This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
A | C | D | E | F | H | I | J | L | M | N | O | P | R | S | T | U | W |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
AAAI
ACNS ACSAC AFT ANCS ASIACCS ASPLOS |
C&C
C&S CCS CHI CIC CODASPY CollabCom Comp. J. Comp. Net. COMSNETS CoNEXT CRYPTO CSF CV-COPS |
DCCA
DIMVA DISC DC DSN |
EC (ACM)
EC (Usenix) ESORICS Euro S&P EUROCRYPT EuroSys |
FAST
FC FORTE |
HotMiddlebox
HotNets HPC |
ICDCS
ICICS ICISS ICLR ICML ICNP I&C IJIS IJSN IMC INFOCOM INSS IPDPS ISC |
JCS
JoC |
LASER | Middleware |
NDSS
NSDI |
OPODIS |
PACMPL
PoPETS PODC POST PST |
RAID |
S&P
SACMAT SEC SOSP SOUPS SRDS STOC |
TC
TCC TCS TDSC TISSEC TKDE TOCS TOPLAS TOPS TOS TPDS TSE |
Usenix ATC
Usenix Sec. |
WPES |
AAAI Conference on Artificial Intelligence (AAAI)
2022 | Coordinating followers to reach better equilibria: End-to-end gradient descent for Stackelberg games
K. Wang, L. Xu, A. Perrault, M. K. Reiter, and M. Tambe. doi:10.1609/aaai.v36i5.20457 |
ACM Asia Conference on Computer and Communications Security (ASIACCS), formerly ACM Symposium on Information, Computer and Communications Security
2021 | Malware makeover: Breaking ML-based static analysis by modifying executable bytes
K. Lucas, M. Sharif, L. Bauer, M. K. Reiter, and S. Shintre. doi:10.1145/3433210.3453086 Additional information: implementation |
2017 | Detecting privileged side-channel attacks in shielded execution with Déjà Vu
S. Chen, X. Zhang, M. K. Reiter, and Y. Zhang. doi:10.1145/3052973.3053007 |
2011 | Bounded vector signatures and their applications
L. Wei, S. E. Coull and M. K. Reiter. Pages 277–285. doi:10.1145/1966913.1966949 ©ACM |
ACM Conference on Computer and Communications Security (CCS)
ACM Conference on Data and Application Security and Privacy (CODASPY)
2021 | Role-based deception in enterprise networks
I. Anjum, M. Zhu, I. Polinsky, W. Enck, M. K. Reiter, and M. Singh. doi:10.1145/3422337.3447824 |
2020 | n-m-variant systems: Adversarial-resistant software rejuvenation for cloud-based web applications
I. Polinsky, K. Martin, W. Enck, and M. K. Reiter. doi:10.1145/3374664.3375745 |
2012 | Discovering access-control misconfigurations: New approaches and evaluation methodologies
L. Bauer, Y. Liang, M. K. Reiter and C. Spensky. Pages 95–104. doi:10.1145/2133601.2133613 ©ACM |
ACM Conference on Electronic Commerce (EC)
2000 | Privacy-preserving global customization
R. M. Arlein, B. Jai, M. Jakobsson, F. Monrose and M. K. Reiter. Pages 176–184. doi:10.1145/352871.352891 ©ACM |
ACM Conference on Human Factors in Computing Systems (CHI)
2015 | Crowdsourced exploration of security configurations
Q. Ismail, T. Ahmed, A. Kapadia, and M. K. Reiter. doi:10.1145/2702123.2702370 |
2012 | Tag, you can see it! Using tags for access control in photo sharing
P. F. Klemperer, Y. Liang, M. L. Mazurek, M. Sleeper, B. Ur, L. Bauer, L. F. Cranor, N. Gupta and M. K. Reiter. Pages 377–386. doi:10.1145/2207676.2207728 ©ACM |
2011 | More than skin deep: Measuring effects of the underlying model on access-control system usability
R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter and K. Vaniea. Pages 2065–2074. doi:10.1145/1978942.1979243 ©ACM |
2010 | Access control for home data sharing: Attitudes, needs and practices
M. L. Mazurek, J. P. Arsenault, J. Bresee, N. Gupta, I. Ion, C. Johns, D. Lee, Y. Liang, J. Olsen, B. Salmon, R. Shay, K. Vaniea, L. Bauer, L. F. Cranor, G. R. Ganger, and M. K. Reiter. Pages 645–654. doi:10.1145/1753326.1753421 ©ACM |
2009 | Real life challenges in access-control
management
L. Bauer, L. F. Cranor, R. W. Reeder, M. K. Reiter and K. Vaniea. Pages 899–908. doi:10.1145/1518701.1518838 ©ACM |
2008 | A user study of policy creation
in a flexible access-control system
L. Bauer, L. F. Cranor, R. W. Reeder, M. K. Reiter and K. Vaniea. Pages 543–552. doi:10.1145/1357054.1357143 ©ACM |
Expandable grids for visualizing and
authoring computer security policies
R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter, K. Bacon, K. How and H. Strong. Pages 1473–1482. doi:10.1145/1357054.1357285 ©ACM |
ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS)
2015 | Caesar: High-speed and memory-efficient
forwarding engine for future Internet architecture
M. Moradi, F. Qian, Q. Xu, Z. M. Mao, D. Bethea, and M. K. Reiter. Pages 171–182. doi:10.1109/ANCS.2015.7110130 ©IEEE |
ACM/IFIP International Middleware Conference (Middleware)
2023 | EESMR: Energy efficient BFT-SMR for the masses
A. Bhat, A. Bandarupalli, M. Nagaraj, S. Bagchi, A. Kate, and M. K. Reiter doi:10.1145/3590140.3592848 |
ACM Symposium on Access Control Models and Technologies (SACMAT)
2020 | Metering graphical data leakage with Snowman
Q. Xiao, B. Subialdea, L. Bauer, and M. K. Reiter. doi:10.1145/3381991.3395598 |
2009 | xDomain: Cross-border proofs of
access
L. Bauer, L. Jia, M. K. Reiter and D. Swasey. Pages 43–52. doi:10.1145/1542207.1542216 ©ACM |
2008 | Detecting and resolving policy
misconfigurations in access-control systems
L. Bauer, S. Garriss and M. K. Reiter. Pages 185–194. doi:10.1145/1377836.1377866 ©ACM Additional information: journal version |
ACM Symposium on Operating Systems Principles (SOSP)
2007 | Low-overhead Byzantine fault-tolerant
storage
J. Hendricks, G. R. Ganger and M. K. Reiter. Pages 73–86. doi:10.1145/1294261.1294269 ©ACM |
2005 | Fault-scalable Byzantine
fault-tolerant services
M. Abd-El-Malek, G. R. Ganger, G. R. Goodson, M. K. Reiter and J. J. Wylie. Pages 59–74. doi:10.1145/1095810.1095817 ©ACM |
ACM Symposium on Principles of Distributed Computing (PODC)
ACM Symposium on Theory of Computing (STOC)
1997 | Byzantine quorum systems
D. Malkhi and M. Reiter. Pages 569–578. doi:10.1145/258533.258650 ©ACM Additional information: journal version |
ACM Transactions on Computer Systems (TOCS)
1994 | A security architecture for
fault-tolerant systems
M. K. Reiter, K. P. Birman and R. van Renesse. 12(4):340–371. doi:10.1145/195792.195823 ©ACM |
ACM Transactions on Information and System Security (TISSEC)
ACM Transactions on Programming Languages and Systems (TOPLAS)
1994 | How to securely replicate services
M. K. Reiter and K. P. Birman. 16(3):986–1009, May 1994. doi:10.1145/177492.177745 ©ACM |
ACM Transactions on Privacy and Security (TOPS), formerly TISSEC
2019 | A general framework for adversarial examples with objectives
M. Sharif, S. Bhagavatula, L. Bauer, and M. K. Reiter. 22(3), June 2019. doi:10.1145/3317611 Additional information: implementation |
ACM Transactions on Storage (TOS)
2012 | File system virtual appliances: Portable file system implementations
M. Abd-El-Malek, M. Wachs, J. Cipar, K. Sanghi, G. R. Ganger, G. A. Gibson and M. K. Reiter. 8(3), September 2012. doi:10.1145/2339118.2339120 ©ACM |
ACM Workshop on Hot Topics in Middleboxes and Network Function Virtualization
2013 | Verifiable network function
outsourcing: Requirements, challenges, and roadmap
S. K. Fayazbakhsh, M. K. Reiter, and V. Sekar. Pages 25–30. doi:10.1145/2535828.2535831 ©ACM |
ACM Workshop on Hot Topics in Networks
2011 | The middlebox manifesto: Enabling
innovation in middlebox deployment
V. Sekar, S. Ratnasamy, M. K. Reiter, N. Egi and G. Shi. doi:10.1145/2070562.2070583 ©ACM |
2004 | Toward a framework for Internet
forensic analysis
V. Sekar, Y. Xie, D. A. Maltz, M. K. Reiter and H. Zhang. ©ACM |
ACM Workshop on Privacy in the Electronic Society
2013 | The post anachronism: The temporal
dimension of Facebook privacy
L. Bauer, L. F. Cranor, S. Komanduri, M. L. Mazurek, M. K. Reiter, M. Sleeper, and B. Ur. Pages 1–12. doi:10.1145/2517840.2517859 |
Applied Cryptography and Network Security (ACNS)
2005 | Building reliable
mix networks with fair exchange
M. K. Reiter, X. Wang and M. Wright. Lecture Notes in Computer Science 3531, pages 378–392. doi:10.1007/11496137_26 ©Springer |
2004 | Private keyword-based push and pull
with applications to anonymous communication
L. Kissner, A. Oprea, M. K. Reiter, D. Song and K. Yang. Lecture Notes in Computer Science 3089, pages 16–30. ©Springer |
Annual Computer Security Applications Conference (ACSAC)
2023 | Prioritizing remediation of enterprise hosts by malware execution risk
A. Chi, B. Anderson, and M. K. Reiter doi:10.1145/3627106.3627180 |
1995 | Securing
causal relationships in distributed systems
M. K. Reiter and L. Gong. 38(8):633–642. doi:10.1093/comjnl/38.8.633 ©British Computer Society |
1999 | On the security of pay-per-click and
other Web advertising schemes
V. Anupam, A. Mayer, K. Nissim, B. Pinkas and M. K. Reiter. 31(11–16):1091–1100. doi:10.1016/S1389-1286(99)00023-7 |
2012 | Understanding domain registration abuses
S. E. Coull, A. M. White, T.-F. Yen, F. Monrose and M. K. Reiter. 31(7):806–815. doi:10.1016/j.cose.2012.05.005 ©Elsevier Ltd. |
Concurrency and Computation: Practice and Experience
2002 | Advanced concurrency control in Java
P. Felber and M. K. Reiter. 14(4):261–285. doi:10.1002/cpe.635 |
Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)
2009 | Browser fingerprinting from coarse traffic summaries: Techniques and implications
T.-F. Yen, X. Huang, F. Monrose and M. K. Reiter. Lecture Notes in Computer Science 5587, pages 157–175. doi:10.1007/978-3-642-02918-9_10 ©Springer |
2008 | Traffic aggregation for malware detection
T.-F. Yen and M. K. Reiter. Lecture Notes in Computer Science 5137, pages 207–227. doi:10.1007/978-3-540-70542-0_11 ©Springer |
Conference on Privacy, Security and Trust (PST)
2012 | Out of sight, out of mind: Effects of displaying access-control information near the item it controls
K. Vaniea, L. Bauer, L. F. Cranor and M. K. Reiter. Pages 128–136. doi:10.1109/PST.2012.6297929 ©IEEE |
2001 | Two party generation of DSA
signatures
P. MacKenzie and M. K. Reiter. Lecture Notes in Computer Science 2139, pages 137–154. ©Springer Additional information: journal version |
2003 | Objects shared by
Byzantine processes
D. Malkhi, M. Merritt, M. K. Reiter and G. Taubenfeld. 16(1)37–48. doi:10.1007/s00446-002-0075-3 ©Springer |
Delegation of
cryptographic servers for capture-resilient devices
P. MacKenzie and M. K. Reiter. 16(4):307–327. doi:10.1007/s00446-003-0098-4 ©Springer | |
1998 | Byzantine quorum
systems
D. Malkhi and M. Reiter. 11(4):203–213. doi:10.1007/s004460050050 ©Springer |
1996 | Low-exponent RSA with related
messages
D. Coppersmith, M. Franklin, J. Patarin and M. Reiter. Lecture Notes in Computer Science 1070, pages 1–9. ©Springer |
1995 | Verifiable signature sharing
M. K. Franklin and M. K. Reiter. Lecture Notes in Computer Science 921, pages 50–63. ©Springer |
European Conference on Computer Systems (EuroSys)
2019 | Efficient and safe network updates with suffix causal consistency
S. Liu, T. A. Benson, and M. K. Reiter. doi:10.1145/3302424.3303965 |
2008 | Flicker: An execution
infrastructure for TCB minimization
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter and H. Isozaki. Pages 315–328. doi:10.1145/1352592.1352625 ©ACM |
European Symposium on Research in Computer Security (ESORICS)
2017 | On-demand time blurring to support side-channel defense
W. Liu, D. Gao, and M. K. Reiter. Lecture Notes in Computer Science 10493), pages 210–228. doi:10.1007/978-3-319-66399-9_12 ©Springer |
2013 | Ensuring file authenticity in private DFA evaluation on encrypted files in the cloud
L. Wei and M. K. Reiter. Lecture Notes in Computer Science 8134, pages 147–163. doi:10.1007/978-3-642-40203-6_9 ©Springer |
2012 | Third-party private DFA evaluation on encrypted files in the cloud
L. Wei and M. K. Reiter. Lecture Notes in Computer Science 7459, pages 523–540. doi:10.1007/978-3-642-33167-1_30 ©Springer |
2009 | Data structures with unpredictable
timing
D. Bethea and M. K. Reiter. Lecture Notes in Computer Science 5789, pages 456–471. doi:10.1007/978-3-642-04444-1_28 ©Springer |
2007 | Efficient proving for
practical distributed access-control systems
L. Bauer, S. Garriss and M. K. Reiter. Lecture Notes in Computer Science 4734, pages 19–37. doi:10.1007/978-3-540-74835-9_3 ©Springer |
2006 | Finding peer-to-peer file-sharing
using coarse network behaviors
M. P. Collins and M. K. Reiter. Lecture Notes in Computer Science 4189, pages 1–17. doi:10.1007/11863908_1 ©Springer |
A linear logic of authorization
and knowledge
D. Garg, L. Bauer, K. D. Bowers, F. Pfenning and M. K. Reiter. Lecture Notes in Computer Science 4189, pages 297–312. doi:10.1007/11863908_19 ©Springer |
IEEE Computer Security Foundations (CSF)
2023 | Optimally hiding object sizes with constrained padding
A. C. Reed and M. K. Reiter. doi:10.1109/CSF57540.2023.00004 |
1997 | Unreliable intrusion detection in
distributed computations
D. Malkhi and M. Reiter. Pages 116–124. doi:10.1109/CSFW.1997.596799 ©IEEE |
1996 | A high-throughput secure reliable
multicast protocol
D. Malki and M. Reiter. Pages 9–17. doi:10.1109/CSFW.1996.503686 ©IEEE Additional information: journal version |
IEEE European Symposium on Security and Privacy (Euro S&P)
2023 | Privately evaluating region overlaps with applications to collaborative sensor output validation
A. Chakraborti and M. K. Reiter. doi:10.1109/EuroSP57164.2023.00063 ©IEEE |
IEEE International Conference on Collaboration and Internet Computing
2015 | WACCO and LOKO: Strong consistency at global scale
D. Bethea, M. K. Reiter, F. Qian, Q. Xu, and Z. M. Mao. Pages 130–141. doi:10.1109/CIC.2015.29 ©IEEE |
2014 | Defending against device theft with human notarization
A. Libonati, K. Caine, A. Kapadia, and M. K. Reiter. Pages 8–17. doi:10.4108/icst.collaboratecom.2014.257706 ©ICST |
IEEE International Conference on Computer Communications (INFOCOM)
2023 | Nimble: Fast and safe migration of network functions
S. Liu, M. K. Reiter, and T. A. Benson. doi:10.1109/INFOCOM53939.2023.10228977 ©IEEE |
2018 | Differentially private access patterns for searchable symmetric encryption
G. Chen, T.-H. Lai, M. K. Reiter, and Y. Zhang. doi:10.1109/INFOCOM.2018.8486381 ©IEEE |
IEEE International Conference on Network Protocols (ICNP)
2006 | Forensic analysis for epidemic attacks in federated networks
Y. Xie, V. Sekar, M. K. Reiter and H. Zhang. Pages 43–53. doi:10.1109/ICNP.2006.320197 ©IEEE |
IEEE International Conference on Networked Sensing Systems (INSS)
2009 | Authenticated data compression in delay tolerant wireless sensor networks
Y.-H. Oh, P. Ning, Y. Liu and M. K. Reiter. Pages 137–144. ©IEEE |
IEEE International Parallel and Distributed Processing Symposium (IPDPS)
2008 | Self-optimizing distributed trees
M. K. Reiter, A. Samar and C. Wang. doi:10.1109/IPDPS.2008.4536248 ©IEEE |
IEEE International Symposium on High Performance Distributed Computing
2002 | A secure distributed search
system
Y. Xie, D. O'Hallaron and M. K. Reiter. Pages 321–330. doi:10.1109/HPDC.2002.1029932 ©IEEE |
IEEE Symposium on Reliable Distributed Systems (SRDS)
IEEE Symposium on Security and Privacy (S&P)
IEEE Transactions on Computers (TC)
1998 | Resilient
authentication using path independence
M. K. Reiter and S. G. Stubblebine. 47(12):1351–1362. doi:10.1109/12.737682 ©IEEE |
IEEE Transactions on Dependable and Secure Computing (TDSC)
2009 | Beyond output
voting: Detecting compromised replicas using HMM-based behavioral
distance
D. Gao, M. K. Reiter and D. Song. 6(2):96–110. doi:10.1109/TDSC.2008.39 ©IEEE |
IEEE Transactions on Knowledge and Data Engineering (TKDE)
2000 | An architecture for
survivable coordination in large distributed systems
D. Malkhi and M. K. Reiter. 12(2):187–202. doi:10.1109/69.842262 ©IEEE |
IEEE Transactions on Parallel and Distributed Systems (TPDS)
2008 | Quiver: Consistent object
sharing for edge services
M. K. Reiter and A. Samar. 19(7):878–889. doi:10.1109/TPDS.2007.70790 ©IEEE |
2001 | On k-set
consensus problems in asynchronous systems
R. De Prisco, D. Malkhi and M. K. Reiter. 12(1):7–21. doi:10.1109/71.899936 ©IEEE |
Fault detection for
Byzantine quorum systems
L. Alvisi, D. Malkhi, E. Pierce and M. K. Reiter. 12(9):996–1007. doi:10.1109/71.954640 ©IEEE |
IEEE Transactions on Software Engineering (TSE)
2000 | Secure
execution of Java applets using a remote playground
D. Malkhi and M. K. Reiter. 26(12):1197–1209. doi:10.1109/32.888632 ©IEEE |
1996 | A secure group
membership protocol
M. K. Reiter. 22(1):31–42. doi:10.1109/32.481515 ©IEEE |
The design and
implementation of a secure auction service
M. K. Franklin and M. K. Reiter. 22(5):302–312. doi:10.1109/32.502223 ©IEEE |
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
IFIP TC-11 International Information Security Conference (SEC)
2010 | Understanding domain registration abuses
S. E. Coull, A. M. White, T.-F. Yen, F. Monrose and M. K. Reiter. Pages 68-79. doi:10.1007/978-3-642-15257-3_7 ©Springer Additional information: journal version |
IFIP Working Conference on Dependable Computing for Critical Applications (DCCA)
1999 | Fault detection for Byzantine quorum
systems
L. Alvisi, D. Malkhi, L. Pierce and M. K. Reiter. Pages 357–371. doi:10.1109/DCFTS.1999.814307 ©IEEE Additional information: journal version |
2001 | Probabilistic quorum
systems
D. Malkhi, M. K. Reiter, A. Wool and R. N. Wright. 170(2): 184–206. doi:10.1006/inco.2001.3054 |
Information Security Conference (ISC)
2010 | Summary-invisible networking:
Techniques and defenses
L. Wei, M. K. Reiter and K. Mayer-Patel. Lecture Notes in Computer Science 6531, pages 210–225. doi:10.1007/978-3-642-18178-8_19 ©Springer |
2004 | Device-enabled authorization in the
Grey system
L. Bauer, S. Garriss, J. M. McCune, M. K. Reiter, J. Rouse, and P. Rutenbar. Lecture Notes in Computer Science 3650, pages 431–445. doi:10.1007/11556992_31 ©Springer |
International Conference on Advances in Financial Technologies (AFT)
2024 | CrudiTEE: A stick-and-carrot approach to building trustworthy cryptocurrency wallets with TEEs
L. Zhou, Z. Liu, F. Zhang, and M. K. Reiter. doi:10.4230/LIPIcs.AFT.2024.16 |
2008 | How low can you go? Recommendations
for hardware-supported minimal TCB code execution
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter and A. Seshadri. Pages 14–25. doi:10.1145/1346281.1346285 ©ACM |
International Conference on Communications and Networks (COMSNETS)
2010 | Coordinated sampling
sans origin-destination identifiers: Algorithms and analysis
V. Sekar, A. Gupta, M. K. Reiter and H. Zhang. doi:10.1109/COMSNETS.2010.5432011 ©IEEE |
International Conference on Distributed Computing Systems (ICDCS)
International Conference on Emerging Networking Experiments and Technologies (CoNEXT)
2018 | Intent-driven composition of resource-management SDN applications
V. Heorhiadi, S. Chandrasekaran, M. K. Reiter, and V. Sekar. doi:10.1145/3281411.3281431 ©ACM |
2012 | New opportunities for load
balancing in network-wide intrusion detection systems
V. Heorhiadi, M. K. Reiter and V. Sekar. doi:10.1145/2413176.2413218 ©ACM |
2010 | Network-wide deployment of
intrusion detection and prevention systems
V. Sekar, R. Krishnaswamy, A. Gupta and M. K. Reiter. doi:10.1145/1921168.1921192 ©ACM |
International Conference on Financial Cryptography and Data Security (FC)
2023 | The unique chain rule and its applications
A. Bhat, A. Bandarupalli, S. Bagchi, A. Kate, and M. K. Reiter. |
2016 | Introducing reputation systems to the economics of outsourcing computations to rational workers
J. Aljuraidan, L. Bauer, M. K. Reiter, and M. Beckerle. ©Springer |
2012 | Efficient, compromise resilient and append-only cryptographic schemes for secure audit logging
A. A. Yavuz, P. Ning and M. K. Reiter. Lecture Notes in Computer Science 7397, pages 148–163. doi:10.1007/978-3-642-32946-3_12 ©Springer |
2004 | Timing attacks in low-latency
mix systems
B. N. Levine, M. K. Reiter, C. Wang and M. Wright. Lecture Notes in Computer Science 3110, pages 251–265. ©Springer |
2024 | Formally verifying a rollback-prevention protocol for TEEs
W. Wang, J. Niu, M. K. Reiter, and Y. Zhang. Lecture Notes in Computer Science 14678, pages 155–173. doi:10.1007/978-3-031-62645-6_9 ©IFIP |
International Conference on Information and Communications Security (ICICS)
2008 | BinHunt: Automatically finding semantic differences in binary programs
D. Gao, M. K. Reiter and D. Song. Lecture Notes in Computer Science 5308, pages 238–255. doi:10.1007/978-3-540-88625-9_16 ©Springer |
2004 | Time-scoped searching of encrypted
audit logs
D. Davis, F. Monrose and M. K. Reiter. Lecture Notes in Computer Science 3269, pages 532–545. ©Springer |
International Conference on Information Systems Security
2014 | SNIPS: A software-defined approach for scaling intrusion prevention systems via offloading
V. Heorhiadi, S. K. Fayaz, M. K. Reiter, and V. Sekar. Lecture Notes in Computer Science 8880, pages 9–29. doi:10.1007/978-3-319-13841-1_2 ©Springer |
2009 | Making peer-assisted content
distribution robust to collusion using bandwidth puzzles
M. K. Reiter, V. Sekar, C. Spensky and Z. Zhang. Lecture Notes in Computer Science 5905, pages 132–147. doi:10.1007/978-3-642-10772-6_11 ©Springer |
International Conference on Learning Representations (ICLR)
2022 | Practical integration via separable bijective networks
C. M. Bender, P. Emmanuel, M. K. Reiter, and J. Oliva. |
International Conference on Machine Learning (ICML)
2022 | Constrained gradient descent: A powerful and principled evasion attack against neural networks
W. Lin, K. Lucas, L. Bauer, M. K. Reiter, and M. Sharif Additional information: implementation |
2020 | Defense through diverse directions
C. M. Bender, Y. Li, Y. Shi, M. K. Reiter, and J. B. Oliva |
International Conference on Principles of Distributed Systems (OPODIS)
2022 | Communication-efficient BFT using small trusted hardware to tolerate minority corruption
S. Yandamuri, I. Abraham, K. Nayak, and M. K. Reiter. Leibniz International Proceedings in Informatics (LIPIcs) 253. doi:10.4230/LIPIcs.OPODIS.2022.24 |
2008 | Write markers for probabilistic quorum systems
M. G. Merideth and M. K. Reiter. Lecture Notes in Computer Science 5401, pages 5–21. doi:10.1007/978-3-540-92221-6_3 ©Springer |
International Conference on Principles of Security and Trust (POST)
2012 | Revisiting botnet models and their implications for takedown strategies
T.-F. Yen and M. K. Reiter. Lecture Notes in Computer Science 7215, pages 249–268. doi:10.1007/978-3-642-28641-4_14 ©Springer |
International Journal of Information Security
2022 | Defeating traffic analysis via differential privacy: A case study on streaming traffic
X. Zhang, J. Hamm, M. K. Reiter, and Y. Zhang. doi:10.1007/s10207-021-00574-3 |
2014 | Toward practical encrypted email that supports private, regular-expression searches
L. Wei and M. K. Reiter. 14(5):397–416. doi:10.1007/s10207-014-0268-3 |
2007 | A multi-layer
framework for puzzle-based denial-of-service defense
X. Wang and M. K. Reiter. 7(4):243–263. doi:10.1007/s10207-007-0042-x ©Springer |
2004 | Two-party
generation of DSA signatures
P. MacKenzie and M. K. Reiter. 2(3–4):218–239. doi:10.1007/s10207-004-0041-0 ©Springer |
2003 | Networked
cryptographic devices resilient to capture
P. MacKenzie and M. K. Reiter. 2(1):1–20. doi:10.1007/s10207-003-0022-8 ©Springer |
2002 | Password hardening
based on keystroke dynamics
F. Monrose, M. K. Reiter and S. G. Wetzel. 1(2):69–83. doi:10.1007/s102070100006 ©Springer |
International Journal on Security and Networks
2009 | Seeing-Is-Believing: Using
camera-phones for human-verifiable authentication
J. M. McCune, A. Perrig and M. K. Reiter. 4(1–2):43–56. doi:10.1504/IJSN.2009.023425 |
International Symposium on Distributed Computing (DISC)
2021 | Brief announcement: Communication-efficient
BFT using small trusted hardware to tolerate minority corruption
S. Yandamuri, I. Abraham, K. Nayak, and M. Reiter. doi:10.4230/LIPIcs.DISC.2021.62 |
2007 | Probabilistic opaque quorum systems
M. G. Merideth and M. K. Reiter. Lecture Notes in Computer Science 4731, pages 403–419. doi:10.1007/978-3-540-75142-7_31 ©Springer |
2006 | On consistency of encrypted files
A. Oprea and M. K. Reiter. Lecture Notes in Computer Science 4167, pages 254–268. doi:10.1007/11864219_18 ©Springer |
2000 | Objects shared by Byzantine
processes
D. Malkhi, M. Merritt, M. K. Reiter and G. Taubenfeld. Lecture Notes in Computer Science 1914, pages 345–359. ©Springer Additional information: journal version |
International Symposium on Recent Advances in Intrusion Detection (RAID)
2010 | On challenges in evaluating malware clustering
P. Li, L. Liu, D. Gao and M. K. Reiter. Lecture Notes in Computer Science 6307, pages 238–255. doi:10.1007/978-3-642-15512-3_13 ©Springer |
2009 | Automatically adapting a trained anomaly detector to software patches
P. Li, D. Gao and M. K. Reiter. Lecture Notes in Computer Science 5758, pages 142–160. doi:10.1007/978-3-642-04342-0_8 ©Springer |
2008 | On the limits of payload-oblivious network attack detection
M. P. Collins and M. K. Reiter. Lecture Notes in Computer Science 5230, pages 251–270. doi:10.1007/978-3-540-87403-4_14 ©Springer |
2007 | Hit-list worm detection and bot
identification in large networks using protocol graphs
M. P. Collins and M. K. Reiter. Lecture Notes in Computer Science 4637, pages 276–295. doi:10.1007/978-3-540-74320-0_15 ©Springer |
2006 | Behavioral distance measurement using hidden Markov models
D. Gao, M. K. Reiter and D. Song. Lecture Notes in Computer Science 4219, pages 19–40. doi:10.1007/11856214_2 ©Springer Additional information: journal version |
2005 | Behavioral distance for intrusion detection
D. Gao, M. K. Reiter and D. Song. Lecture Notes in Computer Science 3858, pages 63–81. doi:10.1007/11663812_4 ©Springer |
2004 | Seurat: A pointillist
approach to anomaly detection
Y. Xie, H. Kim, D. R. O'Hallaron, M. K. Reiter and H. Zhang. Lecture Notes in Computer Science 3224, pages 238–257. ©Springer |
Internet Measurement Conference (IMC)
2010 | Revisiting the case for
a minimalist approach for network flow monitoring
V. Sekar, M. K. Reiter and H. Zhang. Pages 328–341. doi:10.1145/1879141.1879186 ©ACM |
Internet Society Network and Distributed System Security Symposium (NDSS)
2024 | Bernoulli honeywords
K. C. Wang and M. K. Reiter. doi:10.14722/ndss.2024.23295 |
Group-based robustness: A general framework for customized robustness in the real world
W. Lin, K. Lucas, N. Eyal, L. Bauer, M. K. Reiter, and M. Sharif. doi:10.14722/ndss.2024.24084 Additional information: conference talk implementation | |
2021 | TASE: Reducing latency of symbolic execution with transactional memory
A. Humphries, K. Cating-Subramanian, and M. K. Reiter. doi:10.14722/ndss.2021.24327 Additional information: conference talk implementation |
2019 | How to end password reuse on the web
K. C. Wang and M. K. Reiter. doi:10.14722/ndss.2019.23360 Additional information: conference talk |
Statistical privacy for streaming traffic
X. Zhang, J. Hamm, M. K. Reiter, and Y. Zhang. doi:10.14722/ndss.2019.23210 Additional information: conference talk journal version | |
2013 | Toward online verification
of client behavior in distributed applications
R. A. Cochran and M. K. Reiter. ©Internet Society |
2011 | Usability testing a
malware-resistant input mechanism
A. Libonati, J. M. McCune and M. K. Reiter. Pages 435–451. ©Internet Society |
2010 | Server-side verification of client behavior in online games
D. Bethea, R. A. Cochran and M. K. Reiter. Pages 21–36. ©Internet Society Additional information: journal version |
2009 | Safe passage for passwords and other sensitive data
J. M. McCune, A. Perrig and M. K. Reiter. Pages 301–320. ©Internet Society |
2008 | Taming the devil: Techniques for
evaluating anonymized network data
S. E. Coull, C. V. Wright, A. D. Keromytis, F. Monrose and M. K. Reiter. Pages 125–135. ©Internet Society Note: The version posted here corrects notational errors in the published version. |
2007 | Playing devil's advocate: Inferring
sensitive information from anonymized network traces
S. E. Coull, C. V. Wright, F. Monrose, M. P. Collins and M. K. Reiter. Pages 35–47. ©Internet Society |
Consumable credentials in
logic-based access control
K. D. Bowers, L. Bauer, D. Garg, F. Pfenning and M. K. Reiter. Pages 143–157. ©Internet Society | |
2005 | Space-efficient block storage
integrity
A. Oprea, M. K. Reiter and K. Yang. Pages 17–28. ©Internet Society |
1997 | A high-throughput
secure reliable multicast protocol
D. Malkhi and M. Reiter. 5:113–127. |
1996 | The
Ω key management service
M. K. Reiter, M. K. Franklin, J. B. Lacy and R. N. Wright. 4(4):267–287. |
Learning from Authoritative Security Experiment Results (LASER)
2012 | Studying access-control usability in the lab: Lessons learned from four studies
K. Vaniea, L. Bauer, L. F. Cranor and M. K. Reiter. Pages 31–40. doi:10.1145/2379616.2379621 ©ACM |
Proceedings of the ACM on Programming Languages (PACMPL)
2021 | Interpretable noninterference measurement and its application to processor designs
Z. Zhou and M. K. Reiter. 5(OOPSLA), October 2021. doi:10.1145/3485518 |
Proceedings on Privacy Enhancing Technologies (PoPETS)
2017 | To permit or not to permit, that is the usability question: Crowdsourcing mobile apps' privacy permission settings
Q. Ismail, T. Ahmed, K. Caine, A. Kapadia, and M. Reiter. 2017(4):39–57. doi:10.1515/popets-2017-0041 |
Personalized pseudonyms for servers in the cloud
Q. Xiao, M. K. Reiter, and Y. Zhang. 2017(4):191–209. doi:10.1515/popets-2017-0049 |
Security and Privacy in Digital Rights Management
2002 | Discouraging software piracy using
software aging
M. Jakobsson and M. K. Reiter. Lecture Notes in Computer Science 2320, pages 1–12. ©Springer |
2000 | The load and
availability of Byzantine quorum systems
D. Malkhi, M. K. Reiter and A. Wool. 29(6):1889–1906. doi:10.1137/S0097539797325235 |
Symposium on Usable Privacy and Security (SOUPS)
2015 | Usability of augmented reality for revealing secret messages to users but not their devices
S. J. Andrabi, M. K. Reiter, and C. Sturton. Pages 89–102. |
2007 | Lessons learned from the deployment
of a smartphone-based access-control system
L. Bauer, L. F. Cranor, M. K. Reiter and K. Vaniea. Pages 64–75. doi:10.1145/1280680.1280689 |
2003 | Diffusion without
false rumors: On propagating updates in a Byzantine environment
D. Malkhi, Y. Mansour and M. K. Reiter. 299(1–3):289–306. doi:10.1016/S0304-3975(02)00325-0 |
Theory of Cryptography Conference (TCC)
2004 | Alternatives to non-malleability:
Definitions, constructions, and applications
P. MacKenzie, M. K. Reiter and K. Yang. Lecture Notes in Computer Science 2951, pages 171–190. ©Springer |
USENIX Annual Technical Conference
2006 | Bump in the ether:
A framework for securing sensitive user input
J. M. McCune, A. Perrig and M. K. Reiter. Pages 185–198. |
USENIX Conference on File and Storage Technologies (FAST)
2014 | Toward strong, usable access control
for shared distributed data
M. L. Mazurek, Y. Liang, W. Melicher, M. Sleeper, L. Bauer, G. R. Ganger, N. Gupta, and M. K. Reiter. Pages 89–103. |
2024 | Mudjacking: Patching backdoor vulnerabilities in foundation models
H. Liu, M. K. Reiter, and N. Z. Gong. Additional information: implementation |
The impact of exposed passwords on honeyword efficacy
Z. Huang, L. Bauer, and M. K. Reiter. Additional information: implementation | |
Near-optimal constrained padding for object
retrievals with dependencies
P. Jain, A. C. Reed, and M. K. Reiter. Additional information: implementation | |
On the criticality of integrity protection in 5G fronthaul networks
J. Xing, S. Yoo, X. Foukas, D. Kim, and M. K. Reiter | |
2023 | Distance-aware private set intersection
A. Chakraborti, G. Fanti, and M. K. Reiter. Additional information: conference talk |
Adversarial training for raw-binary malware classifiers
K. Lucas, S. Pai, W. Lin, L. Bauer, M. K. Reiter, and M. Sharif. Additional information: conference talk | |
2021 | Using Amnesia to detect credential database breaches
K. C. Wang and M. K. Reiter. Additional information: conference talk |
Effect of mood, location, trust, and presence of others on video-based social authentication
C. Guo, B. Campbell, A. Kapadia, M. K. Reiter, and K. Caine. Additional information: conference talk | |
2020 | Detecting stuffing of a user's credentials at her own accounts
K. C. Wang and M. K. Reiter. Pages 2201–2218. Additional information: conference talk |
2016 | Stealing machine learning models via prediction APIs
F. Tramèr, F. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart. Pages 601–618. Additional information: conference talk |
2008 | The practical subtleties of biometric
key generation
L. Ballard, S. Kamara and M. K. Reiter. Pages 61–74. |
2007 | Integrity checking
in cryptographic file systems with constant trusted storage
A. Oprea and M. K. Reiter. Pages 183–198. |
On web browsing privacy in anonymized NetFlows
S. E. Coull, M. P. Collins, C. V. Wright, F. Monrose and M. K. Reiter. Pages 339–352. | |
2004 | On gray-box
program tracking for anomaly detection
D. Gao, M. K. Reiter and D. Song. Pages 103–118. |
On user
choice in graphical password schemes
D. Davis, F. Monrose and M. K. Reiter. Pages 151–164. | |
2002 | Toward speech-generated cryptographic
keys on resource constrained devices
F. Monrose, M. K. Reiter, Q. Li, D. P. Lopresti and C. Shih. Pages 283–296. |
1999 | The design and analysis of graphical
passwords
I. Jermyn, A. Mayer, F. Monrose, A. Rubin and M. K. Reiter. Pages 1–14. |
USENIX Symposium on Networked Systems Design and Implementation (NSDI)
2017 | A system to verify network behavior of known cryptographic clients
A. Chi, R. A. Cochran, M. Nesfield, M. K. Reiter, and C. Sturton. Pages 177–195. Additional information: conference talk |
2016 | Simplifying software-defined
network optimization using SOL
V. Heorhiadi, M. K. Reiter, and V. Sekar. Pages 223–238. |
2012 | Design and implementation of a
consolidated middlebox architecture
V. Sekar, N. Egi, S. Ratnasamy, M. K. Reiter and G. Shi |
2008 | cSamp: A system for network-wide
flow monitoring
V. Sekar, M. K. Reiter, W. Willinger, H. Zhang, R. R. Kompella, and D. G. Andersen. Pages 233–246. |
USENIX Workshop on Electronic Commerce
1998 | Detecting hit shaving in click-through
payment schemes
M. K. Reiter, V. Anupam and A. Mayer. Pages 155–166. |
2018 | On the suitability of Lp-norms for creating and preventing adversarial examples
M. Sharif, L. Bauer, and M. K. Reiter. Pages 1718–1726. |