
Michael K. Reiter
Person information
- affiliation: Carnegie Mellon University, Pittsburgh, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [i22]Sravya Yandamuri, Ittai Abraham, Kartik Nayak, Michael K. Reiter:
Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption. IACR Cryptol. ePrint Arch. 2021: 184 (2021) - 2020
- [j51]Zeyu Mi
, Haibo Chen
, Yinqian Zhang, Shuanghe Peng, Xiaofeng Wang, Michael K. Reiter
:
CPU Elasticity to Mitigate Cross-VM Runtime Monitoring. IEEE Trans. Dependable Secur. Comput. 17(5): 1094-1108 (2020) - [c195]Isaac Polinsky, Kyle Martin, William Enck, Michael K. Reiter:
n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications. CODASPY 2020: 235-246 - [c194]Christopher M. Bender, Yang Li, Yifeng Shi, Michael K. Reiter, Junier Oliva:
Defense Through Diverse Directions. ICML 2020: 756-766 - [c193]Qiuyu Xiao, Brittany Subialdea, Lujo Bauer, Michael K. Reiter:
Metering Graphical Data Leakage with Snowman. SACMAT 2020: 1-12 - [c192]Ke Coby Wang, Michael K. Reiter:
Detecting Stuffing of a User's Credentials at Her Own Accounts. USENIX Security Symposium 2020: 2201-2218 - [i21]Christopher M. Bender, Yang Li, Yifeng Shi, Michael K. Reiter, Junier B. Oliva:
Defense Through Diverse Directions. CoRR abs/2003.10602 (2020) - [i20]Iffat Anjum, Mu Zhu, Isaac Polinsky, William Enck, Michael K. Reiter, Munindar P. Singh:
Role-Based Deception in Enterprise Networks. CoRR abs/2008.02979 (2020)
2010 – 2019
- 2019
- [j50]Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer
, Michael K. Reiter:
A General Framework for Adversarial Examples with Objectives. ACM Trans. Priv. Secur. 22(3): 16:1-16:30 (2019) - [c191]Soumya Basu, Alin Tomescu, Ittai Abraham, Dahlia Malkhi, Michael K. Reiter, Emin Gün Sirer:
Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols. CCS 2019: 2387-2402 - [c190]Guy Golan-Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael K. Reiter, Dragos-Adrian Seredinschi, Orr Tamir, Alin Tomescu:
SBFT: A Scalable and Decentralized Trust Infrastructure. DSN 2019: 568-580 - [c189]Sheng Liu, Theophilus A. Benson, Michael K. Reiter:
Efficient and Safe Network Updates with Suffix Causal Consistency. EuroSys 2019: 23:1-23:15 - [c188]Ke Coby Wang, Michael K. Reiter:
How to End Password Reuse on the Web. NDSS 2019 - [c187]Xiaokuan Zhang, Jihun Hamm, Michael K. Reiter, Yinqian Zhang:
Statistical Privacy for Streaming Traffic. NDSS 2019 - [c186]Maofan Yin, Dahlia Malkhi, Michael K. Reiter, Guy Golan-Gueta, Ittai Abraham:
HotStuff: BFT Consensus with Linearity and Responsiveness. PODC 2019: 347-356 - [i19]Isaac Polinsky, Kyle Martin, William Enck, Michael K. Reiter:
n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications. CoRR abs/1910.08648 (2019) - [i18]Mahmood Sharif, Lujo Bauer, Michael K. Reiter:
n-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers. CoRR abs/1912.09059 (2019) - [i17]Mahmood Sharif, Keane Lucas, Lujo Bauer, Michael K. Reiter, Saurabh Shintre:
Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection. CoRR abs/1912.09064 (2019) - [i16]Ke Coby Wang, Michael K. Reiter:
Detecting stuffing of a user's credentials at her own accounts. CoRR abs/1912.11118 (2019) - [i15]Adam Humphries, Kartik Cating-Subramanian, Michael K. Reiter:
TASE: Reducing latency of symbolic execution with transactional memory. CoRR abs/1912.12363 (2019) - 2018
- [c185]Sisi Duan, Michael K. Reiter, Haibin Zhang:
BEAT: Asynchronous BFT Made Practical. CCS 2018: 2028-2041 - [c184]Victor Heorhiadi, Sanjay Chandrasekaran, Michael K. Reiter, Vyas Sekar:
Intent-driven composition of resource-management SDN applications. CoNEXT 2018: 86-97 - [c183]Mahmood Sharif, Lujo Bauer, Michael K. Reiter:
On the Suitability of Lp-Norms for Creating and Preventing Adversarial Examples. CVPR Workshops 2018: 1605-1613 - [c182]Guoxing Chen, Ten-Hwang Lai, Michael K. Reiter, Yinqian Zhang:
Differentially Private Access Patterns for Searchable Symmetric Encryption. INFOCOM 2018: 810-818 - [c181]Ziqiao Zhou, Zhiyun Qian
, Michael K. Reiter, Yinqian Zhang:
Static Evaluation of Noninterference Using Approximate Model Counting. IEEE Symposium on Security and Privacy 2018: 514-528 - [i14]Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter:
Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition. CoRR abs/1801.00349 (2018) - [i13]Mahmood Sharif, Lujo Bauer, Michael K. Reiter:
On the Suitability of Lp-norms for Creating and Preventing Adversarial Examples. CoRR abs/1802.09653 (2018) - [i12]Guy Golan-Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael K. Reiter, Dragos-Adrian Seredinschi, Orr Tamir, Alin Tomescu:
SBFT: a Scalable Decentralized Trust Infrastructure for Blockchains. CoRR abs/1804.01626 (2018) - [i11]Ke Coby Wang, Michael K. Reiter:
How to end password reuse on the web. CoRR abs/1805.00566 (2018) - [i10]Chenglu Jin, Marten van Dijk, Michael K. Reiter, Haibin Zhang:
PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion. IACR Cryptol. ePrint Arch. 2018: 1171 (2018) - 2017
- [j49]Jay Aikat, Aditya Akella, Jeffrey S. Chase, Ari Juels, Michael K. Reiter, Thomas Ristenpart, Vyas Sekar, Michael M. Swift:
Rethinking Security in the Era of Cloud Computing. IEEE Secur. Priv. 15(3): 60-69 (2017) - [j48]Qatrunnada Ismail, Tousif Ahmed, Kelly Caine, Apu Kapadia, Michael K. Reiter:
To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps' Privacy Permission Settings. Proc. Priv. Enhancing Technol. 2017(4): 119-137 (2017) - [j47]Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang:
Personalized Pseudonyms for Servers in the Cloud. Proc. Priv. Enhancing Technol. 2017(4): 271-289 (2017) - [c180]Sanchuan Chen, Xiaokuan Zhang, Michael K. Reiter, Yinqian Zhang:
Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu. AsiaCCS 2017: 7-18 - [c179]Sisi Duan, Michael K. Reiter, Haibin Zhang:
Secure Causal Atomic Broadcast, Revisited. DSN 2017: 61-72 - [c178]Weijie Liu, Debin Gao
, Michael K. Reiter:
On-Demand Time Blurring to Support Side-Channel Defense. ESORICS (2) 2017: 210-228 - [c177]Sheng Liu, Michael K. Reiter, Vyas Sekar:
Flow Reconnaissance via Timing Attacks on SDN Switches. ICDCS 2017: 196-206 - [c176]Andrew Chi, Robert A. Cochran, Marie Nesfield, Michael K. Reiter, Cynthia Sturton:
A System to Verify Network Behavior of Known Cryptographic Clients. NSDI 2017: 177-195 - 2016
- [c175]Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang:
A Software Approach to Defeating Side Channels in Last-Level Caches. CCS 2016: 871-882 - [c174]Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer
, Michael K. Reiter:
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition. CCS 2016: 1528-1540 - [c173]Elli Androulaki, Michael K. Reiter:
CCSW'16: 8th ACM Cloud Computing Security Workshop. CCS 2016: 1882-1883 - [c172]Jassim Aljuraidan, Lujo Bauer, Michael K. Reiter, Matthias Beckerle:
Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational Workers. Financial Cryptography 2016: 60-77 - [c171]Victor Heorhiadi, Shriram Rajagopalan, Hani Jamjoom, Michael K. Reiter, Vyas Sekar:
Gremlin: Systematic Resilience Testing of Microservices. ICDCS 2016: 57-66 - [c170]Victor Heorhiadi, Michael K. Reiter, Vyas Sekar:
Simplifying Software-Defined Network Optimization Using SOL. NSDI 2016: 223-237 - [c169]Jay Aikat, Michael K. Reiter, Kevin Jeffay:
Education Modules for Networking, Cloud Computing, and Security in Systems Courses. SIGCSE 2016: 400 - [c168]Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Stealing Machine Learning Models via Prediction APIs. USENIX Security Symposium 2016: 601-618 - [e4]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Elli Androulaki, Michael K. Reiter:
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, CCSW 2016, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4572-9 [contents] - [i9]Andrew Chi, Robert A. Cochran, Marie Nesfield, Michael K. Reiter, Cynthia Sturton:
Server-side verification of client behavior in cryptographic protocols. CoRR abs/1603.04085 (2016) - [i8]Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang:
A software approach to defeating side channels in last-level caches. CoRR abs/1603.05615 (2016) - [i7]Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Stealing Machine Learning Models via Prediction APIs. CoRR abs/1609.02943 (2016) - 2015
- [j46]Lei Wei, Michael K. Reiter:
Toward practical encrypted email that supports private, regular-expression searches. Int. J. Inf. Sec. 14(5): 397-416 (2015) - [c167]Mehrdad Moradi, Feng Qian, Qiang Xu, Zhuoqing Morley Mao, Darrell Bethea, Michael K. Reiter:
Caesar: High-Speed and Memory-Efficient Forwarding Engine for Future Internet Architecture. ANCS 2015: 171-182 - [c166]Michael K. Reiter:
Side Channels in Multi-Tenant Environments. CCSW 2015: 1 - [c165]Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang:
Mitigating Storage Side Channels Using Statistical Privacy Mechanisms. CCS 2015: 1582-1594 - [c164]Soo-Jin Moon, Vyas Sekar, Michael K. Reiter:
Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration. CCS 2015: 1595-1606 - [c163]Qatrunnada Ismail, Tousif Ahmed
, Apu Kapadia, Michael K. Reiter:
Crowdsourced Exploration of Security Configurations. CHI 2015: 467-476 - [c162]Darrell Bethea, Michael K. Reiter, Feng Qian, Qiang Xu, Zhuoqing Morley Mao:
WACCO and LOKO: Strong Consistency at Global Scale. CIC 2015: 130-141 - [c161]Peng Li, Debin Gao
, Michael K. Reiter:
Replica Placement for Availability in the Worst Case. ICDCS 2015: 599-608 - [c160]Sarah J. Andrabi, Michael K. Reiter, Cynthia Sturton:
Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices. SOUPS 2015: 89-102 - [i6]Victor Heorhiadi, Michael K. Reiter, Vyas Sekar:
Accelerating the Development of Software-Defined Network Optimization Applications Using SOL. CoRR abs/1504.07704 (2015) - 2014
- [j45]Hye-Chung Kum, Ashok K. Krishnamurthy, Ashwin Machanavajjhala, Michael K. Reiter, Stanley C. Ahalt:
Privacy preserving interactive record linkage (PPIRL). J. Am. Medical Informatics Assoc. 21(2): 212-220 (2014) - [j44]Peng Li, Debin Gao
, Michael K. Reiter:
StopWatch: A Cloud Architecture for Timing Channel Mitigation. ACM Trans. Inf. Syst. Secur. 17(2): 8:1-8:28 (2014) - [c159]Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Cross-Tenant Side-Channel Attacks in PaaS Clouds. CCS 2014: 990-1003 - [c158]Ting-Fang Yen, Victor Heorhiadi, Alina Oprea, Michael K. Reiter, Ari Juels:
An Epidemiological Study of Malware Encounters in a Large Enterprise. CCS 2014: 1117-1130 - [c157]Alana Libonati, Kelly Caine, Apu Kapadia, Michael K. Reiter:
Defending against device theft with human notarization. CollaborateCom 2014: 8-17 - [c156]Michelle L. Mazurek, Yuan Liang, William Melicher, Manya Sleeper, Lujo Bauer, Gregory R. Ganger, Nitin Gupta, Michael K. Reiter:
Toward strong, usable access control for shared distributed data. FAST 2014: 89-103 - [c155]Victor Heorhiadi, Seyed Kaveh Fayaz, Michael K. Reiter, Vyas Sekar:
SNIPS: A Software-Defined Approach for Scaling Intrusion Prevention Systems via Offloading. ICISS 2014: 9-29 - 2013
- [c154]Hye-Chung Kum, Ashok K. Krishnamurthy, Darshana Pathak, Michael K. Reiter, Stanley C. Ahalt:
Secure Decoupled Linkage (SDLink) system for building a social genome. IEEE BigData 2013: 7-11 - [c153]Yinqian Zhang, Michael K. Reiter:
Düppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud. CCS 2013: 827-838 - [c152]Seyed Kaveh Fayazbakhsh, Michael K. Reiter, Vyas Sekar:
Verifiable network function outsourcing: requirements, challenges, and roadmap. HotMiddlebox@CoNEXT 2013: 25-30 - [c151]Peng Li, Debin Gao
, Michael K. Reiter:
Mitigating access-driven timing channels in clouds using StopWatch. DSN 2013: 1-12 - [c150]Lei Wei, Michael K. Reiter:
Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud. ESORICS 2013: 147-163 - [c149]Robert A. Cochran, Michael K. Reiter:
Toward Online Verification of Client Behavior in Distributed Applications. NDSS 2013 - [c148]Lujo Bauer
, Lorrie Faith Cranor
, Saranga Komanduri, Michelle L. Mazurek, Michael K. Reiter, Manya Sleeper, Blase Ur:
The post anachronism: the temporal dimension of facebook privacy. WPES 2013: 1-12 - 2012
- [j43]Scott E. Coull, Andrew M. White, Ting-Fang Yen, Fabian Monrose, Michael K. Reiter:
Understanding domain registration abuses. Comput. Secur. 31(7): 806-815 (2012) - [j42]Attila Altay Yavuz, Peng Ning, Michael K. Reiter:
BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems. ACM Trans. Inf. Syst. Secur. 15(2): 9:1-9:28 (2012) - [j41]Michael Abd-El-Malek, Matthew Wachs, James Cipar, Karan Sanghi, Gregory R. Ganger, Garth A. Gibson
, Michael K. Reiter:
File system virtual appliances: Portable file system implementations. ACM Trans. Storage 8(3): 9:1-9:26 (2012) - [c147]Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Cross-VM side channels and their use to extract private keys. CCS 2012: 305-316 - [c146]Peter F. Klemperer, Yuan Liang, Michelle L. Mazurek, Manya Sleeper, Blase Ur, Lujo Bauer
, Lorrie Faith Cranor
, Nitin Gupta, Michael K. Reiter:
Tag, you can see it!: using tags for access control in photo sharing. CHI 2012: 377-386 - [c145]Lujo Bauer
, Yuan Liang, Michael K. Reiter, Chad Spensky:
Discovering access-control misconfigurations: new approaches and evaluation methodologies. CODASPY 2012: 95-104 - [c144]Victor Heorhiadi, Michael K. Reiter, Vyas Sekar:
New opportunities for load balancing in network-wide intrusion detection systems. CoNEXT 2012: 361-372 - [c143]Lei Wei, Michael K. Reiter:
Third-Party Private DFA Evaluation on Encrypted Files in the Cloud. ESORICS 2012: 523-540 - [c142]Attila Altay Yavuz, Peng Ning, Michael K. Reiter:
Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging. Financial Cryptography 2012: 148-163 - [c141]Vyas Sekar, Norbert Egi, Sylvia Ratnasamy, Michael K. Reiter, Guangyu Shi:
Design and Implementation of a Consolidated Middlebox Architecture. NSDI 2012: 323-336 - [c140]Ting-Fang Yen, Michael K. Reiter:
Revisiting Botnet Models and Their Implications for Takedown Strategies. POST 2012: 249-268 - [c139]Kami Vaniea, Lujo Bauer
, Lorrie Faith Cranor
, Michael K. Reiter:
Out of sight, out of mind: Effects of displaying access-control information near the item it controls. PST 2012: 128-136 - 2011
- [j40]Lujo Bauer
, Scott Garriss, Michael K. Reiter:
Detecting and resolving policy misconfigurations in access-control systems. ACM Trans. Inf. Syst. Secur. 14(1): 2:1-2:28 (2011) - [j39]Yao Liu, Peng Ning, Michael K. Reiter:
False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 14(1): 13:1-13:33 (2011) - [j38]Darrell Bethea, Robert A. Cochran, Michael K. Reiter:
Server-side verification of client behavior in online games. ACM Trans. Inf. Syst. Secur. 14(4): 32:1-32:27 (2011) - [c138]Lei Wei, Scott E. Coull, Michael K. Reiter:
Bounded vector signatures and their applications. AsiaCCS 2011: 277-285 - [c137]Robert W. Reeder, Lujo Bauer
, Lorrie Faith Cranor
, Michael K. Reiter, Kami Vaniea:
More than skin deep: measuring effects of the underlying model on access-control system usability. CHI 2011: 2065-2074 - [c136]Xin Huang, Fabian Monrose, Michael K. Reiter:
Amplifying limited expert input to sanitize large network traces. DSN 2011: 494-505 - [c135]Vyas Sekar, Sylvia Ratnasamy, Michael K. Reiter, Norbert Egi, Guangyu Shi:
The middlebox manifesto: enabling innovation in middlebox deployment. HotNets 2011: 21 - [c134]Alana Libonati, Jonathan M. McCune, Michael K. Reiter:
Usability Testing a Malware-Resistant Input Mechanism. NDSS 2011 - [c133]Yinqian Zhang, Ari Juels, Alina Oprea, Michael K. Reiter:
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis. IEEE Symposium on Security and Privacy 2011: 313-328 - [i5]Lei Wei, Scott E. Coull, Michael K. Reiter:
Bounded Vector Signatures and their Applications. IACR Cryptol. ePrint Arch. 2011: 117 (2011) - 2010
- [j37]XiaoFeng Wang, Michael K. Reiter:
Using Web-Referral Architectures to Mitigate Denial-of-Service Threats. IEEE Trans. Dependable Secur. Comput. 7(2): 203-216 (2010) - [c132]Yinqian Zhang, Fabian Monrose, Michael K. Reiter:
The security of modern password expiration: an algorithmic framework and empirical analysis. CCS 2010: 176-186 - [c131]Michelle L. Mazurek, J. P. Arsenault, Joanna Bresee, Nitin Gupta, Iulia Ion, Christina Johns, Daniel Lee, Yuan Liang, Jenny Olsen, Brandon Salmon, Richard Shay, Kami Vaniea, Lujo Bauer
, Lorrie Faith Cranor
, Gregory R. Ganger, Michael K. Reiter:
Access control for home data sharing: evaluating social acceptability. CHI 2010: 645-654 - [c130]Vyas Sekar, Ravishankar Krishnaswamy, Anupam Gupta, Michael K. Reiter:
Network-wide deployment of intrusion detection and prevention systems. CoNEXT 2010: 18 - [c129]James Hendricks, Shafeeq Sinnamohideen, Gregory R. Ganger, Michael K. Reiter:
Zzyzx: Scalable fault tolerance through Byzantine locking. DSN 2010: 363-372 - [c128]Ting-Fang Yen, Michael K. Reiter:
Are Your Hosts Trading or Plotting? Telling P2P File-Sharing and Bots Apart. ICDCS 2010: 241-252 - [c127]Vyas Sekar, Michael K. Reiter, Hui Zhang:
Revisiting the case for a minimalist approach for network flow monitoring. Internet Measurement Conference 2010: 328-341 - [c126]Lei Wei, Michael K. Reiter, Ketan Mayer-Patel:
Summary-Invisible Networking: Techniques and Defenses. ISC 2010: 210-225 - [c125]Darrell Bethea, Robert A. Cochran, Michael K. Reiter:
Server-side Verification of Client Behavior in Online Games. NDSS 2010 - [c124]Peng Li, Limin Liu, Debin Gao
, Michael K. Reiter:
On Challenges in Evaluating Malware Clustering. RAID 2010: 238-255 - [c123]Michael G. Merideth, Michael K. Reiter:
Selected Results from the Latest Decade of Quorum Systems Research. Replication 2010: 185-206 - [c122]Scott E. Coull, Andrew M. White, Ting-Fang Yen, Fabian Monrose, Michael K. Reiter:
Understanding Domain Registration Abuses. SEC 2010: 68-79
2000 – 2009
- 2009
- [j36]Jonathan M. McCune, Adrian Perrig, Michael K. Reiter:
Seeing-Is-Believing: using camera phones for human-verifiable authentication. Int. J. Secur. Networks 4(1/2): 43-56 (2009) - [j35]Debin Gao
, Michael K. Reiter, Dawn Xiaodong Song:
Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance. IEEE Trans. Dependable Secur. Comput. 6(2): 96-110 (2009) - [c121]Yao Liu, Michael K. Reiter, Peng Ning:
False data injection attacks against state estimation in electric power grids. CCS 2009: 21-32 - [c120]Rui Wang, XiaoFeng Wang, Zhou Li
, Haixu Tang, Michael K. Reiter, Zheng Dong:
Privacy-preserving genomic computation through program specialization. CCS 2009: 338-347 - [c119]Lujo Bauer
, Lorrie Faith Cranor
, Robert W. Reeder, Michael K. Reiter, Kami Vaniea:
Real life challenges in access-control management. CHI 2009: 899-908 - [c118]Ting-Fang Yen, Xin Huang, Fabian Monrose, Michael K. Reiter:
Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications. DIMVA 2009: 157-175 - [c117]Darrell Bethea, Michael K. Reiter:
Data Structures with Unpredictable Timing. ESORICS 2009: 456-471 - [c116]Michael K. Reiter, Vyas Sekar, Chad Spensky, Zhenghao Zhang:
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles. ICISS 2009: 132-147 - [c115]Jonathan M. McCune, Adrian Perrig, Michael K. Reiter:
Safe Passage for Passwords and Other Sensitive Data. NDSS 2009 - [c114]Peng Li, Debin Gao
, Michael K. Reiter:
Automatically Adapting a Trained Anomaly Detector to Software Patches. RAID 2009: 142-160 - [c113]Lujo Bauer
, Limin Jia, Michael K. Reiter, David Swasey:
xDomain: cross-border proofs of access. SACMAT 2009: 43-52 - [c112]Michael G. Merideth, Florian Oprea, Michael K. Reiter:
When and How to Change Quorums on Wide Area Networks. SRDS 2009: 12-21 - 2008
- [j34]XiaoFeng Wang, Michael K. Reiter:
A multi-layer framework for puzzle-based denial-of-service defense. Int. J. Inf. Sec. 7(4): 243-263 (2008) - [j33]XiaoFeng Wang, Zhuowei Li, Jong Youl Choi, Jun Xu, Michael K. Reiter, Chongkyung Kil:
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software. ACM Trans. Inf. Syst. Secur. 12(2): 11:1-11:35 (2008) - [j32]Michael K. Reiter, Asad Samar:
Quiver: Consistent and Scalable Object Sharing for Edge Services. IEEE Trans. Parallel Distributed Syst. 19(7): 878-889 (2008) - [c111]Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri:
How low can you go?: recommendations for hardware-supported minimal TCB code execution. ASPLOS 2008: 14-25 - [c110]Lucas Ballard, Seny Kamara, Fabian Monrose, Michael K. Reiter:
Towards practical biometric key generation with randomized biometric templates. CCS 2008: 235-244 - [c109]