Michael Reiter
Computer Science
James B. Duke Distinguished Professor of Computer Science

Research Interests
Prof. Reiter's research interests include all areas of computer and communications security, fault-tolerant distributed computing, and applied cryptography.
Bio
Michael Reiter is a James B. Duke Distinguished Professor of Computer Science and Electrical & Computer Engineering at Duke University. His previous positions include Director of Secure Systems Research at Bell Labs; Professor of Electrical & Computer Engineering and Computer Science at Carnegie Mellon University, where he was the founding Technical Director of CyLab; and Distinguished Professor of Computer Science at the University of North Carolina at Chapel Hill.
Education
- Ph.D. Cornell University, 1993
Positions
- James B. Duke Distinguished Professor of Computer Science
- Professor of Computer Science
- Professor of Electrical and Computer Engineering
Awards, Honors, and Distinctions
- Test of Time Award. Intel Hardware Security Academic Awards. 2024
- Lasting Research Award. ACM Conference on Data and Application Security and Privacy. 2024
- Test of Time Award. ACM Conference on Computer and Communications Security. 2022
- Test of Time Award. ACM Conference on Computer and Communications Security. 2019
- Outstanding Contributions Award. ACM Special Interest Group on Security, Audit and Control (SIGSAC). 2016
- Fellow. IEEE. 2014
- Fellow. ACM. 2008
Courses Taught
- ECE 899: Special Readings in Electrical Engineering
- ECE 891: Internship
- ECE 656: Cryptography
- COMPSCI 582: Cryptography
- COMPSCI 581: Computer Security
- COMPSCI 393: Research Independent Study
- COMPSCI 391: Independent Study
- COMPSCI 351: Introduction to Computer Security
Publications
- Jin C, Yin C, van Dijk M, Duan S, Massacci F, Reiter MK, et al. PG: Byzantine Fault-Tolerant and Privacy-Preserving Sensor Fusion With Guaranteed Output Delivery. In: CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security. 2024. p. 3272u201386.
- Lucas K, Lin W, Bauer L, Reiter MK, Sharif M. Training Robust ML-based Raw-Binary Malware Detectors in Hours, not Months. In: CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security. 2024. p. 124u201338.
- Huang Z, Gong NZ, Reiter MK. A General Framework for Data-Use Auditing of ML Models. In: CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security. 2024. p. 1300u201314.
- Bandarupalli A, Bhat A, Bagchi S, Kate A, Reiter MK. Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography. In: CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security. 2024. p. 2621u201335.
- Zhou L, Liu Z, Zhang F, Reiter MK. CrudiTEE: A Stick-And-Carrot Approach to Building Trustworthy Cryptocurrency Wallets with TEEs. In: Leibniz International Proceedings in Informatics, LIPIcs. 2024.
- Huang Z, Gong NZ, Reiter MK. A General Framework for Data-Use Auditing of ML Models. 2024.
- Zhang Y, Gong N, Reiter MK. Concealing Backdoor Model Updates in Federated Learning byn Trigger-Optimized Data Poisoning. 2024.
- Bandarupalli A, Bhat A, Chaterji S, Reiter MK, Kate A, Bagchi S. SensorBFT: Fault-Tolerant Target Localization Using Voronoi Diagrams and Approximate Agreement. In: Proceedings - International Conference on Distributed Computing Systems. 2024. p. 186u201397.
- Huang Z, Bauer L, Reiter MK. The Impact of Exposed Passwords on Honeyword Efficacy. In: Proceedings of the 33rd USENIX Security Symposium. 2024. p. 559u201376.
- Jain P, Reed AC, Reiter MK. Near-Optimal Constrained Padding for Object Retrievals with Dependencies. In: Proceedings of the 33rd USENIX Security Symposium. 2024. p. 4087u2013102.
- Xing J, Yoo S, Foukas X, Kim D, Reiter MK. On the Criticality of Integrity Protection in 5G Fronthaul Networks. In: Proceedings of the 33rd USENIX Security Symposium. 2024. p. 4463u201379.
- Wang W, Niu J, Reiter MK, Zhang Y. Formally Verifying au00a0Rollback-Prevention Protocol foru00a0TEEs. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2024. p. 155u201373.
- Bandarupalli A, Bhat A, Bagchi S, Kate A, Liu-Zhang CD, Reiter MK. Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles. In: Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2024. 2024. p. 456u201369.
- Liu H, Reiter MK, Gong NZ. Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models. In: Proceedings of the 33rd USENIX Security Symposium. 2024. p. 2919u201336.
- Chi A, Anderson B, Reiter MK. Prioritizing Remediation of Enterprise Hosts by Malware Execution Risk. In: ACM International Conference Proceeding Series. 2023. p. 550u201364.
- Bhat A, Bandarupalli A, Nagaraj M, Bagchi S, Kate A, Reiter MK. EESMR: Energy Efficient BFT - -SMR for the masses. In: Middleware 2023 - Proceedings of the 24th ACM/IFIP International Middleware Conference. 2023. p. 1u201314.
- Reiter MK. Tackling Credential Abuse Together. In: Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy. ACM; 2023. p. 1u20131.
- Landwehr C, Reiter MK, Williams L, Tsudik G, Jaeger T, Kohno T, et al. Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription. IEEE Security and Privacy. 2023 Mar 1;21(2):32u201342.
- Yandamuri S, Abraham I, Nayak K, Reiter MK. Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption. In: Leibniz International Proceedings in Informatics, LIPIcs. 2023.
- Chakraborti A, Fanti G, Reiter MK. Distance-Aware Private Set Intersection. In: 32nd USENIX Security Symposium, USENIX Security 2023. 2023. p. 319u201336.
- Wang KC, Reiter MK. Using Amnesia to Detect Credential Database Breaches. In: Advances in Information Security. 2023. p. 183u2013215.
- Chakraborti A, Reiter MK. Privately Evaluating Region Overlaps with Applications to Collaborative Sensor Output Validation. In: Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023. 2023. p. 1013u201329.
- Liu S, Reiter MK, Benson TA. Nimble: Fast and Safe Migration of Network Functions. In: Proceedings - IEEE INFOCOM. 2023.
- Reed AC, Reiter MK. Optimally Hiding Object Sizes with Constrained Padding. In: Proceedings - IEEE Computer Security Foundations Symposium. 2023. p. 505u201320.
- Lucas K, Bauer L, Pai S, Reiter MK, Lin W, Sharif M. Adversarial Training for Raw-Binary Malware Classifiers. In: 32nd USENIX Security Symposium, USENIX Security 2023. 2023. p. 1163u201380.
- Lucas K, Sharif M, Bauer L, Reiter MK, Shintre S. Deceiving ML-Based Friend-or-Foe Identification for Executables. In: Advances in Information Security. 2023. p. 217u201349.
- Wang KC, Reiter MK. Bernoulli honeywords. 2022.
- Wang W, Deng S, Niu J, Reiter MK, Zhang Y. ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes. In: Proceedings of the ACM Conference on Computer and Communications Security. 2022. p. 2841u201355.
- Wang K, Xu L, Perrault A, Reiter MK, Tambe M. Coordinating Followers to Reach Better Equilibria: End-to-End Gradient Descent for Stackelberg Games. In: Proceedings of the 36th AAAI Conference on Artificial Intelligence, AAAI 2022. 2022. p. 5219u201327.
- Zhang X, Hamm J, Reiter MK, Zhang Y. Defeating traffic analysis via differential privacy: a case study on streaming traffic. International Journal of Information Security. 2022 Jun 1;21(3):689u2013706.
- Bender CM, Emmanuel PR, Reiter MK, Oliva JB. PRACTICAL INTEGRATION VIA SEPARABLE BIJECTIVE NETWORKS. In: ICLR 2022 - 10th International Conference on Learning Representations. 2022.
- Lin W, Lucas K, Bauer L, Reiter MK, Sharif M. Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks. In: Proceedings of Machine Learning Research. 2022. p. 13405u201330.
- Chakraborti A, Fanti G, Reiter MK. Distance-Aware Private Set Intersection. 2021 Dec 29;
- Lin W, Lucas K, Bauer L, Reiter MK, Sharif M. Constrained Gradient Descent: A Powerful and Principled Evasion Attackn Against Neural Networks. 2021 Dec 28;
- Zhou Z, Reiter MK. Interpretable noninterference measurement and its application to processor designs. Proceedings of the ACM on Programming Languages. 2021 Oct 1;5(OOPSLA).
- Yandamuri S, Abraham I, Nayak K, Reiter M. Brief announcement: Communication-efficient BFT using small trusted hardware to tolerate minority corruption. In: Leibniz International Proceedings in Informatics, LIPIcs. 2021.
- Reed AC, Reiter MK. Optimally Hiding Object Sizes with Constrained Padding. 2021 Aug.
- Lucas K, Sharif M, Bauer L, Reiter MK, Shintre S. Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes. In: ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. 2021. p. 744u201358.
- Anjum I, Zhu M, Polinsky I, Enck W, Reiter MK, Singh MP. Role-Based Deception in Enterprise Networks. In: CODASPY 2021 - Proceedings of the 11th ACM Conference on Data and Application Security and Privacy. 2021. p. 65u201376.
- Severini J, Mysore RN, Sekar V, Banerjee S, Reiter MK. The Netivus Manifesto: Making Collaborative Network Management Easier for the Rest of Us. Vol. 51, Computer Communication Review. 2021. p. 10u20137.
- Guo C, Campbell B, Kapadia A, Reiter MK, Caine K. Effect of mood, location, trust, and presence of others on video-based social authentication. In: Proceedings of the 30th USENIX Security Symposium. 2021. p. 1u201318.
- Humphries A, Cating-Subramanian K, Reiter MK. TASE: Reducing Latency of Symbolic Execution with Transactional Memory. In: 28th Annual Network and Distributed System Security Symposium, NDSS 2021. 2021.
- Wang KC, Reiter MK. Using amnesia to detect credential database breaches. In: Proceedings of the 30th USENIX Security Symposium. 2021. p. 839u201355.
- Mi Z, Chen H, Zhang Y, Peng S, Wang X, Reiter M. CPU Elasticity to Mitigate Cross-VM Runtime Monitoring. IEEE Transactions on Dependable and Secure Computing. 2020 Sep 1;17(5):1094u2013108.
- Xiao Q, Subialdea B, Bauer L, Reiter MK. Metering graphical data leakage with snowman. In: Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. 2020. p. 1u201312.
- Polinsky I, Martin K, Enck W, Reiter MK. N-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications. In: CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy. 2020. p. 235u201346.
- Bender CM, Li Y, Shi Y, Reiter MK, Oliva JB. Defense through diverse directions. In: 37th International Conference on Machine Learning, ICML 2020. 2020. p. 733u201343.
- Wang KC, Reiter MK. Detecting stuffing of a user's credentials at her own accounts. In: Proceedings of the 29th USENIX Security Symposium. 2020. p. 2201u201318.
- Lucas K, Sharif M, Bauer L, Reiter MK, Shintre S. Malware Makeover: Breaking ML-based Static Analysis by Modifyingn Executable Bytes. 2019 Dec.
- Sharif M, Bauer L, Reiter MK. $n$-ML: Mitigating Adversarial Examples via Ensembles of Topologicallyn Manipulated Classifiers. 2019 Dec.
- Basu S, Malkhi D, Tomescu A, Reiter MK, Abraham I, Sirer EG. Efficient verifiable secret sharing with share recovery in BFT protocols. In: Proceedings of the ACM Conference on Computer and Communications Security. 2019. p. 2387u2013402.
- Yin M, Malkhi D, Reiter MK, Gueta GG, Abraham I. HotStuff: BFT Consensus with linearity and responsiveness. In: Proceedings of the Annual ACM Symposium on Principles of Distributed Computing. 2019. p. 347u201356.
- Sharif M, Bhagavatula S, Bauer L, Reiter MK. A general framework for adversarial examples with objectives. ACM Transactions on Privacy and Security. 2019 Jun 10;22(3).
- Golan Gueta G, Abraham I, Grossman S, Malkhi D, Pinkas B, Reiter M, et al. SBFT: A Scalable and Decentralized Trust Infrastructure. In: Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019. 2019. p. 568u201380.
- Liu S, Benson TA, Reiter MK. Efficient and safe network updates with suffix causal consistency. In: Proceedings of the 14th EuroSys Conference 2019. 2019.
- Zhang X, Hamm J, Reiter MK, Zhang Y. Statistical Privacy for Streaming Traffic. In: 26th Annual Network and Distributed System Security Symposium, NDSS 2019. 2019.
- Wang KC, Reiter MK. How to End Password Reuse on the Web. In: Proceedings 2019 Network and Distributed System Security Symposium. Internet Society; 2019.
- Andrabi SJ, Reiter MK, Sturton C. Usability of augmented reality for revealing secret messages to users but not their devices. In: SOUPS 2015 - Proceedings of the 11th Symposium on Usable Privacy and Security. 2019. p. 89u2013102.
- Wang KC, Reiter MK. How to End Password Reuse on the Web. In: 26th Annual Network and Distributed System Security Symposium, NDSS 2019. 2019.
- Heorhiadi V, Chandrasekaran S, Reiter MK, Sekar V. Intent-driven composition of resource-management SDN applications. In: CoNEXT 2018 - Proceedings of the 14th International Conference on Emerging Networking EXperiments and Technologies. 2018. p. 86u201397.
- Duan S, Reiter MK, Zhang H. BEAT: Asynchronous BFT made practical. In: Proceedings of the ACM Conference on Computer and Communications Security. 2018. p. 2028u201341.
- Chen G, Lai TH, Reiter MK, Zhang Y. Differentially Private Access Patterns for Searchable Symmetric Encryption. In: Proceedings - IEEE INFOCOM. 2018. p. 810u20138.
- Zhou Z, Qian Z, Reiter MK, Zhang Y. Static Evaluation of Noninterference Using Approximate Model Counting. In: Proceedings - IEEE Symposium on Security and Privacy. 2018. p. 514u201328.
- Duan S, Reiter MK, Zhang H. Secure Causal Atomic Broadcast, Revisited. In: Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017. 2017. p. 61u201372.
- Liu S, Reiter MK, Sekar V. Flow Reconnaissance via Timing Attacks on SDN Switches. In: Proceedings - International Conference on Distributed Computing Systems. 2017. p. 196u2013206.
- Aikat J, Akella A, Chase JS, Juels A, Reiter MK, Ristenpart T, et al. Rethinking Security in the Era of Cloud Computing. IEEE Security and Privacy. 2017 May 1;15(3):60u20139.
- Chen S, Zhang X, Reiter MK, Zhang Y. Detecting privileged side-channel attacks in shielded execution with Du00e9ju00e0 Vu. In: ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. 2017. p. 7u201318.
- Liu W, Gao D, Reiter MK. On-demand time blurring to support side-channel defense. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2017. p. 210u201328.
- Chi A, Cochran RA, Nesfield M, Reiter MK, Sturton C. A system to verify network behavior of known cryptographic clients. In: Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017. 2017. p. 177u201395.
- Aljuraidan J, Bauer L, Reiter MK, Beckerle M. Introducing reputation systems to the economics of outsourcing computations to rational workers. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2017. p. 60u201377.
- Aikat J, Akella A, Chase JS, Juels A, Reiter MK, Ristenpart T, et al. Rethinking Security in the Era of Cloud Computing. IEEE Security and Privacy. 2017 Jan 1;15(3):60u20139.
- Androulaki E, Reiter MK. CCSW 2016 - Proceedings of the 2016 ACM Cloud Computing Security Workshop, co-located with CCS 2016: Foreword. In: CCSW 2016 - Proceedings of the 2016 ACM Cloud Computing Security Workshop, co-located with CCS 2016. 2016. p. iii.
- Zhou Z, Reiter MK, Zhang Y. A software approach to defeating side channels in last-level caches. In: Proceedings of the ACM Conference on Computer and Communications Security. 2016. p. 871u201382.
- Sharif M, Bhagavatula S, Bauer L, Reiter MK. Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In: Proceedings of the ACM Conference on Computer and Communications Security. 2016. p. 1528u201340.
- Androulaki E, Reiter MK. 8th ACM Cloud computing security workshop. In: Proceedings of the ACM Conference on Computer and Communications Security. 2016. p. 1882u20133.
- Heorhiadi V, Rajagopalan S, Jamjoom H, Reiter MK, Sekar V. Gremlin: Systematic Resilience Testing of Microservices. In: Proceedings - International Conference on Distributed Computing Systems. 2016. p. 57u201366.
- Chi A, Cochran R, Nesfield M, Reiter MK, Sturton C. Server-side verification of client behavior in cryptographic protocols. 2016 Mar.
- Bethea D, Reiter MK, Qian F, Xu Q, Mao ZM. WACCO and LOKO: Strong Consistency at Global Scale. In: Proceedings - 2015 IEEE Conference on Collaboration and Internet Computing, CIC 2015. 2016. p. 130u201341.
- Tramu00e8r F, Zhang F, Juels A, Reiter MK, Ristenpart T. Stealing Machine Learning Models via Prediction APIs. In: Holz T, Savage S, editors. 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016. USENIX Association; 2016. p. 601u201318.
- Snyder P, Kanich C, Reiter MK. The effect of repeated login prompts on phishing susceptibility. In: 2016 LASER Workshop - Learning from Authoritative Security Experiment Results. 2016. p. 13u20139.
- Heorhiadi V, Reiter MK, Sekar V. Simplifying software-defined network optimization using SOL. In: Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2016. 2016. p. 223u201337.
- Xiao Q, Reiter MK, Zhang Y. Mitigating storage side channels using statistical privacy mechanisms. In: Proceedings of the ACM Conference on Computer and Communications Security. 2015. p. 1582u201394.
- Moon SJ, Sekar V, Reiter MK. Nomad: Mitigating arbitrary cloud side channels via provider-assisted migration. In: Proceedings of the ACM Conference on Computer and Communications Security. 2015. p. 1595u2013606.
- Wei L, Reiter MK. Toward practical encrypted email that supports private, regular-expression searches. International Journal of Information Security. 2015 Oct 1;14(5):397u2013416.
- Li P, Gao D, Reiter MK. Replica Placement for Availability in the Worst Case. In: Proceedings - International Conference on Distributed Computing Systems. 2015. p. 599u2013608.
- Moradi M, Qian F, Xu Q, Mao ZM, Bethea D, Reiter MK. Caesar: High-speed and memory-efficient forwarding engine for future internet architecture. In: ANCS 2015 - 11th 2015 ACM/IEEE Symposium on Architectures for Networking and Communications Systems. 2015. p. 171u201382.
- Heorhiadi V, Reiter MK, Sekar V. Accelerating the Development of Software-Defined Network Optimizationn Applications Using SOL. 2015 Apr.
- Ismail Q, Ahmed T, Kapadia A, Reiter MK. Crowdsourced exploration of security configurations. In: Conference on Human Factors in Computing Systems - Proceedings. 2015. p. 467u201376.
- Libonati A, Caine K, Kapadia A, Reiter MK. Defending against device theft with human notarization. In: CollaborateCom 2014 - Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing. 2015. p. 8u201317.
- Yen TF, Heorhiadi V, Oprea A, Reiter MK, Juels A. An epidemiological study of malware encounters in a large enterprise. In: Proceedings of the ACM Conference on Computer and Communications Security. 2014. p. 1117u201330.
- Zhang Y, Juels A, Reiter MK, Ristenpart T. Cross-tenant side-channel attacks in PaaS clouds. In: Proceedings of the ACM Conference on Computer and Communications Security. 2014. p. 990u20131003.
- Li P, Gao D, Reiter MK. Stop watch: A cloud architecture for timing channel mitigation. ACM Transactions on Information and System Security. 2014 Nov 1;17(2).
- Reiter M, Neves N. Message from program Chairs. In: Proceedings of the International Conference on Dependable Systems and Networks. 2014. p. xvi.
- Mazurek ML, Liang Y, Melicher W, Sleeper M, Bauer L, Ganger GR, et al. Toward strong, usable access control for shared distributed data. In: Proceedings of the 12th USENIX Conference on File and Storage Technologies, FAST 2014. 2014. p. 89u2013103.
- Heorhiadi V, Fayaz SK, Reiter MK, Sekar V. SNIPS: A software-defined approach for scaling intrusion prevention systems via offloading. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2014. p. 9u201329.
- Bauer L, Cranor LF, Komanduri S, Mazurek ML, Reiter MK, Sleeper M, et al. The post anachronism: The temporal dimension of Facebook privacy. In: Proceedings of the ACM Conference on Computer and Communications Security. 2013. p. 1u201312.
- Zhang Y, Reiter MK. Du00fcppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud. In: Proceedings of the ACM Conference on Computer and Communications Security. 2013. p. 827u201337.
- Wei L, Reiter MK. Ensuring file authenticity in private DFA evaluation on encrypted files in the cloud. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2013. p. 147u201363.
- Li P, Gao D, Reiter MK. Mitigating access-driven timing channels in clouds using StopWatch. In: Proceedings of the International Conference on Dependable Systems and Networks. 2013.
- Cochran RA, Reiter MK. Toward Online Verification of Client Behavior in Distributed Applications. In: 20th Annual Network and Distributed System Security Symposium, NDSS 2013. 2013.
- Kum HC, Krishnamurthy A, Pathak D, Reiter MK, Ahalt S. Secure Decoupled Linkage (SDLink) system for building a social genome. In: Proceedings - 2013 IEEE International Conference on Big Data, Big Data 2013. 2013. p. 7u201311.
- Fayazbakhsh SK, Reiter MK, Sekar V. Verifiable network function outsourcing: Requirements, challenges, and roadmap. In: HotMiddlebox 2013 - Proceedings of the 2013 Workshop on Hot Topics in Middleboxes and Network Function Virtualization. 2013. p. 25u201330.
- Lai X, Reiter M. Message from program chairs. ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. 2012 Dec 1;
- Heorhiadi V, Reiter MK, Sekar V. New opportunities for load balancing in network-wide intrusion detection systems. In: CoNEXT 2012 - Proceedings of the 2012 ACM Conference on Emerging Networking Experiments and Technologies. 2012. p. 361u201372.
- Zhang Y, Juels A, Reiter MK, Ristenpart T. Cross-VM side channels and their use to extract private keys. In: Proceedings of the ACM Conference on Computer and Communications Security. 2012. p. 305u201316.
- Vaniea K, Bauer L, Cranor LF, Reiter MK. Out of sight, out of mind: Effects of displaying access-control information near the item it controls. In: 2012 10th Annual International Conference on Privacy, Security and Trust, PST 2012. 2012. p. 128u201336.
- Vaniea K, Bauer L, Cranor LF, Reiter MK. Studying access-control usability in the lab: Lessons learned from four studies. In: ACM International Conference Proceeding Series. 2012. p. 31u201340.
- Coull SE, White AM, Yen TF, Monrose F, Reiter MK. Understanding domain registration abuses. In: Computers and Security. 2012. p. 806u201315.
- Yavuz AA, Ning P, Reiter MK. Efficient, compromise resilient and append-only cryptographic schemes for secure audit logging. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2012. p. 148u201363.
- Wei L, Reiter MK. Third-party private DFA evaluation on encrypted files in the cloud. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2012. p. 523u201340.
- Abd-El-malek M, Wachs M, Cipar J, Sanghi K, Ganger GR, Gibson GA, et al. File system virtual appliances: Portable file system implementations. ACM Transactions on Storage. 2012 Sep 1;8(3).
- Yavuz AA, Ning P, Reiter MK. BAF and FI-BAF: Efficient and publicly verifiable cryptographic schemes for secure logging in resource-constrained systems. ACM Transactions on Information and System Security. 2012 Jul 1;15(2).
- Yen TF, Reiter MK. Revisiting botnet models and their implications for takedown strategies. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2012. p. 249u201368.
- Bauer L, Liang Y, Reiter MK, Spensky C. Discovering Access-Control Misconfigurations: New Approaches and Evaluation Methodologies. In: CODASPYu201912 - Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy. 2012. p. 95u2013104.
- Sekar V, Egi N, Ratnasamy S, Reiter MK, Shi G. Design and implementation of a consolidated middlebox architecture. In: Proceedings of NSDI 2012: 9th USENIX Symposium on Networked Systems Design and Implementation. 2012. p. 323u201336.
- Sekar V, Ratnasamy S, Reiter MK, Egi N, Shi G. The middlebox manifesto: Enabling innovation in middlebox deployment. In: Proceedings of the 10th ACM Workshop on Hot Topics in Networks, HotNets-10. 2011.
- Huang X, Monrose F, Reiter MK. Amplifying limited expert input to sanitize large network traces. In: Proceedings of the International Conference on Dependable Systems and Networks. 2011. p. 494u2013505.
- Bauer L, Garriss S, Reiter MK. Detecting and resolving policy misconfigurations in access-control systems. In: ACM Transactions on Information and System Security. 2011.
- Liu Y, Ning P, Reiter MK. False data injection attacks against state estimation in electric power grids. In: ACM Transactions on Information and System Security. 2011.
- Zhang Y, Juels A, Oprea A, Reiter MK. HomeAlone: Co-residency detection in the cloud via side-channel analysis. In: Proceedings - IEEE Symposium on Security and Privacy. 2011. p. 313u201328.
- Libonati A, McCune JM, Reiter MK. Usability Testing a Malware-Resistant Input Mechanism. In: Proceedings of the Symposium on Network and Distributed System Security, NDSS 2011. 2011.
- Bethea D, Cochran RA, Reiter MK. Server-Side Verification Of Client Behavior In Online Games. ACM Transactions on Information and System Security. 2011 Jan 1;14(4):1u201327.
- Wei L, Coull SE, Reiter MK. Bounded vector signatures and their applications. In: Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011. 2011. p. 277u201385.
- Reeder RW, Bauer L, Cranor LF, Reiter MK, Vaniea K. More than skin deep: Measuring effects of the underlying model on access-control system usability. In: Conference on Human Factors in Computing Systems - Proceedings. 2011. p. 2065u201374.
- Wei L, Reiter MK, Mayer-Patel K. Summary-invisible networking: Techniques and defenses. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2011. p. 210u201325.
- Zhang Y, Monrose F, Reiter MK. The security of modern password expiration: An algorithmic framework and empirical analysis. In: Proceedings of the ACM Conference on Computer and Communications Security. 2010. p. 176u201386.
- Coull SE, White AM, Yen TF, Monrose F, Reiter MK. Understanding domain registration abuses. In: IFIP Advances in Information and Communication Technology. 2010. p. 68u201379.
- Sekar V, Krishnaswamy R, Gupta A, Reiter MK. Network-wide deployment of intrusion detection and prevention systems. In: Proceedings of the 6th International Conference on Emerging Networking Experiments and Technologies, Co-NEXTu201910. 2010.
- Hendricks J, Sinnamohideen S, Ganger GR, Reiter MK. Zzyzx: Scalable fault tolerance through Byzantine locking. In: Proceedings of the International Conference on Dependable Systems and Networks. 2010. p. 363u201372.
- Yen TF, Reiter MK. Are your hosts trading or plotting? Telling P2P file-sharing and bots apart. In: Proceedings - International Conference on Distributed Computing Systems. 2010. p. 241u201352.
- Mazurek ML, Arsenault JP, Bresee J, Gupta N, Ion I, Johns C, et al. Access control for home data sharing: Evaluating social acceptability. In: Conference on Human Factors in Computing Systems - Proceedings. 2010. p. 645u201354.
- Sekar V, Gupta A, Reiter MK, Zhang H. Coordinated sampling sans origin-destination identifiers: Algorithms and analysis. In: 2010 2nd International Conference on COMmunication Systems and NETworks, COMSNETS 2010. 2010.
- Wang X, Reiter MK. Using web-referral architectures to mitigate denial-of-service threats. IEEE Transactions on Dependable and Secure Computing. 2010 Apr 30;7(2):203u201316.
- Merideth MG, Reiter MK. Selected results from the latest decade of quorum systems research. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2010. p. 185u2013206.
- Bethea D, Cochran RA, Reiter MK. Server-side Verification of Client Behavior in Online Games. In: Proceedings of the Symposium on Network and Distributed System Security, NDSS 2010. 2010.
- Li P, Liu L, Gao D, Reiter MK. On challenges in evaluating malware clustering. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2010. p. 238u201355.
- Sekar V, Reiter MK, Zhang H. Revisiting the case for a minimalist approach for network flow monitoring. In: Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC. 2010. p. 328u201341.
- Reiter MK, Sekar V, Spensky C, Zhang Z. Making peer-assisted content distribution robust to collusion using bandwidth puzzles. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2009. p. 132u201347.
- Liu Y, Ning P, Reiter MK. False data injection attacks against state estimation in electric power grids. In: Proceedings of the ACM Conference on Computer and Communications Security. 2009. p. 21u201332.
- Bauer L, Cranor LF, Reeder RW, Reiter MK, Vaniea K. Real life challenges in access-control management. In: Conference on Human Factors in Computing Systems - Proceedings. 2009. p. 899u2013908.
- Wang R, Wang XF, Li Z, Tang H, Reiter MK, Dong Z. Privacy-preserving genomic computation through program specialization. In: Proceedings of the ACM Conference on Computer and Communications Security. 2009. p. 338u201347.
- Oh YH, Ning P, Liu Y, Reiter MK. Authenticated data compression in delay tolerant wireless sensor networks. In: INSS2009 - 6th International Conference on Networked Sensing Systems. 2009. p. 137u201344.
- Li P, Gao D, Reiter MK. Automatically adapting a trained anomaly detector to software patches. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2009. p. 142u201360.
- Merideth MG, Oprea F, Reiter MK. When and how to change quorums on wide area networks. In: Proceedings of the IEEE Symposium on Reliable Distributed Systems. 2009. p. 12u201321.
- Bauer L, Jia L, Reiter MK, Swasey D. XDomain: Cross-border proofs of access. In: Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. 2009. p. 43u201352.
- Bethea D, Reiter MK. Data structures with unpredictable timing. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2009. p. 456u201371.
- Yen TF, Huang X, Monrose F, Reiter MK. Browser fingerprinting from coarse traffic summaries: Techniques and implications. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2009. p. 157u201375.
- Coull SE, Monrose F, Reiter MK, Bailey M. The challenges of effectively anonymizing network data. In: Proceedings - Cybersecurity Applications and Technology Conference for Homeland Security, CATCH 2009. 2009. p. 230u20136.
- Gao D, Reiter MK, Song D. Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance. IEEE Transactions on Dependable and Secure Computing. 2009 Jan 1;6(2):96u2013110.
- McCune JM, Perrig A, Reiter MK. Safe Passage for Passwords and Other Sensitive Datau2217. In: Proceedings of the Symposium on Network and Distributed System Security, NDSS 2009. 2009.
- McCune JM, Perrig A, Reiter MK. Seeing-Is-Believing: Using camera phones for human-verifiable authentication. International Journal of Security and Networks. 2009 Jan 1;4(1u20132):43u201356.
- Reeder RW, Bauer L, Cranor LF, Reiter MK, Bacon K, How K, et al. Expandable grids for visualizing and authoring computer security policies. In: Conference on Human Factors in Computing Systems - Proceedings. 2008. p. 1473u201382.
- Bauer L, Cranor LF, Reeder RW, Reiter MK, Vaniea K. A user study of policy creation in a flexible access-control system. In: Conference on Human Factors in Computing Systems - Proceedings. 2008. p. 543u201352.
- Bauer L, Garriss S, Reiter MK. Detecting and resolving policy misconfigurations in Access-control systems. In: Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. 2008. p. 185u201394.
- McCune JM, Parno BJ, Perrig A, Reiter MK, Isozaki H. Flicker: An execution infrastructure for tcb minimization. In: EuroSysu201908 - Proceedings of the EuroSys 2008 Conference. 2008. p. 315u201328.
- Reiter MK, Samar A. Quiver: Consistent object sharing for edge services. IEEE Transactions on Parallel and Distributed Systems. 2008 Dec 1;19(7):878u201389.
- Merideth MG, Reiter MK. Write markers for probabilistic quorum systems. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2008. p. 5u201321.
- Ballard L, Kamara S, Reiter MK, Monrose F. Towards practical biometric key generation with randomized biometric templates. In: Proceedings of the ACM Conference on Computer and Communications Security. 2008. p. 235u201344.
- Wang X, Li Z, Choi JY, Xu J, Reiter MK, Kil C. Fast and black-box exploit detection and signature generation for commodity software. ACM Transactions on Information and System Security. 2008 Dec 1;12(2).
- Collins MP, Reiter MK. On the limits of payload-oblivious network attack detection. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2008. p. 251u201370.
- Li Z, Wang XF, Liang Z, Reiter MK. AGIS: Towards automatic generation of infection signatures. In: Proceedings of the International Conference on Dependable Systems and Networks. 2008. p. 237u201346.
- Reiter MK, Samar A, Wang C. Self-optimizing distributed trees. In: IPDPS Miami 2008 - Proceedings of the 22nd IEEE International Parallel and Distributed Processing Symposium, Program and CD-ROM. 2008.
- Yen TF, Reiter MK. Traffic aggregation for malware detection. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2008. p. 207u201327.
- Wang XF, Reiter MK. A multi-layer framework for puzzle-based denial-of-service defense. International Journal of Information Security. 2008 Aug 1;7(4):243u201363.
- McCune JM, Parno B, Perrig A, Reiter MK, Seshadri A. How low can you go?: Recommendations for hardware-supported minimal TCB code execution. In: Operating Systems Review (ACM). 2008. p. 14u201325.
- McCune JM, Parno BJ, Perrig A, Reiter MK, Isozaki H. Flicker: An execution infrastructure for TCB minimization. In: Operating Systems Review (ACM). 2008. p. 315u201328.
- Gao D, Reiter MK, Song D. BinHunt: Automatically finding semantic differences in binary programs. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2008. p. 238u201355.
- Coull SE, Wright CV, Keromytis AD, Monrose F, Reiter MK. Taming the Devil: Techniques for Evaluating Anonymized Network Data. In: Proceedings of the Symposium on Network and Distributed System Security, NDSS 2008. 2008.
- Ballard L, Kamara S, Reiter MK. The practical subtleties of biometric key generation. In: Proceedings of the 17th USENIX Security Symposium. 2008. p. 61u201374.
- Sekar V, Reiter MK, Willinger W, Zhang H, Kompella RR, Andersen DG. CSAMP: A system for network-wide flow monitoring. In: 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2008. 2008. p. 233u201346.
- Hendricks J, Ganger GR, Reiter MK. Verifying distributed erasure-coded data. In: Proceedings of the Annual ACM Symposium on Principles of Distributed Computing. 2007. p. 139u201346.
- Bauer L, Cranor LF, Reiter MK, Vaniea K. Lessons learned from the deployment of a smartphone-based access-control system. In: ACM International Conference Proceeding Series. 2007. p. 64u201375.
- Cornwell J, Fette I, Hsieh G, Prabaker M, Rao J, Tang K, et al. User-controllable security and privacy for pervasive computing. In: Proceedings - 8th IEEE Workshop on Mobile Computing Systems and Applications, HOTMOBILE 2007. 2007. p. 14u20139.
- Hendricks J, Ganger GR, Reiter MK. Low-overhead byzantine fault-tolerant storage. In: Operating Systems Review (ACM). 2007. p. 73u201386.
- Hendricks J, Ganger GR, Reiter MK. Low-overhead byzantine fault-tolerant storage. In: SOSPu201907 - Proceedings of 21st ACM SIGOPS Symposium on Operating Systems Principles. 2007. p. 73u201386.
- Oprea F, Reiter MK. Minimizing response time for quorum-system protocols over wide-area networks. In: Proceedings of the International Conference on Dependable Systems and Networks. 2007. p. 409u201318.
- McCune JM, Parno B, Perrig A, Reiter MK, Seshadri A. Minimal TCB code execution. In: Proceedings - IEEE Symposium on Security and Privacy. 2007. p. 267u201372.
- Merideth MG, Reiter MK. Probabilistic opaque quorum systems. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2007. p. 403u201319.
- Bauer L, Garriss S, Reiter MK. Efficient proving for practical distributed access-control systems. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2007. p. 19u201337.
- Oprea A, Reiter MK. Integrity checking in cryptographic file systems with constant trusted storage. In: 16th USENIX Security Symposium. 2007. p. 183u201398.
- Bowers KD, Bauer L, Garg D, Pfenning F, Reiter MK. Consumable Credentials in Logic-Based Access-Control Systems. In: Proceedings of the Symposium on Network and Distributed System Security, NDSS 2007. 2007.
- Coull SE, Collins MP, Wright CV, Monrose F, Reiter MK. On web browsing privacy in anonymized netflows. In: 16th USENIX Security Symposium. 2007. p. 339u201352.
- Abd-El-Malek M, Ganger GR, Goodson GR, Reiter MK, Wylie JJ. Towards bounded wait-free PASIS. In: Dagstuhl Seminar Proceedings. 2007.
- Coull SE, Wright CV, Monrose F, Collins MP, Reiter MK. Playing Devilu2019s Advocate: Inferring Sensitive Information from Anonymized Network Traces. In: Proceedings of the Symposium on Network and Distributed System Security, NDSS 2007. 2007.
- Reiter MK. Trustworthy services and the biological analogy. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2007. p. 1.
- Collins MP, Reiter MK. Hit-list worm detection and bot identification in large networks using protocol graphs. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2007. p. 276u201395.
- Sekar V, Yinglian X, Reiter MK, Hui Z. A multi-resolution approach for worm detection and containment. In: Proceedings of the International Conference on Dependable Systems and Networks. 2006. p. 189u201398.
- Xie Y, Sekar V, Reiter MK, Zhang H. Forensic analysis for epidemic attacks in federated networks. In: Proceedings - International Conference on Network Protocols, ICNP. 2006. p. 43u201353.
- Yinglian X, Reiter MK, Ou2019Hallaron D. Protecting privacy in key-value search systems. In: Proceedings - Annual Computer Security Applications Conference, ACSAC. 2006. p. 493u2013504.
- Wang XF, Reiter MK. WRAPS: Denial-of-service defense through web referrals. In: Proceedings of the IEEE Symposium on Reliable Distributed Systems. 2006. p. 51u201360.
- Perng G, Reiter MK, Wang C. M2: Multicasting mixes for efficient and anonymous communication. In: Proceedings - International Conference on Distributed Computing Systems. 2006.
- Wang X, Li Z, Xu J, Reiter MK, Kil C, Choi JY. Packet vaccine: Black-box exploit detection and signature generation. In: Proceedings of the ACM Conference on Computer and Communications Security. 2006. p. 37u201346.
- Golovin D, Gupta A, Maggs BM, Oprea F, Reiter MK. Quorum placement in networks: Minimizing network congestion. In: Proceedings of the Annual ACM Symposium on Principles of Distributed Computing. 2006. p. 16u201325.
- Peterson L, Anderson T, Blumenthal D, Casey D, Clark D, Estrin D, et al. GENI design principles. Computer. 2006 Sep 1;39(9):102u20135.
- Perng G, Reiter MK, Wang C. Censorship resistance revisited. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2006. p. 62u201376.
- Collins MP, Reiter MK. Finding peer-to-peer file-sharing using coarse network behaviors. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2006. p. 1u201317.
- Gao D, Reiter MK, Song D. Behavioral distance measurement using Hidden Markov Models. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2006. p. 19u201340.
- Oprea A, Reiter MK. On consistency of encrypted files. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2006. p. 254u201368.
- Garg D, Bauer L, Bowers KD, Pfenning F, Reiter MK. A linear logic of authorization and knowledge. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2006. p. 297u2013312.
- McCune JM, Perrig A, Reiter MK. Bump in the Ether: A framework for securing sensitive user input. In: USENIX 2006 Annual Technical Conference. 2006. p. 185u201398.
- Gao D, Reiter MK, Song D. Behavioral distance for intrusion detection. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2006. p. 63u201381.
- Abd-El-Malek M, Ganger GR, Goodson GR, Reiter MK, Wylie JJ. Fault-scalable Byzantine fault-tolerant services. Operating Systems Review (ACM). 2005 Dec 1;39(5):59u201374.
- Abd-El-Malek M, Ganger GR, Goodson GR, Reiter MK, Wylie JJ. Fault-scalable Byzantine fault-tolerant services. In: Proceedings of the 20th ACM Symposium on Operating Systems Principles, SOSP 2005. 2005. p. 59u201374.
- Reiter MK, Samar A, Wang C. Distributed construction of a fault-tolerant network from a tree. In: Proceedings of the IEEE Symposium on Reliable Distributed Systems. 2005. p. 155u201365.
- Abd-El-Malek M, Ganger GR, Goodson GR, Reiter MK, Wylie JJ. Lazy verification in fault-tolerant distributed storage systems. In: Proceedings of the IEEE Symposium on Reliable Distributed Systems. 2005. p. 179u201390.
- Kearns M, Reiter M. Message from the program chairs. In: Proceedings of the ACM Conference on Electronic Commerce. 2005.
- McCune JM, Perrig A, Reiter MK. Seeing-is-believing: Using camera phones for human-verifiable authentication. In: Proceedings - IEEE Symposium on Security and Privacy. 2005. p. 110u201324.
- Xie Y, Sekar V, Maltz DA, Reiter MK, Zhang H. Worm origin identification using random moonwalks. In: Proceedings - IEEE Symposium on Security and Privacy. 2005. p. 242u201356.
- Bauer L, Garriss S, Reiter MK. Distributed proving in access-control systems. In: Proceedings - IEEE Symposium on Security and Privacy. 2005. p. 81u201395.
- McCune JM, Shi E, Perrig A, Reiter MK. Detection of denial-of-message attacks on sensor network broadcasts. In: Proceedings - IEEE Symposium on Security and Privacy. 2005. p. 64u201378.
- Reiter MK, Wang XF, Wright M. Building reliable mix networks with fair exchange. In: Lecture Notes in Computer Science. 2005. p. 378u201392.
- Gupta A, Maggs BM, Oprea F, Reiter MK. Quorum placement in networks to minimize access delays. In: Proceedings of the Annual ACM Symposium on Principles of Distributed Computing. 2005. p. 87u201396.
- Oprea A, Reiter MK, Yang K. Space-Efficient Block Storage Integrity. In: Proceedings of the Symposium on Network and Distributed System Security, NDSS 2005. 2005.
- Reiter M. Security by, and for, converged mobile devices. In: Lecture Notes in Computer Science. 2005. p. 1.
- Bauer L, Garriss S, McCune JM, Reiter MK, Rouse J, Rutenbar P. Device-enabled authorization in the grey system. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2005. p. 431u201345.
- Fry CP, Reiter MK. Nested objects in a Byzantine quorum-replicated system. In: Proceedings of the IEEE Symposium on Reliable Distributed Systems. 2004. p. 79u201389.
- Reiter M, Rohatgi P. Homeland security. IEEE Internet Computing. 2004 Nov 1;8(6):16u20137.
- Collins M, Reiter MK. An empirical analysis of target-resident DoS filters. In: Proceedings - IEEE Symposium on Security and Privacy. 2004. p. 103u201314.
- Gao D, Reiter MK, Song D. On gray-box program tracking for anomaly detection. In: Proceedings of the 13th USENIX Security Symposium. 2004.
- Davis D, Monrose F, Reiter MK. On user choice in graphical password schemes. In: Proceedings of the 13th USENIX Security Symposium. 2004.
- Kissner L, Oprea A, Reiter MK, Song D, Yang K. Private keyword-based push and pull with applications to anonymous communication extended abstract. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2004 Jan 1;3089:16u201330.
- Wang X, Reiter MK. Mitigating bandwidth-exhaustion attacks using congestion puzzles. In: Proceedings of the ACM Conference on Computer and Communications Security. 2004. p. 257u201367.
- Goodson GR, Wylie JJ, Ganger GR, Reiter MK. Efficient Byzantine-tolerant erasure-coded storage. In: Proceedings of the International Conference on Dependable Systems and Networks. 2004. p. 135u201344.
- Reiter MK, Wang X. Fragile mixing. In: Proceedings of the ACM Conference on Computer and Communications Security. 2004. p. 227u201335.
- Davis D, Monrose F, Reiter MK. Time-scoped searching of encrypted audit logs. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2004 Jan 1;3269:532u201345.
- MacKenzie P, Reiter MK, Yang K. Alternatives to non-malleability: Definitions, constructions, and applications (extended abstract). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2004 Jan 1;2951:171u201390.
- Xie Y, Kim HA, Ou2019Hallaron DR, Reiter MK, Zhang H. Seurat: A pointillist approach to anomaly detection. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2004 Jan 1;3224:238u201357.
- Levine BN, Reiter MK, Wang C, Wright M. Timing attacks in low-latency mix systems (Extended Abstract). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2004 Jan 1;3110:251u201365.
- MacKenzie P, Reiter MK. Delegation of cryptographic servers for capture-resilient devices. Distributed Computing. 2003 Dec 1;16(4):307u201327.
- Reiter MK, Samar A, Wang C. The design and implementation of a JCA-compliant capture protection infrastructure. In: Proceedings of the IEEE Symposium on Reliable Distributed Systems. 2003. p. 339u201348.
- Wang XF, Reiter MK. Defending against denial-of-service attacks with puzzle auctions. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 2003. p. 78u201392.
- Malkhi D, Mansour Y, Reiter MK. Diffusion without false rumors: On propagating updates in a Byzantine environment. Theoretical Computer Science. 2003 Apr 18;299(1u20133):289u2013306.
- Malkhi D, Merritt M, Reiter MK, Taubenfeld G. Objects shared by Byzantine processes. Distributed Computing. 2003 Feb 1;16(1):37u201348.
- Wang XF, Reiter MK. Defending against denial-of-service attacks with puzzle auctions. In: Proceedings - IEEE Symposium on Security and Privacy. 2003. p. 78u201392.
- MacKenzie P, Oprea A, Reiter MK. Automatic generation of two-party computations. In: Proceedings of the ACM Conference on Computer and Communications Security. 2003. p. 210u20139.
- Felber P, Reiter MK. Advanced concurrency control in Java. Concurrency and Computation: Practice and Experience. 2002 Apr 10;14(4):261u201385.
- Monrose F, Reiter MK, Li Q, Lopresti DP, Shih C. Toward speech-generated cryptographic keys on resource constrained devices. In: Proceedings of the 11th USENIX Security Symposium. 2002.
- Xie Y, Ou2019Hallaron D, Reiter MK. A secure distributed search system. In: Proceedings of the IEEE International Symposium on High Performance Distributed Computing. 2002. p. 321u201330.
- Jakobsson M, Reiter MK. Discouraging software piracy using software aging. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2002. p. 1u201312.
- Malkhi D, Reiter MK, Wool A, Wright RN. Probabilistic quorum systems. Information and Computation. 2001 Nov 1;170(2):184u2013206.
- Alvisi L, Malkhi D, Pierce E, Reiter MK. Fault detection for Byzantine quorum systems. IEEE Transactions on Parallel and Distributed Systems. 2001 Sep 1;12(9):996u20131007.
- Monrose F, Reiter MK, Li Q, Wetzel S. Using voice to generate cryptographic keys. In: 2001: A Speaker Odyssey - The Speaker Recognition Workshop. 2001. p. 237u201342.
- Samarati P, Reiter MK, Jajodia S. An Authorization Model for a Public Key Management Service. ACM Transactions on Information and System Security. 2001 Jan 1;4(4):453u201382.
- Malkhi D, Reiter MK, Tulone D, Ziskind E. Persistent objects in the Fleet system. In: Proceedings - DARPA Information Survivability Conference and Exposition II, DISCEX 2001. 2001. p. 126u201336.
- Chockler G, Malkhi D, Reiter MK. Backoff protocols for distributed mutual exclusion and ordering. In: Proceedings - International Conference on Distributed Computing Systems. 2001. p. 11u201320.
- Malkhi D, Rodeh O, Reiter MK, Sella Y. Efficient update diffusion in Byzantine environments. Proceedings of the IEEE Symposium on Reliable Distributed Systems. 2001 Jan 1;90u20138.
- MacKenzie P, Reiter MK. Two-party generation of DSA signatures. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2001. p. 137u201354.
- De Prisco R, Malkhi D, Reiter M. On k-set consensus problems in asynchronous systems. IEEE Transactions on Parallel and Distributed Systems. 2001 Jan 1;12(1):7u201321.
- Canetti R, Ishai Y, Kumar R, Reiter MK, Rubinfeld R, Wright RN. Selective private function evaluation with applications to private statistics. In: Proceedings of the Annual ACM Symposium on Principles of Distributed Computing. 2001. p. 293u2013302.
- MacKenzie P, Reiter MK. Networked cryptographic devices resilient to capture. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 2001. p. 12u201325.
- MacKenzie P, Reiter MK. Delegation of cryptographic servers for capture-resilient devices. In: Proceedings of the ACM Conference on Computer and Communications Security. 2001. p. 10u20139.
- Monrose F, Reiter MK, Li Q, Wetzel S. Cryptographic key generation from voice. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 2001. p. 202u201313.
- Malkhi D, Reiter MK. An architecture for survivable coordination in large distributed systems. IEEE Transactions on Knowledge and Data Engineering. 2000 Dec 1;12(2):187u2013202.
- Adams C, Burmester M, Desmedt Y, Reiter M, Zimmermann P. Which PKI (Public Key Infrastructure) is the right one? In: Proceedings of the ACM Conference on Computer and Communications Security. 2000. p. 98u2013101.
- Alvisi L, Malkhi D, Pierce E, Reiter MK, Wright RN. Dynamic byzantine quorum systems. In: Proceedings of the 2002 International Conference on Dependable Systems and Networks. 2000. p. 283u201392.
- Arlein RM, Jai B, Jakobsson M, Monrose F, Reiter MK. Privacy-preserving global customization. In: EC 2000 - Proceedings of the 2nd ACM Conference on Electronic Commerce. 2000. p. 176u201384.
- Malkhi D, Reiter MK, Wool A. Load and availability of Byzantine quorum systems. SIAM Journal on Computing. 2000 Apr 1;29(6):1889u2013906.
- Malkhi D, Merritt M, Reiter M, Taubenfeldt G. Objects shared by byzantine processes. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2000. p. 345u201359.
- Malkhi D, Mansour Y, Reiter MK. On diffusing updates in a Byzantine environment. In: Proceedings of the IEEE Symposium on Reliable Distributed Systems. 1999. p. 134u201343.
- Malkhi D, Mansour Y, Reiter M. On Propagating Updates in a Byzantine Environment. 1999 Aug.
- Anupam V, Mayer A, Nissim K, Pinkas B, Reiter MK. On the security of pay-per-click and other Web advertising schemes. Computer Networks. 1999 May 17;31(11):1091u2013100.
- Reiter MK, Stubblebine SG. Authentication Metric Analysis and Design. ACM Transactions on Information and System Security. 1999 May 1;2(2):138u201358.
- Monrose F, Reiter MK, Wetzel S. Password hardening based on keystroke dynamics. In: Proceedings of the ACM Conference on Computer and Communications Security. 1999. p. 73u201382.
- Alvisi L, Malkhi D, Pierce E, Reiter M. Fault detection for Byzantine quorum systems. In: Dependable Computing for Critical Applications 7. 1999. p. 379u201394.
- Jermyn I, Mayer A, Monrose F, Reiter MK, Rubin AD. The design and analysis of graphical passwords. In: 8th USENIX Security Symposium. 1999.
- Reiter MK, Rubin AD. Anonymous web transactions with crowds. Communications of the ACM. 1999 Jan 1;42(2):32u20138.
- De Prisco R, Malkhi D, Reiter MK. On k-set consensus problems in asynchronous systems. Proceedings of the Annual ACM Symposium on Principles of Distributed Computing. 1999 Jan 1;257u201365.
- Malkhi D, Reiter MK. Secure and scalable replication in Phalanx. In: Proceedings of the IEEE Symposium on Reliable Distributed Systems. 1998. p. 51u20138.
- Malkhi D, Reiter MK. Survivable consensus objects. In: Proceedings of the IEEE Symposium on Reliable Distributed Systems. 1998. p. 271u20139.
- Reiter MK, Anupam V, Mayer A. Detecting hit shaving in click-Through payment schemes. In: Proceedings of the 3rd USENIX Workshop on Electronic Commerce, EC 1998. 1998.
- Reiter MK, Stubblebine SG. Resilient authentication using path independence. IEEE Transactions on Computers. 1998 Jan 1;47(12):1351u201362.
- Malkhi D, Reiter M. Byzantine quorum systems. Distributed Computing. 1998 Jan 1;11(4):203u201313.
- Malkhi D, Reiter MK, Rubin AD. Secure execution of Java applets using a remote playground. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 1998. p. 40u201351.
- Malkhi D, Reiter M. High-throughput secure reliable multicast protocol. Journal of Computer Security. 1997 Jan 1;5(2):113u201327.
- Malkhi D, Reiter M. Unreliable intrusion detection in distributed computations. In: Proceedings - IEEE Computer Security Foundations Symposium. 1997. p. 116u201324.
- Reiter MK, Stubblebine SG. Path independence for authentication in large-scale systems. In: Proceedings of the ACM Conference on Computer and Communications Security. 1997. p. 57u201366.
- Malkhi D, Reiter M. Unreliable intrusion detection in distributed computations. In: Proceedings of the Computer Security Foundations Workshop. 1997. p. 116u201324.
- Malkhi D, Reiter M, Wright R. Probabilistic quorum systems. In: Proceedings of the Annual ACM Symposium on Principles of Distributed Computing. 1997. p. 267u201373.
- Reiter MK, Stubblebine SG. Toward acceptable metrics of authentication. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 1997. p. 10u201320.
- Malkhi D, Reiter M. Byzantine quorum systems. In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing. 1997. p. 569u201378.
- Franklin MK, Reiter MK. Fair exchange with a semi-trusted third party. In: Proceedings of the ACM Conference on Computer and Communications Security. 1997. p. 1u20135.
- Malkhi D, Reiter M, Wool A. Load and availability of Byzantine quorum systems. In: Proceedings of the Annual ACM Symposium on Principles of Distributed Computing. 1997. p. 249u201357.
- Reiter MK. A secure group membership protocol. IEEE Transactions on Software Engineering. 1996 Dec 1;22(1):31u201342.
- Franklin MK, Reiter MK. The design and implementation of a secure auction service. IEEE Transactions on Software Engineering. 1996 Dec 1;22(5):302u201312.
- Coppersmith D, Franklin M, Patarin J, Reiter M. Low-exponent RSA with related messages. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1996. p. 1u20139.
- Reiter MK, Franklin MK, Lacy JB, Wright RN. u03a9 key management service. In: Proceedings of the ACM Conference on Computer and Communications Security. 1996. p. 38u201347.
- Reiter MK, Franklin MK, Lacy JB, Wright RN. u03a9 key management service. Journal of Computer Security. 1996 Jan 1;4(4):267u201387.
- Malki D, Reiter M. High-throughput secure reliable multicast protocol. In: Proceedings of the Computer Security Foundations Workshop. 1996. p. 9u201317.
- Reiter MK. Distributing Trust with the Rampart Toolkit. Communications of the ACM. 1996 Jan 1;39(4):71u20134.
- Reiter MK. The Rampart toolkit for building high-integrity services. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1995. p. 99u2013110.
- Franklin MK, Reiter MK. Design and implementation of a secure auction service. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 1995. p. 2u201314.
- Franklin MK, Reiter MK. Verifiable signature sharing. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1995. p. 50u201363.
- Reiter MK. Secure agreement protocols: Reliable and atomic group multicast in Rampart. In: Proceedings of the ACM Conference on Computer and Communications Security. 1994. p. 68u201380.
- Reiter MK, Birman KP, van Renesse R. A Security Architecture for Fault-Tolerant Systems. ACM Transactions on Computer Systems (TOCS). 1994 Jan 11;12(4):340u201371.
- Reiter MK, Birman KP. How to Securely Replicate Services. ACM Transactions on Programming Languages and Systems (TOPLAS). 1994 Jan 5;16(3):986u20131009.
- Reiter MK. Secure group membership protocol. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 1994. p. 175u201389.
- Blaze M, Lacy J, London T, Reiter M. Issues and Mechanisms for Trustworthy Systems: Creating Transparent Mistrust. AT&T Technical Journal. 1994 Jan 1;73(5):30u20139.
- Reiter M, Gong L. Preventing denial and forgery of causal relationships in distributed systems. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 1993. p. 30u201340.
- Reiter M, Birman K, Gong L. Integrating security in a group oriented distributed system. In: Proceedings of the Symposium on Security and Privacy. 1992. p. 18u201332.
In The News
- AI is the Biggest Cybersecurity Question Mark. Is It Also the Answer? (Nov 12, 2024 | Pratt School of Engineering)
- The Growing Role of Computation in Science (Feb 9, 2022 | Duke Research Blog)
- Duke Awards 22 Distinguished Professorships (Jun 28, 2021 | )