Michael Reiter :: Selected Publications by Forum

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

bibliometrics

A C D E F H I J L M N O P R S T U W
AAAI
ACNS
ACSAC
ANCS
ASIACCS
ASPLOS
C&C
C&S
CCS
CHI
CIC
CODASPY
CollaborateCom
Comp. J.
Comp. Net.
COMSNETS
CoNEXT
CRYPTO
CSF
CV-COPS
DCCA
DIMVA
DISC
DC
DSN
EC (ACM)
EC (Usenix)
ESORICS
Euro S&P
EUROCRYPT
EuroSys
FAST
FC
HotMiddlebox
HotNets
HPC
ICDCS
ICICS
ICISS
ICLR
ICML
ICNP
I&C
IJIS
IJSN
IMC
INFOCOM
INSS
IPDPS
ISC
JCS
JoC
LASER Middleware NDSS
NSDI
OPODIS PACMPL
PoPETS
PODC
POST
PST
RAID S&P
SACMAT
SEC
SOSP
SOUPS
SRDS
STOC
TC
TCC
TCS
TDSC
TISSEC
TKDE
TOCS
TOPLAS
TOPS
TOS
TPDS
TSE
Usenix ATC
Usenix Sec.
WPES


AAAI Conference on Artificial Intelligence (AAAI)
2022 Coordinating followers to reach better equilibria: End-to-end gradient descent for Stackelberg games
K. Wang, L. Xu, A. Perrault, M. K. Reiter, and M. Tambe. doi:10.1609/aaai.v36i5.20457


ACM Asia Conference on Computer and Communications Security (ASIACCS), formerly ACM Symposium on Information, Computer and Communications Security
2021 Malware makeover: Breaking ML-based static analysis by modifying executable bytes
K. Lucas, M. Sharif, L. Bauer, M. K. Reiter, and S. Shintre. doi:10.1145/3433210.3453086
Additional information:   implementation
2017 Detecting privileged side-channel attacks in shielded execution with Déjà Vu
S. Chen, X. Zhang, M. K. Reiter, and Y. Zhang. doi:10.1145/3052973.3053007
2011 Bounded vector signatures and their applications
L. Wei, S. E. Coull and M. K. Reiter. Pages 277–285. doi:10.1145/1966913.1966949   ©ACM


ACM Conference on Computer and Communications Security (CCS)
2022 ENGRAFT: Enclave-guarded Raft on Byzantine faulty nodes
W. Wang, S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. doi:10.1145/3548606.3560639
2019 Efficient verifiable secret sharing with share recovery in BFT protocols
S. Basu, A. Tomescu, I. Abraham, D. Malkhi, M. K. Reiter, and E. G. Sirer. doi:10.1145/3319535.3354207
2018 BEAT: Asynchronous BFT made practical
S. Duan, M. K. Reiter, and H. Zhang. Pages 2028–2041. doi:10.1145/3243734.3243812   ©ACM
2016 A software approach to defeating side channels in last-level caches
Z. Zhou, M. K. Reiter, and Y. Zhang. Pages 871–882. doi:10.1145/2976749.2978324
Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition
M. Sharif, S. Bhagavatula, L. Bauer, and M. K. Reiter. Pages 1528–1540. doi:10.1145/2976749.2978392
Additional information:   implementation
2015 Mitigating storage side channels using statistical privacy mechanisms
Q. Xiao, M. K. Reiter, and Y. Zhang. Pages 1582–1594. doi:10.1145/2810103.2813645
Nomad: Mitigating arbitrary cloud side channels via provider-assisted migration
S.-J. Moon, V. Sekar, and M. K. Reiter. Pages 1595–1606. doi:10.1145/2810103.2813706   ©ACM
2014 Cross-tenant side-channel attacks in PaaS clouds
Y. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart. Pages 990–1003. doi:10.1145/2660267.2660356
An epidemiological study of malware encounters in a large enterprise
T.-F. Yen, V. Heorhiadi, A. Oprea, M. K. Reiter, and A. Juels. Pages 1117–1130. doi:10.1145/2660267.2660330
2013 Düppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud
Y. Zhang and M. K. Reiter. Pages 827–837. doi:10.1145/2508859.2516741   ©ACM
2012 Cross-VM side channels and their use to extract private keys
Y. Zhang, A. Juels, M. K. Reiter and T. Ristenpart. Pages 305–316. doi:10.1145/2382196.2382230   ©ACM
2010 The security of modern password expiration: An algorithmic framework and empirical analysis
Y. Zhang, F. Monrose and M. K. Reiter. Pages 176–186. doi:10.1145/1866307.1866328   ©ACM
2009 False data injection attacks against state estimation in electric power grids
Y. Liu, P. Ning and M. K. Reiter. Pages 21–32. doi:10.1145/1653662.1653666   ©ACM
Additional information:   journal version
Privacy-preserving genomic computation through program specialization
R. Wang, X. Wang, Z. Li, H. Tang, M. K. Reiter and Z. Dong. Pages 338–347. doi:10.1145/1653662.1653703   ©ACM
2008 Towards practical biometric key generation with randomized biometric templates
L. Ballard, S. Kamara, F. Monrose and M. K. Reiter. Pages 235–244. doi:10.1145/1455770.1455801   ©ACM
2006 Packet vaccine: Black-box exploit detection and signature generation
X. Wang, Z. Li, J. Xu, M. K. Reiter, C. Kil and J. Y. Choi. Pages 37–46. doi:10.1145/1180405.1180412   ©ACM
Additional information:   journal version
2004 Fragile mixing
M. K. Reiter and X. Wang. Pages 227–235. doi:10.1145/1030083.1030114   ©ACM
Mitigating bandwidth-exhaustion attacks using congestion puzzles
X. Wang and M. K. Reiter. Pages 257–267. doi:10.1145/1030083.1030118   ©ACM
Additional information:   journal version
Gray-box extraction of execution graphs for anomaly detection
D. Gao, M. K. Reiter and D. Song. Pages 318–329. doi:10.1145/1030083.1030126   ©ACM
2003 Automatic generation of two-party computations
P. MacKenzie, A. Oprea and M. K. Reiter. Pages 210–219. doi:10.1145/948109.948139   ©ACM
2001 Delegation of cryptographic servers for capture-resilient devices
P. MacKenzie and M. K. Reiter. Pages 10–19. doi:10.1145/501983.501986   ©ACM
Additional information:   journal version
1999 Password hardening based on keystroke dynamics
F. Monrose, M. K. Reiter and S. Wetzel. Pages 73–82. doi:10.1145/319709.319720   ©ACM
Additional information:   journal version
1997 Fair exchange with a semi-trusted third party
M. K. Franklin and M. K. Reiter. Pages 1–6. doi:10.1145/266420.266424   ©ACM
Path independence for authentication in large-scale systems
M. K. Reiter and S. G. Stubblebine. Pages 57–66. doi:10.1145/266420.266435   ©ACM
Additional information:   journal version
1996 The Ω key management service
M. K. Reiter, M. K. Franklin, J. B. Lacy and R. N. Wright. Pages 38–47. doi:10.1145/238168.238184   ©ACM
Additional information:   journal version
1994 Secure agreement protocols: Reliable and atomic group multicast in Rampart
M. K. Reiter. Pages 68–80. doi:10.1145/191177.191194   ©ACM


ACM Conference on Data and Application Security and Privacy (CODASPY)
2021 Role-based deception in enterprise networks
I. Anjum, M. Zhu, I. Polinsky, W. Enck, M. K. Reiter, and M. Singh. doi:10.1145/3422337.3447824
2020 n-m-variant systems: Adversarial-resistant software rejuvenation for cloud-based web applications
I. Polinsky, K. Martin, W. Enck, and M. K. Reiter. doi:10.1145/3374664.3375745
2012 Discovering access-control misconfigurations: New approaches and evaluation methodologies
L. Bauer, Y. Liang, M. K. Reiter and C. Spensky. Pages 95–104. doi:10.1145/2133601.2133613   ©ACM


ACM Conference on Electronic Commerce (EC)
2000 Privacy-preserving global customization
R. M. Arlein, B. Jai, M. Jakobsson, F. Monrose and M. K. Reiter. Pages 176–184. doi:10.1145/352871.352891   ©ACM


ACM Conference on Human Factors in Computing Systems (CHI)
2015 Crowdsourced exploration of security configurations
Q. Ismail, T. Ahmed, A. Kapadia, and M. K. Reiter. doi:10.1145/2702123.2702370
2012 Tag, you can see it! Using tags for access control in photo sharing
P. F. Klemperer, Y. Liang, M. L. Mazurek, M. Sleeper, B. Ur, L. Bauer, L. F. Cranor, N. Gupta and M. K. Reiter. Pages 377–386. doi:10.1145/2207676.2207728   ©ACM
2011 More than skin deep: Measuring effects of the underlying model on access-control system usability
R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter and K. Vaniea. Pages 2065–2074. doi:10.1145/1978942.1979243   ©ACM
2010 Access control for home data sharing: Attitudes, needs and practices
M. L. Mazurek, J. P. Arsenault, J. Bresee, N. Gupta, I. Ion, C. Johns, D. Lee, Y. Liang, J. Olsen, B. Salmon, R. Shay, K. Vaniea, L. Bauer, L. F. Cranor, G. R. Ganger, and M. K. Reiter. Pages 645–654. doi:10.1145/1753326.1753421   ©ACM
2009 Real life challenges in access-control management
L. Bauer, L. F. Cranor, R. W. Reeder, M. K. Reiter and K. Vaniea. Pages 899–908. doi:10.1145/1518701.1518838   ©ACM
2008 A user study of policy creation in a flexible access-control system
L. Bauer, L. F. Cranor, R. W. Reeder, M. K. Reiter and K. Vaniea. Pages 543–552. doi:10.1145/1357054.1357143   ©ACM
Expandable grids for visualizing and authoring computer security policies
R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter, K. Bacon, K. How and H. Strong. Pages 1473–1482. doi:10.1145/1357054.1357285   ©ACM


ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS)
2015 Caesar: High-speed and memory-efficient forwarding engine for future Internet architecture
M. Moradi, F. Qian, Q. Xu, Z. M. Mao, D. Bethea, and M. K. Reiter. Pages 171–182. doi:10.1109/ANCS.2015.7110130   ©IEEE


ACM/IFIP International Middleware Conference (Middleware)
2023 EESMR: Energy efficient BFT-SMR for the masses
A. Bhat, A. Bandarupalli, M. Nagaraj, S. Bagchi, A. Kate, and M. K. Reiter doi:10.1145/3590140.3592848


ACM Symposium on Access Control Models and Technologies (SACMAT)
2020 Metering graphical data leakage with Snowman
Q. Xiao, B. Subialdea, L. Bauer, and M. K. Reiter. doi:10.1145/3381991.3395598
2009 xDomain: Cross-border proofs of access
L. Bauer, L. Jia, M. K. Reiter and D. Swasey. Pages 43–52. doi:10.1145/1542207.1542216   ©ACM
2008 Detecting and resolving policy misconfigurations in access-control systems
L. Bauer, S. Garriss and M. K. Reiter. Pages 185–194. doi:10.1145/1377836.1377866   ©ACM
Additional information:   journal version


ACM Symposium on Operating Systems Principles (SOSP)
2007 Low-overhead Byzantine fault-tolerant storage
J. Hendricks, G. R. Ganger and M. K. Reiter. Pages 73–86. doi:10.1145/1294261.1294269   ©ACM
2005 Fault-scalable Byzantine fault-tolerant services
M. Abd-El-Malek, G. R. Ganger, G. R. Goodson, M. K. Reiter and J. J. Wylie. Pages 59–74. doi:10.1145/1095810.1095817   ©ACM


ACM Symposium on Principles of Distributed Computing (PODC)
2019 HotStuff: BFT consensus with linearity and responsiveness
M. Yin, D. Malkhi, M. K. Reiter, G. G. Gueta, and I. Abraham. doi:10.1145/3293611.3331591
Additional information:   implementation   Diem implementation
2007 Verifying distributed erasure-coded data
J. Hendricks, G. R. Ganger and M. K. Reiter. Pages 139–146. doi:10.1145/1281100.1281122   ©ACM
2006 Quorum placement in networks: Minimizing network congestion
D. Golovin, A. Gupta, B. M. Maggs, F. Oprea and M. K. Reiter. Pages 16–25. doi:10.1145/1146381.1146388   ©ACM
2005 Quorum placement in networks to minimize access delays
A. Gupta, B. M. Maggs, F. Oprea and M. K. Reiter. Pages 87–96. doi:10.1145/1073814.1073829   ©ACM
2001 Selective private function evaluation with applications to private statistics
R. Canetti, Y. Ishai, R. Kumar, M. K. Reiter, R. Rubinfeld and R. N. Wright. Pages 293–304. doi:10.1145/383962.384047   ©ACM
1999 On k-set consensus problems in asynchronous systems
R. De Prisco, D. Malkhi and M. K. Reiter. Pages 257–265. doi:10.1145/301308.301368   ©ACM
Additional information:   journal version
1997 The load and availability of Byzantine quorum systems
D. Malkhi, M. Reiter and A. Wool. Pages 249–257. doi:10.1145/259380.259450   ©ACM
Additional information:   journal version
Probabilistic quorum systems
D. Malkhi, M. Reiter and R. Wright. Pages 267–273. doi:10.1145/259380.259458   ©ACM
Addtional information:   journal version


ACM Symposium on Theory of Computing (STOC)
1997 Byzantine quorum systems
D. Malkhi and M. Reiter. Pages 569–578. doi:10.1145/258533.258650   ©ACM
Additional information:   journal version


ACM Transactions on Computer Systems (TOCS)
1994 A security architecture for fault-tolerant systems
M. K. Reiter, K. P. Birman and R. van Renesse. 12(4):340–371. doi:10.1145/195792.195823   ©ACM


ACM Transactions on Information and System Security (TISSEC)
2014 StopWatch: A cloud architecture for timing channel mitigation
P. Li, D. Gao, and M. K. Reiter. 17(2). doi:10.1145/2670940
2011 Server-side verification of client behavior in online games
D. Bethea, R. A. Cochran and M. K. Reiter. 14(4). doi:10.1145/2043628.2043633   ©ACM
Detecting and resolving policy misconfigurations in access-control systems
L. Bauer, S. Garriss and M. K. Reiter. 14(1). doi:10.1145/1952982.1952984   ©ACM
False data injection attacks against state estimation in electric power grids
Y. Liu, P. Ning and M. K. Reiter. 14(1). doi:10.1145/1952982.1952995   ©ACM
2008 Fast and black-box exploit detection and signature generation for commodity software
X. Wang, Z. Li, J. Y. Choi, J. Xu, M. K. Reiter and C. Kil. 12(2). doi:10.1145/1455518.1455523   ©ACM
2001 An authorization model for a public key management service
P. Samarati, M. K. Reiter and S. Jajodia. 4(4):453–482. doi:10.1145/503339.503343   ©ACM
1999 Authentication metric analysis and design
M. K. Reiter and S. G. Stubblebine. 2(2):138–158. doi:10.1145/317087.317088   ©ACM
1998 Crowds: Anonymity for web transactions
M. K. Reiter and A. D. Rubin. 1(1):66–92. doi:10.1145/290163.290168   ©ACM


ACM Transactions on Programming Languages and Systems (TOPLAS)
1994 How to securely replicate services
M. K. Reiter and K. P. Birman. 16(3):986–1009, May 1994. doi:10.1145/177492.177745   ©ACM


ACM Transactions on Privacy and Security (TOPS), formerly TISSEC
2019 A general framework for adversarial examples with objectives
M. Sharif, S. Bhagavatula, L. Bauer, and M. K. Reiter. 22(3), June 2019. doi:10.1145/3317611
Additional information:   implementation


ACM Transactions on Storage (TOS)
2012 File system virtual appliances: Portable file system implementations
M. Abd-El-Malek, M. Wachs, J. Cipar, K. Sanghi, G. R. Ganger, G. A. Gibson and M. K. Reiter. 8(3), September 2012. doi:10.1145/2339118.2339120   ©ACM


ACM Workshop on Hot Topics in Middleboxes and Network Function Virtualization
2013 Verifiable network function outsourcing: Requirements, challenges, and roadmap
S. K. Fayazbakhsh, M. K. Reiter, and V. Sekar. Pages 25–30. doi:10.1145/2535828.2535831  ©ACM


ACM Workshop on Hot Topics in Networks
2011 The middlebox manifesto: Enabling innovation in middlebox deployment
V. Sekar, S. Ratnasamy, M. K. Reiter, N. Egi and G. Shi. doi:10.1145/2070562.2070583  ©ACM
2004 Toward a framework for Internet forensic analysis
V. Sekar, Y. Xie, D. A. Maltz, M. K. Reiter and H. Zhang. ©ACM


ACM Workshop on Privacy in the Electronic Society
2013 The post anachronism: The temporal dimension of Facebook privacy
L. Bauer, L. F. Cranor, S. Komanduri, M. L. Mazurek, M. K. Reiter, M. Sleeper, and B. Ur. Pages 1–12. doi:10.1145/2517840.2517859


Applied Cryptography and Network Security (ACNS)
2005 Building reliable mix networks with fair exchange
M. K. Reiter, X. Wang and M. Wright. Lecture Notes in Computer Science 3531, pages 378–392. doi:10.1007/11496137_26   ©Springer
2004 Private keyword-based push and pull with applications to anonymous communication
L. Kissner, A. Oprea, M. K. Reiter, D. Song and K. Yang. Lecture Notes in Computer Science 3089, pages 16–30.   ©Springer


Annual Computer Security Applications Conference (ACSAC)
2023 Prioritizing remediation of enterprise hosts by malware execution risk
A. Chi, B. Anderson, and M. K. Reiter doi:10.1145/3627106.3627180


The Computer Journal
1995 Securing causal relationships in distributed systems
M. K. Reiter and L. Gong. 38(8):633–642. doi:10.1093/comjnl/38.8.633   ©British Computer Society


Computer Networks
1999 On the security of pay-per-click and other Web advertising schemes
V. Anupam, A. Mayer, K. Nissim, B. Pinkas and M. K. Reiter. 31(11–16):1091–1100. doi:10.1016/S1389-1286(99)00023-7


Computers and Security
2012 Understanding domain registration abuses
S. E. Coull, A. M. White, T.-F. Yen, F. Monrose and M. K. Reiter. 31(7):806–815. doi:10.1016/j.cose.2012.05.005   ©Elsevier Ltd.


Concurrency and Computation: Practice and Experience
2002 Advanced concurrency control in Java
P. Felber and M. K. Reiter. 14(4):261–285. doi:10.1002/cpe.635


Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)
2009 Browser fingerprinting from coarse traffic summaries: Techniques and implications
T.-F. Yen, X. Huang, F. Monrose and M. K. Reiter. Lecture Notes in Computer Science 5587, pages 157–175. doi:10.1007/978-3-642-02918-9_10   ©Springer
2008 Traffic aggregation for malware detection
T.-F. Yen and M. K. Reiter. Lecture Notes in Computer Science 5137, pages 207–227. doi:10.1007/978-3-540-70542-0_11   ©Springer


Conference on Privacy, Security and Trust (PST)
2012 Out of sight, out of mind: Effects of displaying access-control information near the item it controls
K. Vaniea, L. Bauer, L. F. Cranor and M. K. Reiter. Pages 128–136. doi:10.1109/PST.2012.6297929   ©IEEE


CRYPTO
2001 Two party generation of DSA signatures
P. MacKenzie and M. K. Reiter. Lecture Notes in Computer Science 2139, pages 137–154. ©Springer
Additional information:   journal version


Distributed Computing
2003 Objects shared by Byzantine processes
D. Malkhi, M. Merritt, M. K. Reiter and G. Taubenfeld. 16(1)37–48. doi:10.1007/s00446-002-0075-3   ©Springer
Delegation of cryptographic servers for capture-resilient devices
P. MacKenzie and M. K. Reiter. 16(4):307–327. doi:10.1007/s00446-003-0098-4   ©Springer
1998 Byzantine quorum systems
D. Malkhi and M. Reiter. 11(4):203–213. doi:10.1007/s004460050050   ©Springer


EUROCRYPT
1996 Low-exponent RSA with related messages
D. Coppersmith, M. Franklin, J. Patarin and M. Reiter. Lecture Notes in Computer Science 1070, pages 1–9. ©Springer
1995 Verifiable signature sharing
M. K. Franklin and M. K. Reiter. Lecture Notes in Computer Science 921, pages 50–63. ©Springer


European Conference on Computer Systems (EuroSys)
2019 Efficient and safe network updates with suffix causal consistency
S. Liu, T. A. Benson, and M. K. Reiter. doi:10.1145/3302424.3303965
2008 Flicker: An execution infrastructure for TCB minimization
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter and H. Isozaki. Pages 315–328. doi:10.1145/1352592.1352625   ©ACM


European Symposium on Research in Computer Security (ESORICS)
2017 On-demand time blurring to support side-channel defense
W. Liu, D. Gao, and M. K. Reiter. Lecture Notes in Computer Science 10493), pages 210–228. doi:10.1007/978-3-319-66399-9_12   ©Springer
2013 Ensuring file authenticity in private DFA evaluation on encrypted files in the cloud
L. Wei and M. K. Reiter. Lecture Notes in Computer Science 8134, pages 147–163. doi:10.1007/978-3-642-40203-6_9   ©Springer
2012 Third-party private DFA evaluation on encrypted files in the cloud
L. Wei and M. K. Reiter. Lecture Notes in Computer Science 7459, pages 523–540. doi:10.1007/978-3-642-33167-1_30   ©Springer
2009 Data structures with unpredictable timing
D. Bethea and M. K. Reiter. Lecture Notes in Computer Science 5789, pages 456–471. doi:10.1007/978-3-642-04444-1_28   ©Springer
2007 Efficient proving for practical distributed access-control systems
L. Bauer, S. Garriss and M. K. Reiter. Lecture Notes in Computer Science 4734, pages 19–37. doi:10.1007/978-3-540-74835-9_3   ©Springer
2006 Finding peer-to-peer file-sharing using coarse network behaviors
M. P. Collins and M. K. Reiter. Lecture Notes in Computer Science 4189, pages 1–17. doi:10.1007/11863908_1   ©Springer
A linear logic of authorization and knowledge
D. Garg, L. Bauer, K. D. Bowers, F. Pfenning and M. K. Reiter. Lecture Notes in Computer Science 4189, pages 297–312. doi:10.1007/11863908_19   ©Springer


IEEE Computer Security Foundations (CSF)
2023 Optimally hiding object sizes with constrained padding
A. C. Reed and M. K. Reiter. doi:10.1109/CSF57540.2023.00004
1997 Unreliable intrusion detection in distributed computations
D. Malkhi and M. Reiter. Pages 116–124. doi:10.1109/CSFW.1997.596799   ©IEEE
1996 A high-throughput secure reliable multicast protocol
D. Malki and M. Reiter. Pages 9–17. doi:10.1109/CSFW.1996.503686   ©IEEE
Additional information:   journal version


IEEE European Symposium on Security and Privacy (Euro S&P)
2023 Privately evaluating region overlaps with applications to collaborative sensor output validation
A. Chakraborti and M. K. Reiter. doi:10.1109/EuroSP57164.2023.00063   ©IEEE


IEEE International Conference on Collaboration and Internet Computing
2015 WACCO and LOKO: Strong consistency at global scale
D. Bethea, M. K. Reiter, F. Qian, Q. Xu, and Z. M. Mao. Pages 130–141. doi:10.1109/CIC.2015.29   ©IEEE


IEEE International Conference on Collaborative Computing: Network, Applications and Worksharing (CollaborateCom)
2014 Defending against device theft with human notarization
A. Libonati, K. Caine, A. Kapadia, and M. K. Reiter. Pages 8–17. doi:10.4108/icst.collaboratecom.2014.257706   ©ICST


IEEE International Conference on Computer Communications (INFOCOM)
2023 Nimble: Fast and safe migration of network functions
S. Liu, M. K. Reiter, and T. A. Benson. doi:10.1109/INFOCOM53939.2023.10228977   ©IEEE
2018 Differentially private access patterns for searchable symmetric encryption
G. Chen, T.-H. Lai, M. K. Reiter, and Y. Zhang. doi:10.1109/INFOCOM.2018.8486381   ©IEEE


IEEE International Conference on Network Protocols (ICNP)
2006 Forensic analysis for epidemic attacks in federated networks
Y. Xie, V. Sekar, M. K. Reiter and H. Zhang. Pages 43–53. doi:10.1109/ICNP.2006.320197   ©IEEE


IEEE International Conference on Networked Sensing Systems (INSS)
2009 Authenticated data compression in delay tolerant wireless sensor networks
Y.-H. Oh, P. Ning, Y. Liu and M. K. Reiter. Pages 137–144. ©IEEE


IEEE International Parallel and Distributed Processing Symposium (IPDPS)
2008 Self-optimizing distributed trees
M. K. Reiter, A. Samar and C. Wang. doi:10.1109/IPDPS.2008.4536248   ©IEEE


IEEE International Symposium on High Performance Distributed Computing
2002 A secure distributed search system
Y. Xie, D. O'Hallaron and M. K. Reiter. Pages 321–330. doi:10.1109/HPDC.2002.1029932   ©IEEE


IEEE Symposium on Reliable Distributed Systems (SRDS)
2009 When and how to change quorums on wide area networks
M. G. Merideth, F. Oprea and M. K. Reiter. Pages 12–21. doi:10.1109/SRDS.2009.35   ©IEEE
2006 WRAPS: Denial-of-service defense through web referrals
X. Wang and M. K. Reiter. Pages 51–60. doi:10.1109/SRDS.2006.48   ©IEEE
2005 Distributed construction of a fault-tolerant network from a tree
M. K. Reiter, A. Samar and C. Wang. Pages 155–165. doi:10.1109/RELDIS.2005.16   ©IEEE
Lazy verification in fault-tolerant distributed storage systems
M. Abd-El-Malek, G. R. Ganger, G. R. Goodson, M. K. Reiter and J. J. Wylie. Pages 179–190. doi:10.1109/RELDIS.2005.20   ©IEEE
2004 Nested objects in a Byzantine quorum-replicated system
C. P. Fry and M. K. Reiter. Pages 79–89. doi:10.1109/RELDIS.2004.1353005   ©IEEE
2003 The design and implementation of a JCA-compliant capture protection infrastructure
M. K. Reiter, A. Samar and C. Wang. doi:10.1109/RELDIS.2003.1238086   ©IEEE
2001 Efficient update diffusion in Byzantine environments
D. Malkhi, M. K. Reiter, O. Rodeh and Y. Sella. Pages 90–98. doi:10.1109/RELDIS.2001.969758   ©IEEE
1999 On diffusing updates in a Byzantine environment
D. Malkhi, Y. Mansour and M. K. Reiter. Pages 134–143. doi:10.1109/RELDIS.1999.805090   ©IEEE
Additional information:   journal version
1998 Survivable consensus objects
D. Malkhi and M. Reiter. Pages 271–279. doi:10.1109/RELDIS.1998.740509   ©IEEE
Additional information:   journal version
Secure and scalable replication in Phalanx
D. Malkhi and M. Reiter. Pages 51–58. doi:10.1109/RELDIS.1998.740474   ©IEEE


IEEE Symposium on Security and Privacy (S&P)
2018 Static evaluation of noninterference using approximate model counting
Z. Zhou, Z. Qian, M. K. Reiter, and Y. Zhang. Pages 514–528. doi:10.1109/SP.2018.00052
2011 HomeAlone: Co-residency detection in the cloud via side-channel analysis
Y. Zhang, A. Juels, A. Oprea and M. K. Reiter. Pages 313–328. doi:10.1109/SP.2011.31   ©IEEE
2007 Minimal TCB code execution (extended abstract)
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter and A. Seshadri. Pages 267–272. doi:10.1109/SP.2007.27   ©IEEE
2005 Detection of denial-of-message attacks on sensor network broadcasts
J. M. McCune, E. Shi, A. Perrig and M. K. Reiter. Pages 64–78. doi:10.1109/SP.2005.7   ©IEEE
Distributed proving in access-control systems
L. Bauer, S. Garriss and M. K. Reiter. Pages 81–95. doi:10.1109/SP.2005.9   ©IEEE
Seeing-is-believing: Using camera phones for human-verifiable authentication
J. M. McCune, A. Perrig and M. K. Reiter. Pages 110–124. doi:10.1109/SP.2005.19   ©IEEE
Additional information:   journal version
Worm origin identification using random moonwalks
Y. Xie, V. Sekar, D. Maltz, M. K. Reiter and H. Zhang. Pages 242–256. doi:10.1109/SP.2005.23   ©IEEE
2004 An empirical analysis of target-resident DoS filters
M. Collins and M. K. Reiter. Pages 103–114. doi:10.1109/SECPRI.2004.1301318   ©IEEE
2003 Defending against denial-of-service attacks with puzzle auctions
X. Wang and M. K. Reiter. Pages 78–92. doi:10.1109/SECPRI.2003.1199329   ©IEEE
Additional information:   journal version
2001 Networked cryptographic devices resilient to capture
P. MacKenzie and M. K. Reiter. Pages 12–25. doi:10.1109/SECPRI.2001.924284   ©IEEE
Additional information:   journal version
Cryptographic key generation from voice
F. Monrose, M. K. Reiter, Q. Li and S. Wetzel. Pages 202–213, May 2001. doi:10.1109/SECPRI.2001.924299   ©IEEE
1998 Secure execution of Java applets using a remote playground
D. Malkhi, M. Reiter and A. Rubin. Pages 40–51. doi:10.1109/SECPRI.1998.674822   ©IEEE
Additional information:   journal version
1997 Toward acceptable metrics of authentication
M. K. Reiter and S. G. Stubblebine. Pages 10–20. doi:10.1109/SECPRI.1997.601308   ©IEEE
Additional information:   journal version
1995 The design and implementation of a secure auction service
M. K. Franklin and M. K. Reiter. Pages 2–14. doi:10.1109/SECPRI.1995.398918   ©IEEE
Additional information:   journal version
1994 A secure group membership protocol
M. K. Reiter. Pages 176–189. doi:10.1109/RISP.1994.296582   ©IEEE
Additional information:   journal version
1993 Preventing denial and forgery of causal relationships in distributed systems
M. K. Reiter and L. Gong. Pages 30–40. doi:10.1109/RISP.1993.287645   ©IEEE
Additional information:   journal version
1992 Integrating security in a group oriented distributed system
M. K. Reiter, K. P. Birman and L. Gong. Pages 18–32. doi:10.1109/RISP.1992.213273   ©IEEE


IEEE Transactions on Computers (TC)
1998 Resilient authentication using path independence
M. K. Reiter and S. G. Stubblebine. 47(12):1351–1362. doi:10.1109/12.737682   ©IEEE


IEEE Transactions on Dependable and Secure Computing (TDSC)
2009 Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance
D. Gao, M. K. Reiter and D. Song. 6(2):96–110. doi:10.1109/TDSC.2008.39   ©IEEE


IEEE Transactions on Knowledge and Data Engineering (TKDE)
2000 An architecture for survivable coordination in large distributed systems
D. Malkhi and M. K. Reiter. 12(2):187–202. doi:10.1109/69.842262   ©IEEE


IEEE Transactions on Parallel and Distributed Systems (TPDS)
2008 Quiver: Consistent object sharing for edge services
M. K. Reiter and A. Samar. 19(7):878–889. doi:10.1109/TPDS.2007.70790   ©IEEE
2001 On k-set consensus problems in asynchronous systems
R. De Prisco, D. Malkhi and M. K. Reiter. 12(1):7–21. doi:10.1109/71.899936   ©IEEE
Fault detection for Byzantine quorum systems
L. Alvisi, D. Malkhi, E. Pierce and M. K. Reiter. 12(9):996–1007. doi:10.1109/71.954640   ©IEEE


IEEE Transactions on Software Engineering (TSE)
2000 Secure execution of Java applets using a remote playground
D. Malkhi and M. K. Reiter. 26(12):1197–1209. doi:10.1109/32.888632   ©IEEE
1996 A secure group membership protocol
M. K. Reiter. 22(1):31–42. doi:10.1109/32.481515   ©IEEE
The design and implementation of a secure auction service
M. K. Franklin and M. K. Reiter. 22(5):302–312. doi:10.1109/32.502223   ©IEEE


IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
2019 SBFT: A scalable and decentralized trust infrastructure
G. G. Gueta, I. Abraham, S. Grossman, D. Malkhi, B. Pinkas, M. K. Reiter, D.-A. Seredinschi, O. Tamir, and A. Tomescu. doi:10.1109/DSN.2019.00063   ©IEEE
Additional information:   implementation
2013 Mitigating access-driven timing channels in clouds using StopWatch
P. Li, D. Gao, and M. K. Reiter. doi:10.1109/DSN.2013.6575299   ©IEEE
Additional information:   journal version
2011 Amplifying limited expert input to sanitize large network traces
X. Huang, F. Monrose and M. K. Reiter. Pages 494–505. doi:10.1109/DSN.2011.5958262   ©IEEE
2010 Zzyzx: Scalable fault tolerance through Byzantine locking
J. Hendricks, S. Sinnamohideen, G. R. Ganger and M. K. Reiter. Pages 363–372. doi:10.1109/DSN.2010.5544297   ©IEEE
2008 AGIS: Towards automatic generation of infection signatures
Z. Li, X. Wang, Z. Liang and M. K. Reiter. Pages 237–246. doi:10.1109/DSN.2008.4630092   ©IEEE
2007 Minimizing response time for quorum-system protocols over wide-area networks
F. Oprea and M. K. Reiter. Pages 409–418. doi:10.1109/DSN.2007.66   ©IEEE
2006 A multi-resolution approach for worm detection and containment
V. Sekar, Y. Xie, M. K. Reiter and H. Zhang. Pages 189–198. doi:10.1109/DSN.2006.6   ©IEEE
2004 Efficient Byzantine-tolerant erasure-coded storage
G. R. Goodson, J. J. Wylie, G. R. Ganger and M. K. Reiter. doi:10.1109/DSN.2004.1311884   ©IEEE
2000 Dynamic Byzantine quorum systems
L. Alvisi, D. Malkhi, E. Pierce, M. K. Reiter and R. N. Wright. Pages 283–292. doi:10.1109/ICDSN.2000.857551   ©IEEE


IFIP TC-11 International Information Security Conference (SEC)
2010 Understanding domain registration abuses
S. E. Coull, A. M. White, T.-F. Yen, F. Monrose and M. K. Reiter. Pages 68-79. doi:10.1007/978-3-642-15257-3_7   ©Springer
Additional information:   journal version


IFIP Working Conference on Dependable Computing for Critical Applications (DCCA)
1999 Fault detection for Byzantine quorum systems
L. Alvisi, D. Malkhi, L. Pierce and M. K. Reiter. Pages 357–371. doi:10.1109/DCFTS.1999.814307   ©IEEE
Additional information:   journal version


Information and Computation
2001 Probabilistic quorum systems
D. Malkhi, M. K. Reiter, A. Wool and R. N. Wright. 170(2): 184–206. doi:10.1006/inco.2001.3054


Information Security Conference (ISC)
2010 Summary-invisible networking: Techniques and defenses
L. Wei, M. K. Reiter and K. Mayer-Patel. Lecture Notes in Computer Science 6531, pages 210–225. doi:10.1007/978-3-642-18178-8_19   ©Springer
2004 Device-enabled authorization in the Grey system
L. Bauer, S. Garriss, J. M. McCune, M. K. Reiter, J. Rouse, and P. Rutenbar. Lecture Notes in Computer Science 3650, pages 431–445. doi:10.1007/11556992_31   ©Springer


International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
2008 How low can you go? Recommendations for hardware-supported minimal TCB code execution
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter and A. Seshadri. Pages 14–25. doi:10.1145/1346281.1346285   ©ACM


International Conference on Communications and Networks (COMSNETS)
2010 Coordinated sampling sans origin-destination identifiers: Algorithms and analysis
V. Sekar, A. Gupta, M. K. Reiter and H. Zhang. doi:10.1109/COMSNETS.2010.5432011   ©IEEE


International Conference on Distributed Computing Systems (ICDCS)
2017 Flow reconnaissance via timing attacks on SDN switches
S. Liu, M. K. Reiter, and V. Sekar. Pages 196–206. doi:10.1109/ICDCS.2017.281   ©IEEE
2016 Gremlin: Systematic resilience testing of microservices
V. Heorhiadi, S. Rajagopalan, H. Jamjoom, M. K. Reiter, and V. Sekar. Pages 57–66. doi:10.1109/ICDCS.2016.11   ©IEEE
2015 Replica placement for availability in the worst case
P. Li, D. Gao, and M. K. Reiter. Pages 599–608. doi:10.1109/ICDCS.2015.67   ©IEEE
2010 Are your hosts trading or plotting? Telling P2P file-sharing and bots apart
T.-F. Yen and M. K. Reiter. Pages 241–252. doi:10.1109/ICDCS.2010.76   ©IEEE
2006 M2: Multicasting mixes for efficient and anonymous communication
G. Perng, M. K. Reiter and C. Wang. doi:10.1109/ICDCS.2006.53   ©IEEE
2001 Backoff protocols for distributed mutual exclusion and ordering
G. Chockler, D. Malkhi and M. K. Reiter. Pages 11–20. doi:10.1109/ICDSC.2001.918928   ©IEEE


International Conference on Emerging Networking Experiments and Technologies (CoNEXT)
2018 Intent-driven composition of resource-management SDN applications
V. Heorhiadi, S. Chandrasekaran, M. K. Reiter, and V. Sekar. doi:10.1145/3281411.3281431   ©ACM
2012 New opportunities for load balancing in network-wide intrusion detection systems
V. Heorhiadi, M. K. Reiter and V. Sekar. doi:10.1145/2413176.2413218   ©ACM
2010 Network-wide deployment of intrusion detection and prevention systems
V. Sekar, R. Krishnaswamy, A. Gupta and M. K. Reiter. doi:10.1145/1921168.1921192   ©ACM


International Conference on Financial Cryptography and Data Security (FC)
2023 The unique chain rule and its applications
A. Bhat, A. Bandarupalli, S. Bagchi, A. Kate, and M. K. Reiter.
2016 Introducing reputation systems to the economics of outsourcing computations to rational workers
J. Aljuraidan, L. Bauer, M. K. Reiter, and M. Beckerle. ©Springer
2012 Efficient, compromise resilient and append-only cryptographic schemes for secure audit logging
A. A. Yavuz, P. Ning and M. K. Reiter. Lecture Notes in Computer Science 7397, pages 148–163. doi:10.1007/978-3-642-32946-3_12   ©Springer
2004 Timing attacks in low-latency mix systems
B. N. Levine, M. K. Reiter, C. Wang and M. Wright. Lecture Notes in Computer Science 3110, pages 251–265. ©Springer


International Conference on Information and Communications Security (ICICS)
2008 BinHunt: Automatically finding semantic differences in binary programs
D. Gao, M. K. Reiter and D. Song. Lecture Notes in Computer Science 5308, pages 238–255. doi:10.1007/978-3-540-88625-9_16   ©Springer
2004 Time-scoped searching of encrypted audit logs
D. Davis, F. Monrose and M. K. Reiter. Lecture Notes in Computer Science 3269, pages 532–545. ©Springer


International Conference on Information Systems Security
2014 SNIPS: A software-defined approach for scaling intrusion prevention systems via offloading
V. Heorhiadi, S. K. Fayaz, M. K. Reiter, and V. Sekar. Lecture Notes in Computer Science 8880, pages 9–29. doi:10.1007/978-3-319-13841-1_2   ©Springer
2009 Making peer-assisted content distribution robust to collusion using bandwidth puzzles
M. K. Reiter, V. Sekar, C. Spensky and Z. Zhang. Lecture Notes in Computer Science 5905, pages 132–147. doi:10.1007/978-3-642-10772-6_11   ©Springer


International Conference on Learning Representations (ICLR)
2022 Practical integration via separable bijective networks
C. M. Bender, P. Emmanuel, M. K. Reiter, and J. Oliva.


International Conference on Machine Learning (ICML)
2022 Constrained gradient descent: A powerful and principled evasion attack against neural networks
W. Lin, K. Lucas, L. Bauer, M. K. Reiter, and M. Sharif
Additional information:   implementation
2020 Defense through diverse directions
C. M. Bender, Y. Li, Y. Shi, M. K. Reiter, and J. B. Oliva


International Conference on Principles of Distributed Systems (OPODIS)
2022 Communication-efficient BFT using small trusted hardware to tolerate minority corruption
S. Yandamuri, I. Abraham, K. Nayak, and M. K. Reiter. Leibniz International Proceedings in Informatics (LIPIcs) 253. doi:10.4230/LIPIcs.OPODIS.2022.24
2008 Write markers for probabilistic quorum systems
M. G. Merideth and M. K. Reiter. Lecture Notes in Computer Science 5401, pages 5–21. doi:10.1007/978-3-540-92221-6_3   ©Springer


International Conference on Principles of Security and Trust (POST)
2012 Revisiting botnet models and their implications for takedown strategies
T.-F. Yen and M. K. Reiter. Lecture Notes in Computer Science 7215, pages 249–268. doi:10.1007/978-3-642-28641-4_14   ©Springer


International Journal of Information Security
2022 Defeating traffic analysis via differential privacy: A case study on streaming traffic
X. Zhang, J. Hamm, M. K. Reiter, and Y. Zhang. doi:10.1007/s10207-021-00574-3
2014 Toward practical encrypted email that supports private, regular-expression searches
L. Wei and M. K. Reiter. 14(5):397–416. doi:10.1007/s10207-014-0268-3
2007 A multi-layer framework for puzzle-based denial-of-service defense
X. Wang and M. K. Reiter. 7(4):243–263. doi:10.1007/s10207-007-0042-x   ©Springer
2004 Two-party generation of DSA signatures
P. MacKenzie and M. K. Reiter. 2(3–4):218–239. doi:10.1007/s10207-004-0041-0   ©Springer
2003 Networked cryptographic devices resilient to capture
P. MacKenzie and M. K. Reiter. 2(1):1–20. doi:10.1007/s10207-003-0022-8   ©Springer
2002 Password hardening based on keystroke dynamics
F. Monrose, M. K. Reiter and S. G. Wetzel. 1(2):69–83. doi:10.1007/s102070100006   ©Springer


International Journal on Security and Networks
2009 Seeing-Is-Believing: Using camera-phones for human-verifiable authentication
J. M. McCune, A. Perrig and M. K. Reiter. 4(1–2):43–56. doi:10.1504/IJSN.2009.023425


International Symposium on Distributed Computing (DISC)
2021 Brief announcement: Communication-efficient BFT using small trusted hardware to tolerate minority corruption
S. Yandamuri, I. Abraham, K. Nayak, and M. Reiter. doi:10.4230/LIPIcs.DISC.2021.62
2007 Probabilistic opaque quorum systems
M. G. Merideth and M. K. Reiter. Lecture Notes in Computer Science 4731, pages 403–419. doi:10.1007/978-3-540-75142-7_31   ©Springer
2006 On consistency of encrypted files
A. Oprea and M. K. Reiter. Lecture Notes in Computer Science 4167, pages 254–268. doi:10.1007/11864219_18   ©Springer
2000 Objects shared by Byzantine processes
D. Malkhi, M. Merritt, M. K. Reiter and G. Taubenfeld. Lecture Notes in Computer Science 1914, pages 345–359. ©Springer
Additional information:   journal version


International Symposium on Recent Advances in Intrusion Detection (RAID)
2010 On challenges in evaluating malware clustering
P. Li, L. Liu, D. Gao and M. K. Reiter. Lecture Notes in Computer Science 6307, pages 238–255. doi:10.1007/978-3-642-15512-3_13   ©Springer
2009 Automatically adapting a trained anomaly detector to software patches
P. Li, D. Gao and M. K. Reiter. Lecture Notes in Computer Science 5758, pages 142–160. doi:10.1007/978-3-642-04342-0_8   ©Springer
2008 On the limits of payload-oblivious network attack detection
M. P. Collins and M. K. Reiter. Lecture Notes in Computer Science 5230, pages 251–270. doi:10.1007/978-3-540-87403-4_14   ©Springer
2007 Hit-list worm detection and bot identification in large networks using protocol graphs
M. P. Collins and M. K. Reiter. Lecture Notes in Computer Science 4637, pages 276–295. doi:10.1007/978-3-540-74320-0_15   ©Springer
2006 Behavioral distance measurement using hidden Markov models
D. Gao, M. K. Reiter and D. Song. Lecture Notes in Computer Science 4219, pages 19–40. doi:10.1007/11856214_2   ©Springer
Additional information:   journal version
2005 Behavioral distance for intrusion detection
D. Gao, M. K. Reiter and D. Song. Lecture Notes in Computer Science 3858, pages 63–81. doi:10.1007/11663812_4   ©Springer
2004 Seurat: A pointillist approach to anomaly detection
Y. Xie, H. Kim, D. R. O'Hallaron, M. K. Reiter and H. Zhang. Lecture Notes in Computer Science 3224, pages 238–257. ©Springer


Internet Measurement Conference (IMC)
2010 Revisiting the case for a minimalist approach for network flow monitoring
V. Sekar, M. K. Reiter and H. Zhang. Pages 328–341. doi:10.1145/1879141.1879186   ©ACM


Internet Society Network and Distributed System Security Symposium (NDSS)
2024 Bernoulli honeywords
K. C. Wang and M. K. Reiter. doi:10.14722/ndss.2024.23295
Group-based robustness: A general framework for customized robustness in the real world
W. Lin, K. Lucas, N. Eyal, L. Bauer, M. K. Reiter, and M. Sharif. doi:10.14722/ndss.2024.24084
Additional information:   conference talk   implementation
2021 TASE: Reducing latency of symbolic execution with transactional memory
A. Humphries, K. Cating-Subramanian, and M. K. Reiter. doi:10.14722/ndss.2021.24327
Additional information:   conference talk   implementation
2019 How to end password reuse on the web
K. C. Wang and M. K. Reiter. doi:10.14722/ndss.2019.23360
Additional information:   conference talk
Statistical privacy for streaming traffic
X. Zhang, J. Hamm, M. K. Reiter, and Y. Zhang. doi:10.14722/ndss.2019.23210
Additional information:   conference talk   journal version
2013 Toward online verification of client behavior in distributed applications
R. A. Cochran and M. K. Reiter. ©Internet Society
2011 Usability testing a malware-resistant input mechanism
A. Libonati, J. M. McCune and M. K. Reiter. Pages 435–451. ©Internet Society
2010 Server-side verification of client behavior in online games
D. Bethea, R. A. Cochran and M. K. Reiter. Pages 21–36. ©Internet Society
Additional information:   journal version
2009 Safe passage for passwords and other sensitive data
J. M. McCune, A. Perrig and M. K. Reiter. Pages 301–320. ©Internet Society
2008 Taming the devil: Techniques for evaluating anonymized network data
S. E. Coull, C. V. Wright, A. D. Keromytis, F. Monrose and M. K. Reiter. Pages 125–135. ©Internet Society
Note: The version posted here corrects notational errors in the published version.
2007 Playing devil's advocate: Inferring sensitive information from anonymized network traces
S. E. Coull, C. V. Wright, F. Monrose, M. P. Collins and M. K. Reiter. Pages 35–47. ©Internet Society
Consumable credentials in logic-based access control
K. D. Bowers, L. Bauer, D. Garg, F. Pfenning and M. K. Reiter. Pages 143–157. ©Internet Society
2005 Space-efficient block storage integrity
A. Oprea, M. K. Reiter and K. Yang. Pages 17–28. ©Internet Society


Journal of Computer Security
1997 A high-throughput secure reliable multicast protocol
D. Malkhi and M. Reiter. 5:113–127.
1996 The Ω key management service
M. K. Reiter, M. K. Franklin, J. B. Lacy and R. N. Wright. 4(4):267–287.


Learning from Authoritative Security Experiment Results (LASER)
2012 Studying access-control usability in the lab: Lessons learned from four studies
K. Vaniea, L. Bauer, L. F. Cranor and M. K. Reiter. Pages 31–40. doi:10.1145/2379616.2379621   ©ACM


Proceedings of the ACM on Programming Languages (PACMPL)
2021 Interpretable noninterference measurement and its application to processor designs
Z. Zhou and M. K. Reiter. 5(OOPSLA), October 2021. doi:10.1145/3485518


Proceedings on Privacy Enhancing Technologies (PoPETS)
2017 To permit or not to permit, that is the usability question: Crowdsourcing mobile apps' privacy permission settings
Q. Ismail, T. Ahmed, K. Caine, A. Kapadia, and M. Reiter. 2017(4):39–57. doi:10.1515/popets-2017-0041
Personalized pseudonyms for servers in the cloud
Q. Xiao, M. K. Reiter, and Y. Zhang. 2017(4):191–209. doi:10.1515/popets-2017-0049


Security and Privacy in Digital Rights Management
2002 Discouraging software piracy using software aging
M. Jakobsson and M. K. Reiter. Lecture Notes in Computer Science 2320, pages 1–12. ©Springer


SIAM Journal of Computing
2000 The load and availability of Byzantine quorum systems
D. Malkhi, M. K. Reiter and A. Wool. 29(6):1889–1906. doi:10.1137/S0097539797325235


Symposium on Usable Privacy and Security (SOUPS)
2015 Usability of augmented reality for revealing secret messages to users but not their devices
S. J. Andrabi, M. K. Reiter, and C. Sturton. Pages 89–102.
2007 Lessons learned from the deployment of a smartphone-based access-control system
L. Bauer, L. F. Cranor, M. K. Reiter and K. Vaniea. Pages 64–75. doi:10.1145/1280680.1280689


Theoretical Computer Science
2003 Diffusion without false rumors: On propagating updates in a Byzantine environment
D. Malkhi, Y. Mansour and M. K. Reiter. 299(1–3):289–306. doi:10.1016/S0304-3975(02)00325-0


Theory of Cryptography Conference (TCC)
2004 Alternatives to non-malleability: Definitions, constructions, and applications
P. MacKenzie, M. K. Reiter and K. Yang. Lecture Notes in Computer Science 2951, pages 171–190. ©Springer


USENIX Annual Technical Conference
2006 Bump in the ether: A framework for securing sensitive user input
J. M. McCune, A. Perrig and M. K. Reiter. Pages 185–198.


USENIX Conference on File and Storage Technologies (FAST)
2014 Toward strong, usable access control for shared distributed data
M. L. Mazurek, Y. Liang, W. Melicher, M. Sleeper, L. Bauer, G. R. Ganger, N. Gupta, and M. K. Reiter. Pages 89–103.


USENIX Security Symposium
2024 Mudjacking: Patching backdoor vulnerabilities in foundation models
H. Liu, M. K. Reiter, and N. Gong.
The impact of exposed passwords on honeyword efficacy
Z. Huang, L. Bauer, and M. K. Reiter.
2023 Distance-aware private set intersection
A. Chakraborti, G. Fanti, and M. K. Reiter.
Additional information:   conference talk
Adversarial training for raw-binary malware classifiers
K. Lucas, S. Pai, W. Lin, L. Bauer, M. K. Reiter, and M. Sharif.
Additional information:   conference talk
2021 Using Amnesia to detect credential database breaches
K. C. Wang and M. K. Reiter.
Additional information:   conference talk
Effect of mood, location, trust, and presence of others on video-based social authentication
C. Guo, B. Campbell, A. Kapadia, M. K. Reiter, and K. Caine.
Additional information:   conference talk
2020 Detecting stuffing of a user's credentials at her own accounts
K. C. Wang and M. K. Reiter. Pages 2201–2218.
Additional information:   conference talk
2016 Stealing machine learning models via prediction APIs
F. Tramèr, F. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart. Pages 601–618.
Additional information:   conference talk
2008 The practical subtleties of biometric key generation
L. Ballard, S. Kamara and M. K. Reiter. Pages 61–74.
2007 Integrity checking in cryptographic file systems with constant trusted storage
A. Oprea and M. K. Reiter. Pages 183–198.
On web browsing privacy in anonymized NetFlows
S. E. Coull, M. P. Collins, C. V. Wright, F. Monrose and M. K. Reiter. Pages 339–352.
2004 On gray-box program tracking for anomaly detection
D. Gao, M. K. Reiter and D. Song. Pages 103–118.
On user choice in graphical password schemes
D. Davis, F. Monrose and M. K. Reiter. Pages 151–164.
2002 Toward speech-generated cryptographic keys on resource constrained devices
F. Monrose, M. K. Reiter, Q. Li, D. P. Lopresti and C. Shih. Pages 283–296.
1999 The design and analysis of graphical passwords
I. Jermyn, A. Mayer, F. Monrose, A. Rubin and M. K. Reiter. Pages 1–14.


USENIX Symposium on Networked Systems Design and Implementation (NSDI)
2017 A system to verify network behavior of known cryptographic clients
A. Chi, R. A. Cochran, M. Nesfield, M. K. Reiter, and C. Sturton. Pages 177–195.
Additional information:   conference talk
2016 Simplifying software-defined network optimization using SOL
V. Heorhiadi, M. K. Reiter, and V. Sekar. Pages 223–238.
2012 Design and implementation of a consolidated middlebox architecture
V. Sekar, N. Egi, S. Ratnasamy, M. K. Reiter and G. Shi
2008 cSamp: A system for network-wide flow monitoring
V. Sekar, M. K. Reiter, W. Willinger, H. Zhang, R. R. Kompella, and D. G. Andersen. Pages 233–246.


USENIX Workshop on Electronic Commerce
1998 Detecting hit shaving in click-through payment schemes
M. K. Reiter, V. Anupam and A. Mayer. Pages 155–166.


Workshop on The Bright and Dark Sides of Computer Vision: Challenges and Opportunities for Privacy and Security
2018 On the suitability of Lp-norms for creating and preventing adversarial examples
M. Sharif, L. Bauer, and M. K. Reiter. Pages 1718–1726.