 (1996) - [j5]Matthew K. Franklin, Michael K. Reiter:
The Design and Implementation of a Secure Auction Service. IEEE Trans. Software Eng. 22(5): 302-312 (1996) - [c10]Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright:
The Omega Key Management Service. CCS 1996: 38-47 - [c9]Dalia Malki, Michael K. Reiter:
A High-Throughput Secure Reliable Multicast Protocol. CSFW 1996: 9-17 - [c8]Don Coppersmith, Matthew K. Franklin, Jacques Patarin, Michael K. Reiter:
Low-Exponent RSA with Related Messages. EUROCRYPT 1996: 1-9 - 1995
- [j4]Michael K. Reiter, Li Gong:
Securing Causal Relationships in Distributed Systems. Comput. J. 38(8): 633-642 (1995) - [c7]Matthew K. Franklin, Michael K. Reiter:
Verifiable Signature Sharing. EUROCRYPT 1995: 50-63 - [c6]Matthew K. Franklin, Michael K. Reiter:
The design and implementation of a secure auction service. S&P 1995: 2-14 - 1994
- [j3]Michael K. Reiter, Kenneth P. Birman
, Robbert van Renesse:
A Security Architecture for Fault-Toerant Systems. ACM Trans. Comput. Syst. 12(4): 340-371 (1994) - [j2]Michael K. Reiter, Kenneth P. Birman
:
How to Securely Replicate Services. ACM Trans. Program. Lang. Syst. 16(3): 986-1009 (1994) - [c5]Michael K. Reiter:
Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart. CCS 1994: 68-80 - [c4]Michael K. Reiter:
The Rampart Toolkit for Building High-Integrity Services. Dagstuhl Seminar on Distributed Systems 1994: 99-110 - [c3]Michael K. Reiter:
A secure group membership protocol. S&P 1994: 176-189 - 1993
- [b1]Michael K. Reiter:
A Security Architecture for Fault-Tolerant Systems. Cornell University, USA, 1993 - [c2]Michael K. Reiter, Li Gong:
Preventing denial and forgery of causal relationships in distributed systems. S&P 1993: 30-40 - 1992
- [j1]Michael K. Reiter:
Integrating Security in a Group Oriented Distributed System (Abstract). ACM SIGOPS Oper. Syst. Rev. 26(2): 27 (1992) - [c1]Michael K. Reiter, Kenneth P. Birman, Li Gong:
Integrating security in a group oriented distributed system. S&P 1992: 18-32
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint