Michael Reiter
James B. Duke Distinguished Professor
Michael Reiter is a James B. Duke Distinguished Professor of Computer Science and Electrical & Computer Engineering at Duke University. His previous positions include Director of Secure Systems Research at Bell Labs; Professor of Electrical & Computer Engineering and Computer Science at Carnegie Mellon University, where he was the founding Technical Director of CyLab; and Distinguished Professor of Computer Science at the University of North Carolina at Chapel Hill.
Current Research Interests
Prof. Reiter's research interests include all areas of computer and communications security, fault-tolerant distributed computing, and applied cryptography.
Current Appointments & Affiliations
- James B. Duke Distinguished Professor, Computer Science, Trinity College of Arts & Sciences 2021
- Professor of Computer Science, Computer Science, Trinity College of Arts & Sciences 2021
- Professor of Electrical and Computer Engineering, Electrical and Computer Engineering, Pratt School of Engineering 2021
Contact Information
- 308 Research Drive D310, Box 90129, Durham, NC 27708
- 308 Research Drive D310, Box 90129, Durham, NC 27708
-
michael.reiter@duke.edu
(919) 660-6524
-
https://reitermk.github.io/
- Background
-
Education, Training, & Certifications
- Ph.D., Cornell University 1993
-
Previous Appointments & Affiliations
- Visiting Professor of Computer Science, Computer Science, Trinity College of Arts & Sciences 2020
- Recognition
-
In the News
-
FEB 9, 2022 Duke Research Blog -
JUN 28, 2021
-
-
Awards & Honors
- Expertise
-
Subject Headings
- Research
-
External Relationships
- Chainlink Labs
- Publications & Artistic Works
-
Selected Publications
-
Academic Articles
-
Landwehr, C., M. K. Reiter, L. Williams, G. Tsudik, T. Jaeger, T. Kohno, and A. Kapadia. “Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription.” Ieee Security and Privacy 21, no. 2 (March 1, 2023): 32–42. https://doi.org/10.1109/MSEC.2022.3208721.Full Text
-
Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.Full Text
-
Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.Link to Item
-
Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.Link to Item
-
Zhou, Z., and M. K. Reiter. “Interpretable noninterference measurement and its application to processor designs.” Proceedings of the Acm on Programming Languages 5, no. OOPSLA (October 1, 2021). https://doi.org/10.1145/3485518.Full Text
-
Mi, Z., H. Chen, Y. Zhang, S. Peng, X. Wang, and M. Reiter. “CPU Elasticity to Mitigate Cross-VM Runtime Monitoring.” Ieee Transactions on Dependable and Secure Computing 17, no. 5 (September 1, 2020): 1094–1108. https://doi.org/10.1109/TDSC.2018.2846742.Full Text
-
Sharif, M., S. Bhagavatula, L. Bauer, and M. K. Reiter. “A general framework for adversarial examples with objectives.” Acm Transactions on Privacy and Security 22, no. 3 (June 10, 2019). https://doi.org/10.1145/3317611.Full Text Open Access Copy
-
Aikat, J., A. Akella, J. S. Chase, A. Juels, M. K. Reiter, T. Ristenpart, V. Sekar, and M. Swift. “Rethinking Security in the Era of Cloud Computing.” Ieee Security and Privacy 15, no. 3 (May 1, 2017): 60–69. https://doi.org/10.1109/MSP.2017.265092803.Full Text
-
Aikat, J., A. Akella, J. S. Chase, A. Juels, M. K. Reiter, T. Ristenpart, V. Sekar, and M. Swift. “Rethinking Security in the Era of Cloud Computing.” Ieee Security and Privacy 15, no. 3 (January 1, 2017): 60–69. https://doi.org/10.1109/MSP.2017.80.Full Text
-
Wei, L., and M. K. Reiter. “Toward practical encrypted email that supports private, regular-expression searches.” International Journal of Information Security 14, no. 5 (October 1, 2015): 397–416. https://doi.org/10.1007/s10207-014-0268-3.Full Text
-
Li, P., D. Gao, and M. K. Reiter. “Stop watch: A cloud architecture for timing channel mitigation.” Acm Transactions on Information and System Security 17, no. 2 (November 1, 2014). https://doi.org/10.1145/2670940.Full Text
-
Abd-El-malek, M., M. Wachs, J. Cipar, K. Sanghi, G. R. Ganger, G. A. Gibson, and M. K. Reiter. “File system virtual appliances: Portable file system implementations.” Acm Transactions on Storage 8, no. 3 (September 1, 2012). https://doi.org/10.1145/2339118.2339120.Full Text
-
Yavuz, A. A., P. Ning, and M. K. Reiter. “BAF and FI-BAF: Efficient and publicly verifiable cryptographic schemes for secure logging in resource-constrained systems.” Acm Transactions on Information and System Security 15, no. 2 (July 1, 2012). https://doi.org/10.1145/2240276.2240280.Full Text
-
Bethea, D., R. A. Cochran, and M. K. Reiter. “Server-Side Verification Of Client Behavior In Online Games.” Acm Transactions on Information and System Security 14, no. 4 (January 1, 2011): 1–27. https://doi.org/10.1145/2043628.2043633.Full Text
-
Wang, X., and M. K. Reiter. “Using web-referral architectures to mitigate denial-of-service threats.” Ieee Transactions on Dependable and Secure Computing 7, no. 2 (April 30, 2010): 203–16. https://doi.org/10.1109/TDSC.2008.56.Full Text
-
Gao, D., M. K. Reiter, and D. Song. “Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance.” Ieee Transactions on Dependable and Secure Computing 6, no. 2 (January 1, 2009): 96–110. https://doi.org/10.1109/TDSC.2008.39.Full Text
-
McCune, J. M., A. Perrig, and M. K. Reiter. “Seeing-Is-Believing: Using camera phones for human-verifiable authentication.” International Journal of Security and Networks 4, no. 1–2 (January 1, 2009): 43–56. https://doi.org/10.1504/IJSN.2009.023425.Full Text
-
Reiter, M. K., and A. Samar. “Quiver: Consistent object sharing for edge services.” Ieee Transactions on Parallel and Distributed Systems 19, no. 7 (December 1, 2008): 878–89. https://doi.org/10.1109/TPDS.2007.70790.Full Text
-
Wang, X., Z. Li, J. Y. Choi, J. Xu, M. K. Reiter, and C. Kil. “Fast and black-box exploit detection and signature generation for commodity software.” Acm Transactions on Information and System Security 12, no. 2 (December 1, 2008). https://doi.org/10.1145/1455518.1455523.Full Text
-
Wang, X. F., and M. K. Reiter. “A multi-layer framework for puzzle-based denial-of-service defense.” International Journal of Information Security 7, no. 4 (August 1, 2008): 243–63. https://doi.org/10.1007/s10207-007-0042-x.Full Text
-
Peterson, L., T. Anderson, D. Blumenthal, D. Casey, D. Clark, D. Estrin, J. Evans, et al. “GENI design principles.” Computer 39, no. 9 (September 1, 2006): 102–5. https://doi.org/10.1109/MC.2006.307.Full Text
-
Abd-El-Malek, M., G. R. Ganger, G. R. Goodson, M. K. Reiter, and J. J. Wylie. “Fault-scalable Byzantine fault-tolerant services.” Operating Systems Review (Acm) 39, no. 5 (December 1, 2005): 59–74. https://doi.org/10.1145/1095809.1095817.Full Text
-
Reiter, M., and P. Rohatgi. “Homeland security.” Ieee Internet Computing 8, no. 6 (November 1, 2004): 16–17. https://doi.org/10.1109/MIC.2004.62.Full Text
-
Davis, D., F. Monrose, and M. K. Reiter. “Time-scoped searching of encrypted audit logs.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 3269 (January 1, 2004): 532–45. https://doi.org/10.1007/978-3-540-30191-2_41.Full Text
-
Kissner, L., A. Oprea, M. K. Reiter, D. Song, and K. Yang. “Private keyword-based push and pull with applications to anonymous communication extended abstract.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 3089 (January 1, 2004): 16–30. https://doi.org/10.1007/978-3-540-24852-1_2.Full Text
-
Levine, B. N., M. K. Reiter, C. Wang, and M. Wright. “Timing attacks in low-latency mix systems (Extended Abstract).” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 3110 (January 1, 2004): 251–65. https://doi.org/10.1007/978-3-540-27809-2_25.Full Text
-
MacKenzie, P., M. K. Reiter, and K. Yang. “Alternatives to non-malleability: Definitions, constructions, and applications (extended abstract).” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2951 (January 1, 2004): 171–90. https://doi.org/10.1007/978-3-540-24638-1_10.Full Text
-
Xie, Y., H. A. Kim, D. R. O’Hallaron, M. K. Reiter, and H. Zhang. “Seurat: A pointillist approach to anomaly detection.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 3224 (January 1, 2004): 238–57. https://doi.org/10.1007/978-3-540-30143-1_13.Full Text
-
MacKenzie, P., and M. K. Reiter. “Delegation of cryptographic servers for capture-resilient devices.” Distributed Computing 16, no. 4 (December 1, 2003): 307–27. https://doi.org/10.1007/s00446-003-0098-4.Full Text
-
Malkhi, D., Y. Mansour, and M. K. Reiter. “Diffusion without false rumors: On propagating updates in a Byzantine environment.” Theoretical Computer Science 299, no. 1–3 (April 18, 2003): 289–306. https://doi.org/10.1016/S0304-3975(02)00325-0.Full Text
-
Malkhi, D., M. Merritt, M. K. Reiter, and G. Taubenfeld. “Objects shared by Byzantine processes.” Distributed Computing 16, no. 1 (February 1, 2003): 37–48. https://doi.org/10.1007/s00446-002-0075-3.Full Text
-
Felber, P., and M. K. Reiter. “Advanced concurrency control in Java.” Concurrency and Computation: Practice and Experience 14, no. 4 (April 10, 2002): 261–85. https://doi.org/10.1002/cpe.635.Full Text
-
Malkhi, D., M. K. Reiter, A. Wool, and R. N. Wright. “Probabilistic quorum systems.” Information and Computation 170, no. 2 (November 1, 2001): 184–206. https://doi.org/10.1006/inco.2001.3054.Full Text
-
Alvisi, L., D. Malkhi, E. Pierce, and M. K. Reiter. “Fault detection for Byzantine quorum systems.” Ieee Transactions on Parallel and Distributed Systems 12, no. 9 (September 1, 2001): 996–1007. https://doi.org/10.1109/71.954640.Full Text
-
De Prisco, R., D. Malkhi, and M. Reiter. “On k-set consensus problems in asynchronous systems.” Ieee Transactions on Parallel and Distributed Systems 12, no. 1 (January 1, 2001): 7–21. https://doi.org/10.1109/71.899936.Full Text
-
Malkhi, D., and M. K. Reiter. “An architecture for survivable coordination in large distributed systems.” Ieee Transactions on Knowledge and Data Engineering 12, no. 2 (December 1, 2000): 187–202. https://doi.org/10.1109/69.842262.Full Text
-
Malkhi, D., M. K. Reiter, and A. Wool. “Load and availability of Byzantine quorum systems.” Siam Journal on Computing 29, no. 6 (April 1, 2000): 1889–1906. https://doi.org/10.1137/S0097539797325235.Full Text
-
Anupam, V., A. Mayer, K. Nissim, B. Pinkas, and M. K. Reiter. “On the security of pay-per-click and other Web advertising schemes.” Computer Networks 31, no. 11 (May 17, 1999): 1091–1100. https://doi.org/10.1016/S1389-1286(99)00023-7.Full Text
-
De Prisco, R., D. Malkhi, and M. K. Reiter. “On k-set consensus problems in asynchronous systems.” Proceedings of the Annual Acm Symposium on Principles of Distributed Computing, January 1, 1999, 257–65. https://doi.org/10.1145/301308.301368.Full Text
-
Reiter, M. K., and A. D. Rubin. “Anonymous web transactions with crowds.” Communications of the Acm 42, no. 2 (January 1, 1999): 32–38. https://doi.org/10.1145/293411.293778.Full Text
-
Reiter, M. K., and S. G. Stubblebine. “Resilient authentication using path independence.” Ieee Transactions on Computers 47, no. 12 (December 1, 1998): 1351–62. https://doi.org/10.1109/12.737682.Full Text
-
Malkhi, D., and M. Reiter. “Byzantine quorum systems.” Distributed Computing 11, no. 4 (January 1, 1998): 203–13. https://doi.org/10.1007/s004460050050.Full Text
-
Malkhi, D., and M. Reiter. “High-throughput secure reliable multicast protocol.” Journal of Computer Security 5, no. 2 (January 1, 1997): 113–27. https://doi.org/10.3233/JCS-1997-5203.Full Text
-
Franklin, M. K., and M. K. Reiter. “The design and implementation of a secure auction service.” Ieee Transactions on Software Engineering 22, no. 5 (December 1, 1996): 302–12. https://doi.org/10.1109/32.502223.Full Text
-
Reiter, M. K. “A secure group membership protocol.” Ieee Transactions on Software Engineering 22, no. 1 (December 1, 1996): 31–42. https://doi.org/10.1109/32.481515.Full Text
-
Reiter, M. K. “Distributing Trust with the Rampart Toolkit.” Communications of the Acm 39, no. 4 (January 1, 1996): 71–74. https://doi.org/10.1145/227210.227228.Full Text
-
Reiter, M. K., M. K. Franklin, J. B. Lacy, and R. N. Wright. “Ω key management service.” Journal of Computer Security 4, no. 4 (January 1, 1996): 267–87. https://doi.org/10.3233/JCS-1996-4402.Full Text
-
Blaze, M., J. Lacy, T. London, and M. Reiter. “Issues and Mechanisms for Trustworthy Systems: Creating Transparent Mistrust.” At&Amp;T Technical Journal 73, no. 5 (January 1, 1994): 30–39. https://doi.org/10.1002/j.1538-7305.1994.tb00608.x.Full Text
-
-
Book Sections
-
Lucas, K., M. Sharif, L. Bauer, M. K. Reiter, and S. Shintre. “Deceiving ML-Based Friend-or-Foe Identification for Executables.” In Advances in Information Security, 89:217–49, 2023. https://doi.org/10.1007/978-3-031-16613-6_10.Full Text
-
Wang, K. C., and M. K. Reiter. “Using Amnesia to Detect Credential Database Breaches.” In Advances in Information Security, 89:183–215, 2023. https://doi.org/10.1007/978-3-031-16613-6_9.Full Text
-
-
Other Articles
-
Severini, J., R. N. Mysore, V. Sekar, S. Banerjee, and M. K. Reiter. “The Netivus Manifesto: Making Collaborative Network Management Easier for the Rest of Us.” Computer Communication Review, April 1, 2021. https://doi.org/10.1145/3464994.3464997.Full Text
-
-
Reports
-
Reed, Andrew C., and Michael K. Reiter. “Optimally Hiding Object Sizes with Constrained Padding,” August 3, 2021.Link to Item
-
Lucas, Keane, Mahmood Sharif, Lujo Bauer, Michael K. Reiter, and Saurabh Shintre. “Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes,” December 19, 2019.Link to Item
-
Sharif, Mahmood, Lujo Bauer, and Michael K. Reiter. “$n$-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers,” December 19, 2019.Link to Item
-
Chi, Andrew, Robert Cochran, Marie Nesfield, Michael K. Reiter, and Cynthia Sturton. “Server-side verification of client behavior in cryptographic protocols,” March 13, 2016.Link to Item
-
Heorhiadi, Victor, Michael K. Reiter, and Vyas Sekar. “Accelerating the Development of Software-Defined Network Optimization Applications Using SOL,” April 28, 2015.Link to Item
-
Malkhi, Dahlia, Yishay Mansour, and Michael Reiter. “On Propagating Updates in a Byzantine Environment,” August 12, 1999.Link to Item
-
-
Conference Papers
-
Reiter, Michael K. “Tackling Credential Abuse Together.” In Proceedings of the Thirteenth Acm Conference on Data and Application Security and Privacy. ACM, 2023. https://doi.org/10.1145/3577923.3587262.Full Text
-
Yandamuri, S., I. Abraham, K. Nayak, and M. K. Reiter. “Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption.” In Leibniz International Proceedings in Informatics, Lipics, Vol. 253, 2023. https://doi.org/10.4230/LIPIcs.OPODIS.2022.24.Full Text
-
Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.Full Text
-
Wang, K., L. Xu, A. Perrault, M. K. Reiter, and M. Tambe. “Coordinating Followers to Reach Better Equilibria: End-to-End Gradient Descent for Stackelberg Games.” In Proceedings of the 36th Aaai Conference on Artificial Intelligence, Aaai 2022, 36:5219–27, 2022.
-
Bender, C. M., P. R. Emmanuel, M. K. Reiter, and J. B. Oliva. “PRACTICAL INTEGRATION VIA SEPARABLE BIJECTIVE NETWORKS.” In Iclr 2022 10th International Conference on Learning Representations, 2022.
-
Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks.” In International Conference on Machine Learning, Vol 162, 2022.Link to Item
-
Yandamuri, S., I. Abraham, K. Nayak, and M. Reiter. “Brief announcement: Communication-efficient BFT using small trusted hardware to tolerate minority corruption.” In Leibniz International Proceedings in Informatics, Lipics, Vol. 209, 2021. https://doi.org/10.4230/LIPIcs.DISC.2021.62.Full Text
-
Lucas, K., M. Sharif, L. Bauer, M. K. Reiter, and S. Shintre. “Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes.” In Asia Ccs 2021 Proceedings of the 2021 Acm Asia Conference on Computer and Communications Security, 744–58, 2021. https://doi.org/10.1145/3433210.3453086.Full Text
-
Anjum, I., M. Zhu, I. Polinsky, W. Enck, M. K. Reiter, and M. P. Singh. “Role-Based Deception in Enterprise Networks.” In Codaspy 2021 Proceedings of the 11th Acm Conference on Data and Application Security and Privacy, 65–76, 2021. https://doi.org/10.1145/3422337.3447824.Full Text
-
Guo, C., B. Campbell, A. Kapadia, M. K. Reiter, and K. Caine. “Effect of mood, location, trust, and presence of others on video-based social authentication.” In Proceedings of the 30th Usenix Security Symposium, 1–18, 2021.
-
Humphries, Adam, Kartik Cating-Subramanian, and Michael K. Reiter. “TASE: Reducing Latency of Symbolic Execution with Transactional Memory.” In Proceedings 2021 Network and Distributed System Security Symposium. Internet Society, 2021. https://doi.org/10.14722/ndss.2021.24327.Full Text
-
Wang, K. C., and M. K. Reiter. “Using amnesia to detect credential database breaches.” In Proceedings of the 30th Usenix Security Symposium, 839–55, 2021.
-
Xiao, Q., B. Subialdea, L. Bauer, and M. K. Reiter. “Metering graphical data leakage with snowman.” In Proceedings of Acm Symposium on Access Control Models and Technologies, Sacmat, 1–12, 2020. https://doi.org/10.1145/3381991.3395598.Full Text
-
Polinsky, I., K. Martin, W. Enck, and M. K. Reiter. “N-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications.” In Codaspy 2020 Proceedings of the 10th Acm Conference on Data and Application Security and Privacy, 235–46, 2020. https://doi.org/10.1145/3374664.3375745.Full Text
-
Bender, C. M., Y. Li, Y. Shi, M. K. Reiter, and J. B. Oliva. “Defense through diverse directions.” In 37th International Conference on Machine Learning, Icml 2020, PartF168147-1:733–43, 2020.
-
Wang, K. C., and M. K. Reiter. “Detecting stuffing of a user's credentials at her own accounts.” In Proceedings of the 29th Usenix Security Symposium, 2201–18, 2020.
-
Basu, S., D. Malkhi, A. Tomescu, M. K. Reiter, I. Abraham, and E. G. Sirer. “Efficient verifiable secret sharing with share recovery in BFT protocols.” In Proceedings of the Acm Conference on Computer and Communications Security, 2387–2402, 2019. https://doi.org/10.1145/3319535.3354207.Full Text
-
Yin, M., D. Malkhi, M. K. Reiter, G. G. Gueta, and I. Abraham. “HotStuff: BFT Consensus with linearity and responsiveness.” In Proceedings of the Annual Acm Symposium on Principles of Distributed Computing, 347–56, 2019. https://doi.org/10.1145/3293611.3331591.Full Text
-
Golan Gueta, G., I. Abraham, S. Grossman, D. Malkhi, B. Pinkas, M. Reiter, D. A. Seredinschi, O. Tamir, and A. Tomescu. “SBFT: A Scalable and Decentralized Trust Infrastructure.” In Proceedings 49th Annual Ieee/Ifip International Conference on Dependable Systems and Networks, Dsn 2019, 568–80, 2019. https://doi.org/10.1109/DSN.2019.00063.Full Text
-
Liu, S., T. A. Benson, and M. K. Reiter. “Efficient and safe network updates with suffix causal consistency.” In Proceedings of the 14th Eurosys Conference 2019, 2019. https://doi.org/10.1145/3302424.3303965.Full Text
-
Andrabi, S. J., M. K. Reiter, and C. Sturton. “Usability of augmented reality for revealing secret messages to users but not their devices.” In Soups 2015 Proceedings of the 11th Symposium on Usable Privacy and Security, 89–102, 2019.
-
Wang, Ke Coby, and Michael K. Reiter. “How to End Password Reuse on the Web.” In Proceedings 2019 Network and Distributed System Security Symposium. Internet Society, 2019. https://doi.org/10.14722/ndss.2019.23350.Full Text
-
Wang, Ke Coby, and Michael K. Reiter. “How to End Password Reuse on the Web.” In Proceedings 2019 Network and Distributed System Security Symposium. Internet Society, 2019. https://doi.org/10.14722/ndss.2019.23360.Full Text
-
Heorhiadi, V., S. Chandrasekaran, M. K. Reiter, and V. Sekar. “Intent-driven composition of resource-management SDN applications.” In Conext 2018 Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, 86–97, 2018. https://doi.org/10.1145/3281411.3281431.Full Text
-
Duan, S., M. K. Reiter, and H. Zhang. “BEAT: Asynchronous BFT made practical.” In Proceedings of the Acm Conference on Computer and Communications Security, 2028–41, 2018. https://doi.org/10.1145/3243734.3243812.Full Text
-
Chen, G., T. H. Lai, M. K. Reiter, and Y. Zhang. “Differentially Private Access Patterns for Searchable Symmetric Encryption.” In Proceedings Ieee Infocom, 2018-April:810–18, 2018. https://doi.org/10.1109/INFOCOM.2018.8486381.Full Text
-
Zhou, Z., Z. Qian, M. K. Reiter, and Y. Zhang. “Static Evaluation of Noninterference Using Approximate Model Counting.” In Proceedings Ieee Symposium on Security and Privacy, 2018-May:514–28, 2018. https://doi.org/10.1109/SP.2018.00052.Full Text
-
Duan, S., M. K. Reiter, and H. Zhang. “Secure Causal Atomic Broadcast, Revisited.” In Proceedings 47th Annual Ieee/Ifip International Conference on Dependable Systems and Networks, Dsn 2017, 61–72, 2017. https://doi.org/10.1109/DSN.2017.64.Full Text
-
Liu, S., M. K. Reiter, and V. Sekar. “Flow Reconnaissance via Timing Attacks on SDN Switches.” In Proceedings International Conference on Distributed Computing Systems, 196–206, 2017. https://doi.org/10.1109/ICDCS.2017.281.Full Text
-
Chen, S., X. Zhang, M. K. Reiter, and Y. Zhang. “Detecting privileged side-channel attacks in shielded execution with Déjà Vu.” In Asia Ccs 2017 Proceedings of the 2017 Acm Asia Conference on Computer and Communications Security, 7–18, 2017. https://doi.org/10.1145/3052973.3053007.Full Text
-
Aljuraidan, J., L. Bauer, M. K. Reiter, and M. Beckerle. “Introducing reputation systems to the economics of outsourcing computations to rational workers.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9603 LNCS:60–77, 2017. https://doi.org/10.1007/978-3-662-54970-4_4.Full Text
-
Chi, A., R. A. Cochran, M. Nesfield, M. K. Reiter, and C. Sturton. “A system to verify network behavior of known cryptographic clients.” In Proceedings of the 14th Usenix Symposium on Networked Systems Design and Implementation, Nsdi 2017, 177–95, 2017.
-
Liu, W., D. Gao, and M. K. Reiter. “On-demand time blurring to support side-channel defense.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10493 LNCS:210–28, 2017. https://doi.org/10.1007/978-3-319-66399-9_12.Full Text
-
Androulaki, E., and M. K. Reiter. “CCSW 2016 - Proceedings of the 2016 ACM Cloud Computing Security Workshop, co-located with CCS 2016: Foreword.” In Ccsw 2016 Proceedings of the 2016 Acm Cloud Computing Security Workshop, Co Located With Ccs 2016, iii, 2016.
-
Androulaki, E., and M. K. Reiter. “8th ACM Cloud computing security workshop.” In Proceedings of the Acm Conference on Computer and Communications Security, 24-28-October-2016:1882–83, 2016. https://doi.org/10.1145/2976749.2990480.Full Text
-
Sharif, M., S. Bhagavatula, L. Bauer, and M. K. Reiter. “Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition.” In Proceedings of the Acm Conference on Computer and Communications Security, 24-28-October-2016:1528–40, 2016. https://doi.org/10.1145/2976749.2978392.Full Text
-
Zhou, Z., M. K. Reiter, and Y. Zhang. “A software approach to defeating side channels in last-level caches.” In Proceedings of the Acm Conference on Computer and Communications Security, 24-28-October-2016:871–82, 2016. https://doi.org/10.1145/2976749.2978324.Full Text
-
Heorhiadi, V., S. Rajagopalan, H. Jamjoom, M. K. Reiter, and V. Sekar. “Gremlin: Systematic Resilience Testing of Microservices.” In Proceedings International Conference on Distributed Computing Systems, 2016-August:57–66, 2016. https://doi.org/10.1109/ICDCS.2016.11.Full Text
-
Bethea, D., M. K. Reiter, F. Qian, Q. Xu, and Z. M. Mao. “WACCO and LOKO: Strong Consistency at Global Scale.” In Proceedings 2015 Ieee Conference on Collaboration and Internet Computing, Cic 2015, 130–41, 2016. https://doi.org/10.1109/CIC.2015.29.Full Text
-
Heorhiadi, V., M. K. Reiter, and V. Sekar. “Simplifying software-defined network optimization using SOL.” In Proceedings of the 13th Usenix Symposium on Networked Systems Design and Implementation, Nsdi 2016, 223–37, 2016.
-
Snyder, P., C. Kanich, and M. K. Reiter. “The effect of repeated login prompts on phishing susceptibility.” In 2016 Laser Workshop Learning From Authoritative Security Experiment Results, 13–19, 2016.
-
Tramèr, Florian, Fan Zhang, Ari Juels, Michael K. Reiter, and Thomas Ristenpart. “Stealing Machine Learning Models via Prediction APIs.” In 25th Usenix Security Symposium, Usenix Security 16, Austin, Tx, Usa, August 10 12, 2016, edited by Thorsten Holz and Stefan Savage, 601–18. USENIX Association, 2016.
-
Moon, S. J., V. Sekar, and M. K. Reiter. “Nomad: Mitigating arbitrary cloud side channels via provider-assisted migration.” In Proceedings of the Acm Conference on Computer and Communications Security, 2015-October:1595–1606, 2015. https://doi.org/10.1145/2810103.2813706.Full Text
-
Xiao, Q., M. K. Reiter, and Y. Zhang. “Mitigating storage side channels using statistical privacy mechanisms.” In Proceedings of the Acm Conference on Computer and Communications Security, 2015-October:1582–94, 2015. https://doi.org/10.1145/2810103.2813645.Full Text
-
Li, P., D. Gao, and M. K. Reiter. “Replica Placement for Availability in the Worst Case.” In Proceedings International Conference on Distributed Computing Systems, 2015-July:599–608, 2015. https://doi.org/10.1109/ICDCS.2015.67.Full Text
-
Moradi, M., F. Qian, Q. Xu, Z. M. Mao, D. Bethea, and M. K. Reiter. “Caesar: High-speed and memory-efficient forwarding engine for future internet architecture.” In Ancs 2015 11th 2015 Acm/Ieee Symposium on Architectures for Networking and Communications Systems, 171–82, 2015. https://doi.org/10.1109/ANCS.2015.7110130.Full Text
-
Ismail, Q., T. Ahmed, A. Kapadia, and M. K. Reiter. “Crowdsourced exploration of security configurations.” In Conference on Human Factors in Computing Systems Proceedings, 2015-April:467–76, 2015. https://doi.org/10.1145/2702123.2702370.Full Text
-
Libonati, A., K. Caine, A. Kapadia, and M. K. Reiter. “Defending against device theft with human notarization.” In Collaboratecom 2014 Proceedings of the 10th Ieee International Conference on Collaborative Computing: Networking, Applications and Worksharing, 8–17, 2015. https://doi.org/10.4108/icst.collaboratecom.2014.257649.Full Text
-
Yen, T. F., V. Heorhiadi, A. Oprea, M. K. Reiter, and A. Juels. “An epidemiological study of malware encounters in a large enterprise.” In Proceedings of the Acm Conference on Computer and Communications Security, 1117–30, 2014. https://doi.org/10.1145/2660267.2660330.Full Text
-
Zhang, Y., A. Juels, M. K. Reiter, and T. Ristenpart. “Cross-tenant side-channel attacks in PaaS clouds.” In Proceedings of the Acm Conference on Computer and Communications Security, 990–1003, 2014. https://doi.org/10.1145/2660267.2660356.Full Text
-
Reiter, M., and N. Neves. “Message from program Chairs.” In Proceedings of the International Conference on Dependable Systems and Networks, xvi, 2014. https://doi.org/10.1109/DSN.2014.8.Full Text
-
Heorhiadi, V., S. K. Fayaz, M. K. Reiter, and V. Sekar. “SNIPS: A software-defined approach for scaling intrusion prevention systems via offloading.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8880:9–29, 2014. https://doi.org/10.1007/978-3-319-13841-1_2.Full Text
-
Mazurek, M. L., Y. Liang, W. Melicher, M. Sleeper, L. Bauer, G. R. Ganger, N. Gupta, and M. K. Reiter. “Toward strong, usable access control for shared distributed data.” In Proceedings of the 12th Usenix Conference on File and Storage Technologies, Fast 2014, 89–103, 2014.
-
Bauer, L., L. F. Cranor, S. Komanduri, M. L. Mazurek, M. K. Reiter, M. Sleeper, and B. Ur. “The post anachronism: The temporal dimension of Facebook privacy.” In Proceedings of the Acm Conference on Computer and Communications Security, 1–12, 2013. https://doi.org/10.1145/2517840.2517859.Full Text
-
Zhang, Y., and M. K. Reiter. “Düppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud.” In Proceedings of the Acm Conference on Computer and Communications Security, 827–37, 2013. https://doi.org/10.1145/2508859.2516741.Full Text
-
Wei, L., and M. K. Reiter. “Ensuring file authenticity in private DFA evaluation on encrypted files in the cloud.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8134 LNCS:147–63, 2013. https://doi.org/10.1007/978-3-642-40203-6_9.Full Text
-
Li, P., D. Gao, and M. K. Reiter. “Mitigating access-driven timing channels in clouds using StopWatch.” In Proceedings of the International Conference on Dependable Systems and Networks, 2013. https://doi.org/10.1109/DSN.2013.6575299.Full Text
-
Fayazbakhsh, S. K., M. K. Reiter, and V. Sekar. “Verifiable network function outsourcing: Requirements, challenges, and roadmap.” In Hotmiddlebox 2013 Proceedings of the 2013 Workshop on Hot Topics in Middleboxes and Network Function Virtualization, 25–30, 2013. https://doi.org/10.1145/2535828.2535831.Full Text
-
Kum, H. C., A. Krishnamurthy, D. Pathak, M. K. Reiter, and S. Ahalt. “Secure Decoupled Linkage (SDLink) system for building a social genome.” In Proceedings 2013 Ieee International Conference on Big Data, Big Data 2013, 7–11, 2013. https://doi.org/10.1109/BigData.2013.6691789.Full Text
-
Heorhiadi, V., M. K. Reiter, and V. Sekar. “New opportunities for load balancing in network-wide intrusion detection systems.” In Conext 2012 Proceedings of the 2012 Acm Conference on Emerging Networking Experiments and Technologies, 361–72, 2012. https://doi.org/10.1145/2413176.2413218.Full Text
-
Zhang, Y., A. Juels, M. K. Reiter, and T. Ristenpart. “Cross-VM side channels and their use to extract private keys.” In Proceedings of the Acm Conference on Computer and Communications Security, 305–16, 2012. https://doi.org/10.1145/2382196.2382230.Full Text
-
Vaniea, K., L. Bauer, L. F. Cranor, and M. K. Reiter. “Out of sight, out of mind: Effects of displaying access-control information near the item it controls.” In 2012 10th Annual International Conference on Privacy, Security and Trust, Pst 2012, 128–36, 2012. https://doi.org/10.1109/PST.2012.6297929.Full Text
-
Vaniea, K., L. Bauer, L. F. Cranor, and M. K. Reiter. “Studying access-control usability in the lab: Lessons learned from four studies.” In Acm International Conference Proceeding Series, 31–40, 2012. https://doi.org/10.1145/2379616.2379621.Full Text
-
Coull, S. E., A. M. White, T. F. Yen, F. Monrose, and M. K. Reiter. “Understanding domain registration abuses.” In Computers and Security, 31:806–15, 2012. https://doi.org/10.1016/j.cose.2012.05.005.Full Text
-
Yavuz, A. A., P. Ning, and M. K. Reiter. “Efficient, compromise resilient and append-only cryptographic schemes for secure audit logging.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7397 LNCS:148–63, 2012. https://doi.org/10.1007/978-3-642-32946-3_12.Full Text
-
Wei, L., and M. K. Reiter. “Third-party private DFA evaluation on encrypted files in the cloud.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7459 LNCS:523–40, 2012. https://doi.org/10.1007/978-3-642-33167-1_30.Full Text
-
Yen, T. F., and M. K. Reiter. “Revisiting botnet models and their implications for takedown strategies.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7215 LNCS:249–68, 2012. https://doi.org/10.1007/978-3-642-28641-4_14.Full Text
-
Bauer, L., Y. Liang, M. K. Reiter, and C. Spensky. “Discovering Access-Control Misconfigurations: New Approaches and Evaluation Methodologies.” In Codaspy’12 Proceedings of the 2nd Acm Conference on Data and Application Security and Privacy, 95–104, 2012. https://doi.org/10.1145/2133601.2133613.Full Text
-
Sekar, V., N. Egi, S. Ratnasamy, M. K. Reiter, and G. Shi. “Design and implementation of a consolidated middlebox architecture.” In Proceedings of Nsdi 2012: 9th Usenix Symposium on Networked Systems Design and Implementation, 323–36, 2012.
-
Sekar, V., S. Ratnasamy, M. K. Reiter, N. Egi, and G. Shi. “The middlebox manifesto: Enabling innovation in middlebox deployment.” In Proceedings of the 10th Acm Workshop on Hot Topics in Networks, Hotnets 10, 2011. https://doi.org/10.1145/2070562.2070583.Full Text
-
Zhang, Y., A. Juels, A. Oprea, and M. K. Reiter. “HomeAlone: Co-residency detection in the cloud via side-channel analysis.” In Proceedings Ieee Symposium on Security and Privacy, 313–28, 2011. https://doi.org/10.1109/SP.2011.31.Full Text
-
Huang, X., F. Monrose, and M. K. Reiter. “Amplifying limited expert input to sanitize large network traces.” In Proceedings of the International Conference on Dependable Systems and Networks, 494–505, 2011. https://doi.org/10.1109/DSN.2011.5958262.Full Text
-
Wei, L., S. E. Coull, and M. K. Reiter. “Bounded vector signatures and their applications.” In Proceedings of the 6th International Symposium on Information, Computer and Communications Security, Asiaccs 2011, 277–85, 2011. https://doi.org/10.1145/1966913.1966949.Full Text
-
Bauer, L., S. Garriss, and M. K. Reiter. “Detecting and resolving policy misconfigurations in access-control systems.” In Acm Transactions on Information and System Security, Vol. 14, 2011. https://doi.org/10.1145/1952982.1952984.Full Text
-
Liu, Y., P. Ning, and M. K. Reiter. “False data injection attacks against state estimation in electric power grids.” In Acm Transactions on Information and System Security, Vol. 14, 2011. https://doi.org/10.1145/1952982.1952995.Full Text
-
Reeder, R. W., L. Bauer, L. F. Cranor, M. K. Reiter, and K. Vaniea. “More than skin deep: Measuring effects of the underlying model on access-control system usability.” In Conference on Human Factors in Computing Systems Proceedings, 2065–74, 2011. https://doi.org/10.1145/1978942.1979243.Full Text
-
Wei, L., M. K. Reiter, and K. Mayer-Patel. “Summary-invisible networking: Techniques and defenses.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6531 LNCS:210–25, 2011. https://doi.org/10.1007/978-3-642-18178-8_19.Full Text
-
Zhang, Y., F. Monrose, and M. K. Reiter. “The security of modern password expiration: An algorithmic framework and empirical analysis.” In Proceedings of the Acm Conference on Computer and Communications Security, 176–86, 2010. https://doi.org/10.1145/1866307.1866328.Full Text
-
Coull, S. E., A. M. White, T. F. Yen, F. Monrose, and M. K. Reiter. “Understanding domain registration abuses.” In Ifip Advances in Information and Communication Technology, 330:68–79, 2010. https://doi.org/10.1007/978-3-642-15257-3_7.Full Text
-
Sekar, V., M. K. Reiter, and H. Zhang. “Revisiting the case for a minimalist approach for network flow monitoring.” In Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc, 328–41, 2010. https://doi.org/10.1145/1879141.1879186.Full Text
-
Sekar, V., R. Krishnaswamy, A. Gupta, and M. K. Reiter. “Network-wide deployment of intrusion detection and prevention systems.” In Proceedings of the 6th International Conference on Emerging Networking Experiments and Technologies, Co Next’10, 2010. https://doi.org/10.1145/1921168.1921192.Full Text
-
Hendricks, J., S. Sinnamohideen, G. R. Ganger, and M. K. Reiter. “Zzyzx: Scalable fault tolerance through Byzantine locking.” In Proceedings of the International Conference on Dependable Systems and Networks, 363–72, 2010. https://doi.org/10.1109/DSN.2010.5544297.Full Text
-
Yen, T. F., and M. K. Reiter. “Are your hosts trading or plotting? Telling P2P file-sharing and bots apart.” In Proceedings International Conference on Distributed Computing Systems, 241–52, 2010. https://doi.org/10.1109/ICDCS.2010.76.Full Text
-
Mazurek, M. L., J. P. Arsenault, J. Bresee, N. Gupta, I. Ion, C. Johns, D. Lee, et al. “Access control for home data sharing: Evaluating social acceptability.” In Conference on Human Factors in Computing Systems Proceedings, 2:645–54, 2010. https://doi.org/10.1145/1753326.1753421.Full Text
-
Sekar, V., A. Gupta, M. K. Reiter, and H. Zhang. “Coordinated sampling sans origin-destination identifiers: Algorithms and analysis.” In 2010 2nd International Conference on Communication Systems and Networks, Comsnets 2010, 2010. https://doi.org/10.1109/COMSNETS.2010.5432011.Full Text
-
Merideth, M. G., and M. K. Reiter. “Selected results from the latest decade of quorum systems research.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5959 LNCS:185–206, 2010. https://doi.org/10.1007/978-3-642-11294-2_10.Full Text
-
Li, P., L. Liu, D. Gao, and M. K. Reiter. “On challenges in evaluating malware clustering.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6307 LNCS:238–55, 2010. https://doi.org/10.1007/978-3-642-15512-3_13.Full Text
-
Reiter, M. K., V. Sekar, C. Spensky, and Z. Zhang. “Making peer-assisted content distribution robust to collusion using bandwidth puzzles.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5905 LNCS:132–47, 2009. https://doi.org/10.1007/978-3-642-10772-6_11.Full Text
-
Bauer, L., L. F. Cranor, R. W. Reeder, M. K. Reiter, and K. Vaniea. “Real life challenges in access-control management.” In Conference on Human Factors in Computing Systems Proceedings, 899–908, 2009. https://doi.org/10.1145/1518701.1518838.Full Text
-
Li, P., D. Gao, and M. K. Reiter. “Automatically adapting a trained anomaly detector to software patches.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5758 LNCS:142–60, 2009. https://doi.org/10.1007/978-3-642-04342-0_8.Full Text
-
Liu, Y., P. Ning, and M. K. Reiter. “False data injection attacks against state estimation in electric power grids.” In Proceedings of the Acm Conference on Computer and Communications Security, 21–32, 2009. https://doi.org/10.1145/1653662.1653666.Full Text
-
Merideth, M. G., F. Oprea, and M. K. Reiter. “When and how to change quorums on wide area networks.” In Proceedings of the Ieee Symposium on Reliable Distributed Systems, 12–21, 2009. https://doi.org/10.1109/SRDS.2009.35.Full Text
-
Oh, Y. H., P. Ning, Y. Liu, and M. K. Reiter. “Authenticated data compression in delay tolerant wireless sensor networks.” In Inss2009 6th International Conference on Networked Sensing Systems, 137–44, 2009. https://doi.org/10.1109/INSS.2009.5409933.Full Text
-
Wang, R., X. F. Wang, Z. Li, H. Tang, M. K. Reiter, and Z. Dong. “Privacy-preserving genomic computation through program specialization.” In Proceedings of the Acm Conference on Computer and Communications Security, 338–47, 2009. https://doi.org/10.1145/1653662.1653703.Full Text
-
Bauer, L., L. Jia, M. K. Reiter, and D. Swasey. “XDomain: Cross-border proofs of access.” In Proceedings of Acm Symposium on Access Control Models and Technologies, Sacmat, 43–52, 2009. https://doi.org/10.1145/1542207.1542216.Full Text
-
Bethea, D., and M. K. Reiter. “Data structures with unpredictable timing.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5789 LNCS:456–71, 2009. https://doi.org/10.1007/978-3-642-04444-1_28.Full Text
-
Yen, T. F., X. Huang, F. Monrose, and M. K. Reiter. “Browser fingerprinting from coarse traffic summaries: Techniques and implications.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5587 LNCS:157–75, 2009. https://doi.org/10.1007/978-3-642-02918-9_10.Full Text
-
Coull, S. E., F. Monrose, M. K. Reiter, and M. Bailey. “The challenges of effectively anonymizing network data.” In Proceedings Cybersecurity Applications and Technology Conference for Homeland Security, Catch 2009, 230–36, 2009. https://doi.org/10.1109/CATCH.2009.27.Full Text
-
Bauer, L., L. F. Cranor, R. W. Reeder, M. K. Reiter, and K. Vaniea. “A user study of policy creation in a flexible access-control system.” In Conference on Human Factors in Computing Systems Proceedings, 543–52, 2008. https://doi.org/10.1145/1357054.1357143.Full Text
-
Reeder, R. W., L. Bauer, L. F. Cranor, M. K. Reiter, K. Bacon, K. How, and H. Strong. “Expandable grids for visualizing and authoring computer security policies.” In Conference on Human Factors in Computing Systems Proceedings, 1473–82, 2008. https://doi.org/10.1145/1357054.1357285.Full Text
-
Bauer, L., S. Garriss, and M. K. Reiter. “Detecting and resolving policy misconfigurations in Access-control systems.” In Proceedings of Acm Symposium on Access Control Models and Technologies, Sacmat, 185–94, 2008. https://doi.org/10.1145/1377836.1377866.Full Text
-
Ballard, L., S. Kamara, M. K. Reiter, and F. Monrose. “Towards practical biometric key generation with randomized biometric templates.” In Proceedings of the Acm Conference on Computer and Communications Security, 235–44, 2008. https://doi.org/10.1145/1455770.1455801.Full Text
-
McCune, J. M., B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. “Flicker: An execution infrastructure for tcb minimization.” In Eurosys’08 Proceedings of the Eurosys 2008 Conference, 315–28, 2008. https://doi.org/10.1145/1352592.1352625.Full Text
-
Merideth, M. G., and M. K. Reiter. “Write markers for probabilistic quorum systems.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5401 LNCS:5–21, 2008. https://doi.org/10.1007/978-3-540-92221-6_3.Full Text
-
Collins, M. P., and M. K. Reiter. “On the limits of payload-oblivious network attack detection.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5230 LNCS:251–70, 2008. https://doi.org/10.1007/978-3-540-87403-4_14.Full Text
-
Li, Z., X. F. Wang, Z. Liang, and M. K. Reiter. “AGIS: Towards automatic generation of infection signatures.” In Proceedings of the International Conference on Dependable Systems and Networks, 237–46, 2008. https://doi.org/10.1109/DSN.2008.4630092.Full Text
-
Reiter, M. K., A. Samar, and C. Wang. “Self-optimizing distributed trees.” In Ipdps Miami 2008 Proceedings of the 22nd Ieee International Parallel and Distributed Processing Symposium, Program and Cd Rom, 2008. https://doi.org/10.1109/IPDPS.2008.4536248.Full Text
-
Yen, T. F., and M. K. Reiter. “Traffic aggregation for malware detection.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5137 LNCS:207–27, 2008. https://doi.org/10.1007/978-3-540-70542-0_11.Full Text
-
McCune, J. M., B. Parno, A. Perrig, M. K. Reiter, and A. Seshadri. “How low can you go?: Recommendations for hardware-supported minimal TCB code execution.” In Operating Systems Review (Acm), 42:14–25, 2008. https://doi.org/10.1145/1346281.1346285.Full Text
-
McCune, J. M., B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. “Flicker: An execution infrastructure for TCB minimization.” In Operating Systems Review (Acm), 42:315–28, 2008. https://doi.org/10.1145/1357010.1352625.Full Text
-
Ballard, L., S. Kamara, and M. K. Reiter. “The practical subtleties of biometric key generation.” In Proceedings of the 17th Usenix Security Symposium, 61–74, 2008.
-
Gao, D., M. K. Reiter, and D. Song. “BinHunt: Automatically finding semantic differences in binary programs.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5308 LNCS:238–55, 2008. https://doi.org/10.1007/978-3-540-88625-9_16.Full Text
-
Sekar, V., M. K. Reiter, W. Willinger, H. Zhang, R. R. Kompella, and D. G. Andersen. “CSAMP: A system for network-wide flow monitoring.” In 5th Usenix Symposium on Networked Systems Design and Implementation, Nsdi 2008, 233–46, 2008.
-
Bauer, L., L. F. Cranor, M. K. Reiter, and K. Vaniea. “Lessons learned from the deployment of a smartphone-based access-control system.” In Acm International Conference Proceeding Series, 229:64–75, 2007. https://doi.org/10.1145/1280680.1280689.Full Text
-
Hendricks, J., G. R. Ganger, and M. K. Reiter. “Verifying distributed erasure-coded data.” In Proceedings of the Annual Acm Symposium on Principles of Distributed Computing, 139–46, 2007. https://doi.org/10.1145/1281100.1281122.Full Text
-
Cornwell, J., I. Fette, G. Hsieh, M. Prabaker, J. Rao, K. Tang, K. Vaniea, et al. “User-controllable security and privacy for pervasive computing.” In Proceedings 8th Ieee Workshop on Mobile Computing Systems and Applications, Hotmobile 2007, 14–19, 2007. https://doi.org/10.1109/WMCSA.2007.4389552.Full Text
-
Hendricks, J., G. R. Ganger, and M. K. Reiter. “Low-overhead byzantine fault-tolerant storage.” In Sosp’07 Proceedings of 21st Acm Sigops Symposium on Operating Systems Principles, 73–86, 2007.
-
Hendricks, J., G. R. Ganger, and M. K. Reiter. “Low-overhead byzantine fault-tolerant storage.” In Operating Systems Review (Acm), 73–86, 2007. https://doi.org/10.1145/1294261.1294269.Full Text
-
Oprea, F., and M. K. Reiter. “Minimizing response time for quorum-system protocols over wide-area networks.” In Proceedings of the International Conference on Dependable Systems and Networks, 409–18, 2007. https://doi.org/10.1109/DSN.2007.66.Full Text
-
McCune, J. M., B. Parno, A. Perrig, M. K. Reiter, and A. Seshadri. “Minimal TCB code execution.” In Proceedings Ieee Symposium on Security and Privacy, 267–72, 2007. https://doi.org/10.1109/SP.2007.27.Full Text
-
Bauer, L., S. Garriss, and M. K. Reiter. “Efficient proving for practical distributed access-control systems.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4734 LNCS:19–37, 2007. https://doi.org/10.1007/978-3-540-74835-9_3.Full Text
-
Collins, M. P., and M. K. Reiter. “Hit-list worm detection and bot identification in large networks using protocol graphs.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4637 LNCS:276–95, 2007. https://doi.org/10.1007/978-3-540-74320-0_15.Full Text
-
Merideth, M. G., and M. K. Reiter. “Probabilistic opaque quorum systems.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4731 LNCS:403–19, 2007. https://doi.org/10.1007/978-3-540-75142-7_31.Full Text
-
Reiter, M. K. “Trustworthy services and the biological analogy.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4734 LNCS:1, 2007. https://doi.org/10.1007/978-3-540-74835-9_1.Full Text
-
Sekar, V., X. Yinglian, M. K. Reiter, and Z. Hui. “A multi-resolution approach for worm detection and containment.” In Proceedings of the International Conference on Dependable Systems and Networks, 2006:189–98, 2006. https://doi.org/10.1109/DSN.2006.6.Full Text
-
Perng, G., M. K. Reiter, and C. Wang. “M2: Multicasting mixes for efficient and anonymous communication.” In Proceedings International Conference on Distributed Computing Systems, Vol. 2006, 2006. https://doi.org/10.1109/ICDCS.2006.53.Full Text
-
Wang, X. F., and M. K. Reiter. “WRAPS: Denial-of-service defense through web referrals.” In Proceedings of the Ieee Symposium on Reliable Distributed Systems, 51–60, 2006. https://doi.org/10.1109/SRDS.2006.48.Full Text
-
Wang, X., Z. Li, J. Xu, M. K. Reiter, C. Kil, and J. Y. Choi. “Packet vaccine: Black-box exploit detection and signature generation.” In Proceedings of the Acm Conference on Computer and Communications Security, 37–46, 2006. https://doi.org/10.1145/1180405.1180412.Full Text
-
Xie, Y., V. Sekar, M. K. Reiter, and H. Zhang. “Forensic analysis for epidemic attacks in federated networks.” In Proceedings International Conference on Network Protocols, Icnp, 43–53, 2006. https://doi.org/10.1109/ICNP.2006.320197.Full Text
-
Yinglian, X., M. K. Reiter, and D. O’Hallaron. “Protecting privacy in key-value search systems.” In Proceedings Annual Computer Security Applications Conference, Acsac, 493–504, 2006. https://doi.org/10.1109/ACSAC.2006.43.Full Text
-
Golovin, D., A. Gupta, B. M. Maggs, F. Oprea, and M. K. Reiter. “Quorum placement in networks: Minimizing network congestion.” In Proceedings of the Annual Acm Symposium on Principles of Distributed Computing, 2006:16–25, 2006.
-
Collins, M. P., and M. K. Reiter. “Finding peer-to-peer file-sharing using coarse network behaviors.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4189 LNCS:1–17, 2006. https://doi.org/10.1007/11863908_1.Full Text
-
Gao, D., M. K. Reiter, and D. Song. “Behavioral distance measurement using Hidden Markov Models.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4219 LNCS:19–40, 2006. https://doi.org/10.1007/11856214_2.Full Text
-
Gao, D., M. K. Reiter, and D. Song. “Behavioral distance for intrusion detection.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3858 LNCS:63–81, 2006. https://doi.org/10.1007/11663812_4.Full Text
-
Garg, D., L. Bauer, K. D. Bowers, F. Pfenning, and M. K. Reiter. “A linear logic of authorization and knowledge.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4189 LNCS:297–312, 2006. https://doi.org/10.1007/11863908_19.Full Text
-
Oprea, A., and M. K. Reiter. “On consistency of encrypted files.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4167 LNCS:254–68, 2006. https://doi.org/10.1007/11864219_18.Full Text
-
Perng, G., M. K. Reiter, and C. Wang. “Censorship resistance revisited.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3727 LNCS:62–76, 2006.
-
Abd-El-Malek, M., G. R. Ganger, G. R. Goodson, M. K. Reiter, and J. J. Wylie. “Fault-scalable Byzantine fault-tolerant services.” In Proceedings of the 20th Acm Symposium on Operating Systems Principles, Sosp 2005, 59–74, 2005. https://doi.org/10.1145/1095810.1095817.Full Text
-
Abd-El-Malek, M., G. R. Ganger, G. R. Goodson, M. K. Reiter, and J. J. Wylie. “Lazy verification in fault-tolerant distributed storage systems.” In Proceedings of the Ieee Symposium on Reliable Distributed Systems, 179–90, 2005. https://doi.org/10.1109/RELDIS.2005.20.Full Text
-
Kearns, M., and M. Reiter. “Message from the program chairs.” In Proceedings of the Acm Conference on Electronic Commerce, 2005.
-
Reiter, M. K., A. Samar, and C. Wang. “Distributed construction of a fault-tolerant network from a tree.” In Proceedings of the Ieee Symposium on Reliable Distributed Systems, 155–65, 2005. https://doi.org/10.1109/RELDIS.2005.16.Full Text
-
Bauer, L., S. Garriss, and M. K. Reiter. “Distributed proving in access-control systems.” In Proceedings Ieee Symposium on Security and Privacy, 81–95, 2005. https://doi.org/10.1109/SP.2005.9.Full Text
-
McCune, J. M., A. Perrig, and M. K. Reiter. “Seeing-is-believing: Using camera phones for human-verifiable authentication.” In Proceedings Ieee Symposium on Security and Privacy, 110–24, 2005.
-
McCune, J. M., E. Shi, A. Perrig, and M. K. Reiter. “Detection of denial-of-message attacks on sensor network broadcasts.” In Proceedings Ieee Symposium on Security and Privacy, 64–78, 2005. https://doi.org/10.1109/SP.2005.7.Full Text
-
Xie, Y., V. Sekar, D. A. Maltz, M. K. Reiter, and H. Zhang. “Worm origin identification using random moonwalks.” In Proceedings Ieee Symposium on Security and Privacy, 242–56, 2005. https://doi.org/10.1109/SP.2005.23.Full Text
-
Bauer, L., S. Garriss, J. M. McCune, M. K. Reiter, J. Rouse, and P. Rutenbar. “Device-enabled authorization in the grey system.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3650 LNCS:431–45, 2005. https://doi.org/10.1007/11556992_31.Full Text
-
Gupta, A., B. M. Maggs, F. Oprea, and M. K. Reiter. “Quorum placement in networks to minimize access delays.” In Proceedings of the Annual Acm Symposium on Principles of Distributed Computing, 24:87–96, 2005. https://doi.org/10.1145/1073814.1073829.Full Text
-
Reiter, M. K., X. F. Wang, and M. Wright. “Building reliable mix networks with fair exchange.” In Lecture Notes in Computer Science, 3531:378–92, 2005. https://doi.org/10.1007/11496137_26.Full Text
-
Reiter, M. “Security by, and for, converged mobile devices.” In Lecture Notes in Computer Science, 3506:1, 2005. https://doi.org/10.1007/11496618_1.Full Text
-
Fry, C. P., and M. K. Reiter. “Nested objects in a Byzantine quorum-replicated system.” In Proceedings of the Ieee Symposium on Reliable Distributed Systems, 79–89, 2004. https://doi.org/10.1109/RELDIS.2004.1353005.Full Text
-
Collins, M., and M. K. Reiter. “An empirical analysis of target-resident DoS filters.” In Proceedings Ieee Symposium on Security and Privacy, 2004:103–14, 2004. https://doi.org/10.1109/SECPRI.2004.1301318.Full Text
-
Goodson, G. R., J. J. Wylie, G. R. Ganger, and M. K. Reiter. “Efficient Byzantine-tolerant erasure-coded storage.” In Proceedings of the International Conference on Dependable Systems and Networks, 135–44, 2004. https://doi.org/10.1109/dsn.2004.1311884.Full Text
-
Reiter, M. K., and X. Wang. “Fragile mixing.” In Proceedings of the Acm Conference on Computer and Communications Security, 227–35, 2004. https://doi.org/10.1145/1030083.1030114.Full Text
-
Wang, X., and M. K. Reiter. “Mitigating bandwidth-exhaustion attacks using congestion puzzles.” In Proceedings of the Acm Conference on Computer and Communications Security, 257–67, 2004. https://doi.org/10.1145/1030083.1030118.Full Text
-
Reiter, M. K., A. Samar, and C. Wang. “The design and implementation of a JCA-compliant capture protection infrastructure.” In Proceedings of the Ieee Symposium on Reliable Distributed Systems, 339–48, 2003. https://doi.org/10.1109/RELDIS.2003.1238086.Full Text
-
Wang, X. F., and M. K. Reiter. “Defending against denial-of-service attacks with puzzle auctions.” In Proceedings of the Ieee Computer Society Symposium on Research in Security and Privacy, 78–92, 2003.
-
MacKenzie, P., A. Oprea, and M. K. Reiter. “Automatic generation of two-party computations.” In Proceedings of the Acm Conference on Computer and Communications Security, 210–19, 2003. https://doi.org/10.1145/948138.948139.Full Text
-
Canetti, R., Y. Ishai, R. Kumar, M. K. Reiter, R. Rubinfeld, and R. N. Wright. “Selective private function evaluation with applications to private statistics.” In Proceedings of the Annual Acm Symposium on Principles of Distributed Computing, 293–302, 2001. https://doi.org/10.1145/383962.384047.Full Text
-
Chockler, G., D. Malkhi, and M. K. Reiter. “Backoff protocols for distributed mutual exclusion and ordering.” In Proceedings International Conference on Distributed Computing Systems, 11–20, 2001.
-
MacKenzie, P., and M. K. Reiter. “Two-party generation of DSA signatures.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2139 LNCS:137–54, 2001. https://doi.org/10.1007/3-540-44647-8_8.Full Text
-
MacKenzie, P., and M. K. Reiter. “Delegation of cryptographic servers for capture-resilient devices.” In Proceedings of the Acm Conference on Computer and Communications Security, 10–19, 2001. https://doi.org/10.1145/501983.501986.Full Text
-
MacKenzie, P., and M. K. Reiter. “Networked cryptographic devices resilient to capture.” In Proceedings of the Ieee Computer Society Symposium on Research in Security and Privacy, 12–25, 2001.
-
Monrose, F., M. K. Reiter, Q. Li, and S. Wetzel. “Cryptographic key generation from voice.” In Proceedings of the Ieee Computer Society Symposium on Research in Security and Privacy, 202–13, 2001.
-
Adams, C., M. Burmester, Y. Desmedt, M. Reiter, and P. Zimmermann. “Which PKI (Public Key Infrastructure) is the right one?” In Proceedings of the Acm Conference on Computer and Communications Security, 98–101, 2000.
-
Alvisi, L., D. Malkhi, E. Pierce, M. K. Reiter, and R. N. Wright. “Dynamic byzantine quorum systems.” In Proceedings of the 2002 International Conference on Dependable Systems and Networks, 283–92, 2000. https://doi.org/10.1109/ICDSN.2000.857551.Full Text
-
Malkhi, D., Y. Mansour, and M. K. Reiter. “On diffusing updates in a Byzantine environment.” In Proceedings of the Ieee Symposium on Reliable Distributed Systems, 134–43, 1999.
-
Monrose, F., M. K. Reiter, and S. Wetzel. “Password hardening based on keystroke dynamics.” In Proceedings of the Acm Conference on Computer and Communications Security, 73–82, 1999. https://doi.org/10.1145/319709.319720.Full Text
-
Malkhi, D., and M. K. Reiter. “Survivable consensus objects.” In Proceedings of the Ieee Symposium on Reliable Distributed Systems, 271–79, 1998.
-
Malkhi, D., and M. K. Reiter. “Secure and scalable replication in Phalanx.” In Proceedings of the Ieee Symposium on Reliable Distributed Systems, 51–58, 1998.
-
Malkhi, D., M. K. Reiter, and A. D. Rubin. “Secure execution of Java applets using a remote playground.” In Proceedings of the Ieee Computer Society Symposium on Research in Security and Privacy, 40–51, 1998.
-
Franklin, M. K., and M. K. Reiter. “Fair exchange with a semi-trusted third party.” In Proceedings of the Acm Conference on Computer and Communications Security, 1–5, 1997.
-
Malkhi, D., M. Reiter, and A. Wool. “Load and availability of Byzantine quorum systems.” In Proceedings of the Annual Acm Symposium on Principles of Distributed Computing, 249–57, 1997. https://doi.org/10.1145/259380.259450.Full Text
-
Malkhi, D., M. Reiter, and R. Wright. “Probabilistic quorum systems.” In Proceedings of the Annual Acm Symposium on Principles of Distributed Computing, 267–73, 1997. https://doi.org/10.1145/259380.259458.Full Text
-
Malkhi, D., and M. Reiter. “Unreliable intrusion detection in distributed computations.” In Proceedings of the Computer Security Foundations Workshop, 116–24, 1997.
-
Malkhi, D., and M. Reiter. “Byzantine quorum systems.” In Conference Proceedings of the Annual Acm Symposium on Theory of Computing, 569–78, 1997. https://doi.org/10.1145/258533.258650.Full Text
-
Reiter, M. K., and S. G. Stubblebine. “Path independence for authentication in large-scale systems.” In Proceedings of the Acm Conference on Computer and Communications Security, 57–66, 1997. https://doi.org/10.1145/266420.266435.Full Text
-
Reiter, M. K., and S. G. Stubblebine. “Toward acceptable metrics of authentication.” In Proceedings of the Ieee Computer Society Symposium on Research in Security and Privacy, 10–20, 1997.
-
Malki, D., and M. Reiter. “High-throughput secure reliable multicast protocol.” In Proceedings of the Computer Security Foundations Workshop, 9–17, 1996.
-
Reiter, M. K., M. K. Franklin, J. B. Lacy, and R. N. Wright. “Ω key management service.” In Proceedings of the Acm Conference on Computer and Communications Security, 38–47, 1996. https://doi.org/10.1145/238168.238184.Full Text
-
Franklin, M. K., and M. K. Reiter. “Design and implementation of a secure auction service.” In Proceedings of the Ieee Computer Society Symposium on Research in Security and Privacy, 2–14, 1995.
-
Reiter, M. K. “Secure group membership protocol.” In Proceedings of the Ieee Computer Society Symposium on Research in Security and Privacy, 175–89, 1994.
-
Reiter, M., and L. Gong. “Preventing denial and forgery of causal relationships in distributed systems.” In Proceedings of the Ieee Computer Society Symposium on Research in Security and Privacy, 30–40, 1993.
-
Reiter, M., K. Birman, and L. Gong. “Integrating security in a group oriented distributed system.” In Proceedings of the Symposium on Security and Privacy, 18–32, 1992.
-
-
Preprints
-
Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.Link to Item
-
-
- Teaching & Mentoring
-
Recent Courses
- COMPSCI 351: Computer Security 2023
- COMPSCI 581: Computer Security 2023
- COMPSCI 582: Cryptography 2023
- ECE 656: Cryptography 2023
- COMPSCI 351: Computer Security 2022
- COMPSCI 581: Computer Security 2022
- COMPSCI 590: Advanced Topics in Computer Science 2022
- ECE 590: Advanced Topics in Electrical and Computer Engineering 2022
- COMPSCI 351: Computer Security 2021
Some information on this profile has been compiled automatically from Duke databases and external sources. (Our About page explains how this works.) If you see a problem with the information, please write to Scholars@Duke and let us know. We will reply promptly.