Michael Reiter :: Selected Publications by Year
This material is presented to ensure timely dissemination of scholarly
and technical work. Copyright and all rights therein are retained by
authors or by other copyright holders. All persons copying this
information are expected to adhere to the terms and constraints
invoked by each author's copyright. In most cases, these works may not
be reposted without the explicit permission of the copyright holder.
- Training robust ML-based raw-binary malware detectors in hours, not months
K. Lucas, W. Lin, L. Bauer, M. K. Reiter, and M. Sharif
In Proceedings of the 31st ACM Conference on Computer and Communications Security, October 2024. doi:10.1145/3658644.3690208
Additional information: implementation
- A general framework for data-use auditing of ML models
Z. Huang, N. Z. Gong, and M. K. Reiter
In Proceedings of the 31st ACM Conference on Computer and Communications Security, October 2024. doi:10.1145/3658644.3690226
Additional information: implementation
- PG: Byzantine fault-tolerant and privacy-preserving sensor fusion with guaranteed output delivery
C. Jin, C. Yin, M. van Dijk, S. Duan, F. Massacci, M. K. Reiter, and H. Zhang
In Proceedings of the 31st ACM Conference on Computer and Communications Security, October 2024. doi:10.1145/3658644.3670343
- Random beacons in Monte Carlo: Efficient asynchronous random beacon without threshold cryptography
A. Bandarupalli, A. Bhat, S. Bagchi, A. Kate, and M. K. Reiter
In Proceedings of the 31st ACM Conference on Computer and Communications Security, October 2024. doi:10.1145/3658644.3670326
- CrudiTEE: A stick-and-carrot approach to building trustworthy cryptocurrency wallets with TEEs
L. Zhou, Z. Liu, F. Zhang, and M. K. Reiter
In Proceedings of the 6th International Conference on Advances in Financial Technologies, September 2024. doi:10.4230/LIPIcs.AFT.2024.16
- Mudjacking: Patching backdoor vulnerabilities in foundation models
H. Liu, M. K. Reiter, and N. Z. Gong
In Proceedings of the 33rd USENIX Security Symposium, August 2024.
Additional information: conference talk implementation
- The impact of exposed passwords on honeyword efficacy
Z. Huang, L. Bauer, and M. K. Reiter
In Proceedings of the 33rd USENIX Security Symposium, August 2024.
Additional information: conference talk implementation
- Near-optimal constrained padding for object
retrievals with dependencies
P. Jain, A. C. Reed, and M. K. Reiter
In Proceedings of the 33rd USENIX Security Symposium, August 2024.
Additional information: conference talk implementation
- On the criticality of integrity protection in 5G fronthaul networks
J. Xing, S. Yoo, X. Foukas, D. Kim, and M. K. Reiter
In Proceedings of the 33rd USENIX Security Symposium, August 2024.
Additional information: conference talk
- SensorBFT: Fault-tolerant target localization using Voronoi diagrams and approximate agreement
A. Bandarupalli, A. Bhat, S. Chaterji, M. K. Reiter, A. Kate, and S. Bagchi
In Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, July 2024. doi:10.1109/ICDCS60910.2024.00026 ©IEEE
Additional information: implementation
- Delphi: Efficient asynchronous approximate agreement for distributed oracles
A. Bandarupalli, A. Bhat, S. Bagchi, A. Kate, C.-D. Liu-Zhang, and M. K. Reiter
In Proceedings of the 54th IEEE/IFIP International Conference on Dependable Systems and Networks, June 2024. doi:10.1109/DSN58291.2024.00051
Additional information: implementation
- Formally verifying a rollback-prevention protocol for TEEs
W. Wang, J. Niu, M. K. Reiter, and Y. Zhang
In Proceedings of the 44th International Conference on Formal Techniques for Distributed Objects, Components, and Systems, pages 155–173, June 2024. doi:10.1007/978-3-031-62645-6_9 ©IFIP
- Bernoulli honeywords
K. C. Wang and M. K. Reiter
In Proceedings of the 31st ISOC Network and Distributed System Security Symposium, February 2024. doi:10.14722/ndss.2024.23295
- Group-based robustness: A general framework for customized robustness in the real world
W. Lin, K. Lucas, N. Eyal, L. Bauer, M. K. Reiter, and M. Sharif
In Proceedings of the 31st ISOC Network and Distributed System Security Symposium, February 2024. doi:10.14722/ndss.2024.24084
Additional information: conference talk implementation
- EESMR: Energy efficient BFT-SMR for the masses
A. Bhat, A. Bandarupalli, M. Nagaraj, S. Bagchi, A. Kate, and M. K. Reiter
In Proceedings of the 24th ACM/IFIP International Middleware Conference, December 2023. doi:10.1145/3590140.3592848
- Prioritizing remediation of enterprise hosts by malware execution risk
A. Chi, B. Anderson, and M. K. Reiter
In Proceedings of the 39th Annual Computer Security Applications Conference, December 2023. doi:10.1145/3627106.3627180
- Distance-aware private set intersection
A. Chakraborti, G. Fanti, and M. K. Reiter
In Proceedings of the 32nd USENIX Security Symposium, August 2023.
Additional information: conference talk
- Adversarial training for raw-binary malware classifiers
K. Lucas, S. Pai, W. Lin, L. Bauer, M. K. Reiter, and M. Sharif
In Proceedings of the 32nd USENIX Security Symposium, August 2023.
Additional information: conference talk
- Optimally hiding object sizes with constrained padding
A. C. Reed and M. K. Reiter
In Proceedings of the 36th IEEE Computer Security Foundations Symposium, July 2023. doi:10.1109/CSF57540.2023.00004
- Privately evaluating region overlaps with applications to collaborative sensor output validation
A. Chakraborti and M. K. Reiter
In Proceedings of the 8th IEEE European Symposium on Security and Privacy, July 2023. doi:10.1109/EuroSP57164.2023.00063 ©IEEE
- Nimble: Fast and safe migration of network functions
S. Liu, M. K. Reiter, and T. A. Benson
In Proceedings of the 42nd IEEE International Conference on Computer Communications, May 2023. doi:10.1109/INFOCOM53939.2023.10228977 ©IEEE
- The unique chain rule and its applications
A. Bhat, A. Bandarupalli, S. Bagchi, A. Kate, and M. K. Reiter
In Proceedings of the 27th International Conference on Financial
Cryptography and Data Security, May 2023.
- Communication-efficient BFT
using small trusted hardware to tolerate minority corruption
S. Yandamuri, I. Abraham, K. Nayak, and M. K. Reiter
In Proceedings of the 26th International Conference on Principles of Distributed Systems, December 2022. doi:10.4230/LIPIcs.OPODIS.2022.24
- ENGRAFT: Enclave-guarded Raft on Byzantine faulty nodes
W. Wang, S. Deng, J. Niu, M. K. Reiter, and Y. Zhang
In Proceedings of the 29th ACM Conference on Computer and Communications Security, November 2022. doi:10.1145/3548606.3560639
- Constrained gradient descent: A powerful and principled evasion attack against neural networks
W. Lin, K. Lucas, L. Bauer, M. K. Reiter, and M. Sharif
In Proceedings of the 39th International Conference on Machine Learning, July 2022.
Additional information: implementation
- Practical integration via separable bijective networks
C. M. Bender, P. Emmanuel, M. K. Reiter, and J. Oliva
In Proceedings of the 10th International Conference on Learning
Representations, April 2022.
- Coordinating followers to reach better equilibria: End-to-end gradient descent for Stackelberg games
K. Wang, L. Xu, A. Perrault, M. K. Reiter, and M. Tambe
In Proceedings of the 36th AAAI Conference on Artificial Intelligence, February 2022. doi:10.1609/aaai.v36i5.20457
- Defeating traffic analysis via differential privacy: A case study on streaming traffic
X. Zhang, J. Hamm, M. K. Reiter, and Y. Zhang
International Journal on Information Security, January 2022. doi:10.1007/s10207-021-00574-3
- Interpretable noninterference measurement and its application to processor designs
Z. Zhou and M. K. Reiter
Proceedings of the ACM on Programming Languages 5(OOPSLA), October 2021. doi:10.1145/3485518
- Brief announcement: Communication-efficient
BFT using small trusted hardware to tolerate minority corruption
S. Yandamuri, I. Abraham, K. Nayak, and M. Reiter
In Proceedings of the 35th International Symposium on Distributed Computing, October 2021.
doi:10.4230/LIPIcs.DISC.2021.62
- Using Amnesia to detect credential database breaches
K. C. Wang and M. K. Reiter
In Proceedings of the 30th USENIX Security Symposium, August 2021.
Additional information: conference talk
- Effect of mood, location, trust, and presence of others on video-based social authentication
C. Guo, B. Campbell, A. Kapadia, M. K. Reiter, and K. Caine
In Proceedings of the 30th USENIX Security Symposium, August 2021.
Additional information: conference talk
- Malware makeover: Breaking ML-based static analysis by modifying executable bytes
K. Lucas, M. Sharif, L. Bauer, M. K. Reiter, and S. Shintre
In Proceedings of the 16th ACM Asia Conference on Computer and Communications Security, June 2021.
doi:10.1145/3433210.3453086
Additional information: implementation
- Role-based deception in enterprise networks
I. Anjum, M. Zhu, I. Polinsky, W. Enck, M. K. Reiter, and M. Singh
In Proceedings of the 11th ACM Conference on Data and Application Security
and Privacy, April 2021.
doi:10.1145/3422337.3447824
- TASE: Reducing latency of symbolic execution with transactional memory
A. Humphries, K. Cating-Subramanian, and M. K. Reiter
In Proceedings of the 28th ISOC Network and Distributed System Security Symposium, February 2021.
doi:10.14722/ndss.2021.24327
Additional information: conference talk implementation
- Detecting stuffing of a user’s credentials at her own accounts
K. C. Wang and M. K. Reiter
In Proceedings of the 29th USENIX Security Symposium, pages 2201–2218, August 2020.
Additional information: conference talk
- Defense through diverse directions
C. M. Bender, Y. Li, Y. Shi, M. K. Reiter, and J. B. Oliva
In Proceedings of the 37th International Conference on Machine Learning, July 2020.
- Metering graphical data leakage with Snowman
Q. Xiao, B. Subialdea, L. Bauer, and M. K. Reiter
In Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, June 2020.
doi:10.1145/3381991.3395598
- n-m-variant systems: Adversarial-resistant software rejuvenation for cloud-based web applications
I. Polinsky, K. Martin, W. Enck, and M. K. Reiter
In Proceedings of the 10th ACM Conference on Data and Application Security and Privacy, March 2020.
doi:10.1145/3374664.3375745
- Efficient verifiable secret sharing with share recovery in BFT protocols
S. Basu, A. Tomescu, I. Abraham, D. Malkhi, M. K. Reiter, and E. G. Sirer
In Proceedings of the 26th ACM Conference on Computer and Communications Security, November 2019.
doi:10.1145/3319535.3354207
- HotStuff: BFT consensus with linearity and responsiveness
M. Yin, D. Malkhi, M. K. Reiter, G. G. Gueta, and I. Abraham
In Proceedings of the 38th ACM Symposium on Principles of Distributed Computing, July 2019.
doi:10.1145/3293611.3331591
Additional information: implementation Diem implementation
- SBFT: A scalable and decentralized trust infrastructure
G. G. Gueta, I. Abraham, S. Grossman, D. Malkhi, B. Pinkas, M. K. Reiter, D.-A. Seredinschi, O. Tamir, and A. Tomescu
In Proceedings of the 49th IEEE/IFIP International Conference on Dependable Systems and Networks, pages 568–580, June 2019.
doi:10.1109/DSN.2019.00063 ©IEEE
Additional information: implementation
- A general framework for adversarial examples with objectives
M. Sharif, S. Bhagavatula, L. Bauer, and M. K. Reiter
ACM Transactions on Privacy and Security 22(3), June 2019.
doi:10.1145/3317611
Additional information: implementation
- Efficient and safe network updates with suffix causal consistency
S. Liu, T. A. Benson, and M. K. Reiter
In Proceedings of the 14th ACM SIGOPS/EuroSys European
Conference on Computer Systems, March 2019.
doi:10.1145/3302424.3303965
- How to end password reuse on the web
K. C. Wang and M. K. Reiter
In Proceedings of the 26th ISOC Network and Distributed System Security Symposium, February 2019.
doi:10.14722/ndss.2019.23360
Additional information: conference talk
- Statistical privacy for streaming traffic
X. Zhang, J. Hamm, M. K. Reiter, and Y. Zhang
In Proceedings of the 26th ISOC Network and Distributed System Security Symposium, February 2019.
doi:10.14722/ndss.2019.23210
Additional information: conference talk journal version
- Intent-driven composition of resource-management SDN applications
V. Heorhiadi, S. Chandrasekaran, M. K. Reiter, and V. Sekar
In Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pages 86–97, December 2018.
doi:10.1145/3281411.3281431 ©ACM
- BEAT: Asynchronous BFT made practical
S. Duan, M. K. Reiter, and H. Zhang
In Proceedings of the 25th ACM Conference on Computer and Communications Security, pages 2028–2041, October 2018.
doi:10.1145/3243734.3243812 ©ACM
- On the suitability of Lp-norms for creating and preventing adversarial examples
M. Sharif, L. Bauer, and M. K. Reiter
In Proceedings of the 2018 Workshop on The Bright and Dark Sides of Computer Vision: Challenges and Opportunities for Privacy and Security, pages 1718–1726, June 2018.
- Static evaluation of noninterference using approximate model counting
Z. Zhou, Z. Qian, M. K. Reiter, and Y. Zhang
In Proceedings of the 39th IEEE Symposium on Security and Privacy, pages 514–528, May 2018. doi:10.1109/SP.2018.00052
- Differentially private access patterns for searchable symmetric encryption
G. Chen, T.-H. Lai, M. K. Reiter, and Y. Zhang
In Proceedings of the 2018 IEEE International Conference on Computer Communications, April 2018. doi:10.1109/INFOCOM.2018.8486381 ©IEEE
- On-demand time blurring to support side-channel defense
W. Liu, D. Gao, and M. K. Reiter
In Computer Security – ESORICS 2017: 22nd European
Symposium on Research in Computer Security (Lecture Notes in
Computer Science 10493), pages 210–228, September 2017.
doi:10.1007/978-3-319-66399-9_12
©Springer
- To permit or not to permit, that is the usability question: Crowdsourcing mobile apps' privacy permission settings
Q. Ismail, T. Ahmed, K. Caine, A. Kapadia, and M. Reiter
Proceedings on Privacy Enhancing Technologies,
2017(4):39–57, October 2017.
doi:10.1515/popets-2017-0041
- Personalized pseudonyms for servers in the cloud
Q. Xiao, M. K. Reiter, and Y. Zhang
Proceedings on Privacy Enhancing Technologies,
2017(4):191–209, October 2017.
doi:10.1515/popets-2017-0049
- Flow reconnaissance via timing attacks on SDN switches
S. Liu, M. K. Reiter, and V. Sekar
In Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, pages 196–206, June 2017. doi:10.1109/ICDCS.2017.281 ©IEEE
- Detecting privileged side-channel attacks in shielded execution with Déjà Vu
S. Chen, X. Zhang, M. K. Reiter, and Y. Zhang
In Proceedings of the 12th ACM Asia Conference on Computer and Communications Security, April 2017. doi:10.1145/3052973.3053007
- A system to verify network behavior of known cryptographic clients
A. Chi, R. A. Cochran, M. Nesfield, M. K. Reiter, and C. Sturton
In Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, pages 177–195, March 2017.
Additional information: conference talk
- A software approach to defeating side channels in last-level caches
Z. Zhou, M. K. Reiter, and Y. Zhang
In Proceedings of the 23rd ACM Conference on Computer and Communications Security, pages 871–882, October 2016. doi:10.1145/2976749.2978324
- Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition
M. Sharif, S. Bhagavatula, L. Bauer, and M. K. Reiter
In Proceedings of the 23rd ACM Conference on Computer and Communications Security, pages 1528–1540, October 2016. doi:10.1145/2976749.2978392
Additional information: implementation
- Stealing machine learning models via prediction APIs
F. Tramèr, F. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart
In Proceedings of the 25th USENIX Security Symposium, pages 601–618, August 2016.
Additional information: conference talk
- Gremlin: Systematic resilience testing of microservices
V. Heorhiadi, S. Rajagopalan, H. Jamjoom, M. K. Reiter, and V. Sekar
In Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, pages 57–66, June 2016.
doi:10.1109/ICDCS.2016.11 ©IEEE
- Simplifying software-defined network optimization using SOL
V. Heorhiadi, M. K. Reiter, and V. Sekar
In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, pages 223–238, March 2016.
- Introducing reputation systems to the economics of outsourcing computations to rational workers
J. Aljuraidan, L. Bauer, M. K. Reiter, and M. Beckerle
In Proceedings of the 20th International Conference on Financial Cryptography and Data Security, February 2016.
- WACCO and LOKO: Strong consistency at global scale
D. Bethea, M. K. Reiter, F. Qian, Q. Xu, and Z. M. Mao
In Proceedings of the 1st IEEE International Conference on Collaboration and Internet Computing, pages 130–141, October 2015.
doi:10.1109/CIC.2015.29 ©IEEE
- Mitigating storage side channels using statistical privacy mechanisms
Q. Xiao, M. K. Reiter, and Y. Zhang
In Proceedings of the 22nd ACM Conference on Computer and Communications Security, pages 1582–1594, October 2015.
doi:10.1145/2810103.2813645
- Nomad: Mitigating arbitrary cloud side channels via provider-assisted migration
S.-J. Moon, V. Sekar, and M. K. Reiter
In Proceedings of the 22nd ACM Conference on Computer and Communications Security, pages 1595–1606, October 2015.
doi:10.1145/2810103.2813706 ©ACM
-
Toward practical encrypted email that supports private, regular-expression searches
L. Wei and M. K. Reiter
International Journal of Information Security 14(5):397–416, October 2015.
doi:10.1007/s10207-014-0268-3
- Usability of augmented reality for revealing secret messages to users but not their devices
S. J. Andrabi, M. K. Reiter, and C. Sturton
In Proceedings of the 11th Symposium on Usable Privacy and Security, pages 89–102, July 2015.
-
Replica placement for availability in the worst case
P. Li, D. Gao, and M. K. Reiter
In Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, pages 599–608, June 2015.
doi:10.1109/ICDCS.2015.67 ©IEEE
-
Caesar: High-speed and memory-efficient forwarding engine for future Internet architecture
M. Moradi, F. Qian, Q. Xu, Z. M. Mao, D. Bethea, and M. K. Reiter
In Proceedings of the 11th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, pages 171–182, May 2015.
doi:10.1109/ANCS.2015.7110130 ©IEEE
-
Crowdsourced exploration of security configurations
Q. Ismail, T. Ahmed, A. Kapadia, and M. K. Reiter
In Proceedings of the 33rd ACM Conference on Human Factors in Computing Systems, April 2015.
doi:10.1145/2702123.2702370
-
SNIPS: A software-defined approach for scaling intrusion prevention systems via offloading
V. Heorhiadi, S. K. Fayaz, M. K. Reiter, and V. Sekar
In Information Systems Security, 10th International Conference, ICISS 2014 (Lecture Notes in Computer Science 8880), pages 9–29, December 2014.
doi:10.1007/978-3-319-13841-1_2 ©Springer
-
StopWatch: A cloud architecture for timing channel mitigation
P. Li, D. Gao, and M. K. Reiter
ACM Transactions on Information and System Security 17(2), November 2014.
doi:10.1145/2670940
- Cross-tenant
side-channel attacks in PaaS clouds
Y. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart
In Proceedings of the 21st ACM Conference on Computer
and Communications Security, pages 990–1003, November 2014.
doi:10.1145/2660267.2660356
- An epidemiological study of malware
encounters in a large enterprise
T.-F. Yen, V. Heorhiadi, A. Oprea, M. K. Reiter, and A. Juels
In Proceedings of the 21st ACM Conference on Computer
and Communications Security, pages 1117–1030, November 2014.
doi:10.1145/2660267.2660330
- Defending against device
theft with human notarization
A. Libonati, K. Caine, A. Kapadia, and M. K. Reiter
In Proceedings of the 10th IEEE International Conference on
Collaborative Computing: Network, Applications and Worksharing,
pages 8–17, October 2014.
doi:10.4108/icst.collaboratecom.2014.257706 ©ICST
- Toward strong, usable access control
for shared distributed data
M. L. Mazurek, Y. Liang, W. Melicher, M. Sleeper, L. Bauer,
G. R. Ganger, N. Gupta, and M. K. Reiter
In Proceedings of the 12th USENIX Conference on File and
Storage Technologies, pages 89–103, February 2014.
- Verifiable
network function outsourcing: Requirements, challenges, and
roadmap
S. K. Fayazbakhsh, M. K. Reiter, and V. Sekar
In Proceedings of the 2013 Workshop on Hot Topics in
Middleboxes and Network Function Virtualization, pages
25–30, December 2013.
doi:10.1145/2535828.2535831
©ACM
- Düppel: Retrofitting
commodity operating systems to mitigate cache side channels in the
cloud
Y. Zhang and M. K. Reiter
In Proceedings of the 20th ACM Conference on Computer and
Communications Security, pages 827–837, November 2013.
doi:10.1145/2508859.2516741
©ACM
- The post anachronism: The temporal
dimension of Facebook privacy
L. Bauer, L. F. Cranor, S. Komanduri, M. L. Mazurek,
M. K. Reiter, M. Sleeper, and B. Ur
In Proceedings of the 12th ACM Workshop on Workshop on
Privacy in the Electronic Society, pages 1–12, November 2013.
doi:10.1145/2517840.2517859
- Ensuring file authenticity in private DFA evaluation on encrypted files in the cloud
L. Wei and M. K. Reiter
In Computer Security – ESORICS 2013: 18th European
Symposium on Research in Computer Security (Lecture Notes in
Computer Science 8134), pages 147–163, September 2013.
doi:10.1007/978-3-642-40203-6_9
©Springer
- Mitigating access-driven timing
channels in clouds using StopWatch
P. Li, D. Gao, and M. K. Reiter
In Proceedings of the 43rd IEEE/IFIP International Conference
on Dependable Systems and Networks, June 2013.
doi:10.1109/DSN.2013.6575299
©IEEE
Additional information: journal version
- Toward online verification
of client behavior in distributed applications
R. A. Cochran and M. K. Reiter
In Proceedings of the 20th ISOC Network and Distributed System
Security Symposium, February 2013.
- New opportunities
for load balancing in network-wide intrusion detection systems
V. Heorhiadi, M. K. Reiter and V. Sekar
In Proceedings of the 8th International Conference on Emerging
Networking Experiments and Technologies, pages 361–372,
December 2012.
doi:10.1145/2413176.2413218
©ACM
- Cross-VM side channels
and their use to extract private keys
Y. Zhang, A. Juels, M. K. Reiter and T. Ristenpart
In Proceedings of the 19th ACM Conference on Computer and
Communications Security, pages 305–316, October 2012.
doi:10.1145/2382196.2382230 ©ACM
- Understanding domain registration abuses
S. E. Coull, A. M. White, T.-F. Yen, F. Monrose and M. K. Reiter
Computers & Security 31(7):806–815, October 2012.
doi:10.1016/j.cose.2012.05.005 ©Elsevier Ltd.
- File system virtual appliances: Portable file system implementations
M. Abd-El-Malek, M. Wachs, J. Cipar, K. Sanghi, G. R. Ganger, G. A. Gibson and M. K. Reiter
ACM Transactions on Storage 8(3), September 2012.
doi:10.1145/2339118.2339120 ©ACM
- Third-party private DFA evaluation on encrypted files in the cloud
L. Wei and M. K. Reiter
In Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security (Lecture Notes in Computer Science 7459), pages 523–540, September 2012.
doi:10.1007/978-3-642-33167-1_30 ©Springer
- Out of sight, out of mind: Effects of displaying access-control information near the item it controls
K. Vaniea, L. Bauer, L. F. Cranor and M. K. Reiter
In Proceedings of the 10th Conference on Privacy, Security and Trust, pages 128–136, July 2012.
doi:10.1109/PST.2012.6297929 ©IEEE
- Studying access-control usability in the lab: Lessons learned from four studies
K. Vaniea, L. Bauer, L. F. Cranor and M. K. Reiter
In Proceedings of LASER 2012 – Learning from Authoritative
Security Experiment Results, pages 31–40, July 2012.
doi:10.1145/2379616.2379621 ©ACM
- Tag, you can see it! Using tags for access control in photo sharing
P. F. Klemperer, Y. Liang, M. L. Mazurek, M. Sleeper, B. Ur, L. Bauer, L. F. Cranor, N. Gupta and M. K. Reiter
In Proceedings of the 30th ACM Conference on Human Factors in Computing Systems, pages 377–386, May 2012.
doi:10.1145/2207676.2207728
©ACM
- Design and implementation of a consolidated middlebox architecture
V. Sekar, N. Egi, S. Ratnasamy, M. K. Reiter and G. Shi
In Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, April 2012.
- Revisiting botnet models and their implications for takedown strategies
T.-F. Yen and M. K. Reiter
In Principles of Security and Trust, First International
Conference, POST 2012 (Lecture Notes in Computer Science 7215),
pages 249–268, March 2012. doi:10.1007/978-3-642-28641-4_14
©Springer
- Discovering access-control misconfigurations: New approaches and evaluation methodologies
L. Bauer, Y. Liang, M. K. Reiter and C. Spensky
In Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, pages 95–104, February 2012.
doi:10.1145/2133601.2133613
©ACM
- Efficient, compromise resilient and append-only cryptographic schemes for secure audit logging
A. A. Yavuz, P. Ning and M. K. Reiter
In Financial Cryptography and Data Security, 16th International Conference (Lecture Notes in Computer Science 7397), pages 148–163, February 2012.
doi:10.1007/978-3-642-32946-3_12 ©Springer
- Server-side
verification of client behavior in online games
D. Bethea, R. A. Cochran and M. K. Reiter
ACM Transactions on Information and System Security 14(4), December 2011.
doi:10.1145/2043628.2043633
©ACM
- The middlebox manifesto:
Enabling innovation in middlebox deployment
V. Sekar, S. Ratnasamy, M. K. Reiter, N. Egi and G. Shi
In Proceedings of the 10th ACM Workshop on Hot Topics in
Networks, November 2011.
doi:10.1145/2070562.2070583
©ACM
- Amplifying limited expert input to
sanitize large network traces
X. Huang, F. Monrose and M. K. Reiter
In Proceedings of the 41st IEEE/IFIP International Conference
on Dependable Systems and Networks, pages 494–505, June
2011. doi:10.1109/DSN.2011.5958262
©IEEE
- HomeAlone: Co-residency
detection in the cloud via side-channel analysis
Y. Zhang, A. Juels, A. Oprea and M. K. Reiter
In Proceedings of the 2011 IEEE Symposium on Security and
Privacy, pages 313–328, May 2011.
doi:10.1109/SP.2011.31
©IEEE
- More than skin deep: Measuring effects of the underlying model on access-control system usability
R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter and K. Vaniea
In Proceedings of the 29th ACM Conference on Human Factors in Computing Systems, pages 2065–2074, May 2011. doi:10.1145/1978942.1979243
©ACM
- Detecting
and resolving policy misconfigurations in access-control systems
L. Bauer, S. Garriss and M. K. Reiter
ACM Transactions on Information and System Security 14(1),
May 2011. doi:10.1145/1952982.1952984
©ACM
- False data
injection attacks against state estimation in electric power grids
Y. Liu, P. Ning and M. K. Reiter
ACM Transactions on Information and System Security 14(1),
May 2011. doi:10.1145/1952982.1952995
©ACM
- Bounded vector signatures and their applications
L. Wei, S. E. Coull and M. K. Reiter
In Proceedings of the 6th ACM Symposium on Information,
Computer and Communications Security, pages 277–285, March
2011. doi:10.1145/1966913.1966949
©ACM
- Usability testing a
malware-resistant input mechanism
A. Libonati, J. M. McCune and M. K. Reiter
In Proceedings of the 18th ISOC Network and Distributed System
Security Symposium, pages 435–451, February 2011.
- Summary-invisible
networking: Techniques and defenses
L. Wei, M. K. Reiter and K. Mayer-Patel
In Information Security, 13th International Conference,
ISC 2010 (Lecture Notes in Computer Science 6531), pages
210–225, 2011.
doi:10.1007/978-3-642-18178-8_19
©Springer
- Network-wide deployment of
intrusion detection and prevention systems
V. Sekar, R. Krishnaswamy, A. Gupta and M. K. Reiter
In Proceedings of the 6th International Conference on Emerging
Networking Experiments and Technologies, November 2010. doi:10.1145/1921168.1921192 ©ACM
- Revisiting the case for a minimalist
approach for network flow monitoring
V. Sekar, M. K. Reiter and H. Zhang
In Proceedings of the 10th Internet Measurement Conference,
pages 328–341, November 2010. doi:10.1145/1879141.1879186
©ACM
- The security of modern
password expiration: An algorithmic framework and empirical
analysis
Y. Zhang, F. Monrose and M. K. Reiter
In Proceedings of the 17th ACM Conference on Computer and
Communications Security, pages 176–186, October 2010. doi:10.1145/1866307.1866328
©ACM
- On challenges in evaluating malware clustering
P. Li, L. Liu, D. Gao and M. K. Reiter
In Recent Advances in Intrusion Detection, 13th International
Symposium, RAID 2010 (Lecture Notes in Computer Science 6307),
pages 238–255, September 2010. doi:10.1007/978-3-642-15512-3_13
©Springer
- Understanding domain registration abuses
S. E. Coull, A. M. White, T.-F. Yen, F. Monrose and M. K. Reiter
In Security and Privacy – Silver Linings in the Cloud, 25th
IFIP TC-11 International Information Security Conference, SEC 2010,
pages 68–79, September 2010.
doi:10.1007/978-3-642-15257-3_7 ©Springer
Additional information: journal version
- Are your hosts trading or plotting?
Telling P2P file-sharing and bots apart
T.-F. Yen and M. K. Reiter
In Proceedings of the 30th International Conference on
Distributed Computing Systems, pages 241–252, June
2010. doi:10.1109/ICDCS.2010.76
©IEEE
- Zzyzx: Scalable fault tolerance
through Byzantine locking
J. Hendricks, S. Sinnamohideen, G. R. Ganger and M. K. Reiter
In Proceedings of the 40th IEEE/IFIP International Conference
on Dependable Systems and Networks , pages 363–372, June 2010.
doi:10.1109/DSN.2010.5544297
©IEEE
- Access control for home data sharing: Attitudes, needs and practices
M. L. Mazurek, J. P. Arsenault, J. Bresee, N. Gupta, I. Ion, C. Johns, D. Lee, Y. Liang, J. Olsen, B. Salmon, R. Shay, K. Vaniea, L. Bauer, L. F. Cranor, G. R. Ganger, and M. K. Reiter
In Proceedings of the 28th ACM Conference on Human Factors in Computing Systems, pages 645–654, April 2010.
doi:10.1145/1753326.1753421 ©ACM
- Server-side
verification of client behavior in online games
D. Bethea, R. A. Cochran and M. K. Reiter
In Proceedings of the 17th ISOC Network and Distributed
System Security Symposium, pages 21–36, February 2010.
Additional information: journal version
- Coordinated sampling
sans origin-destination identifiers: Algorithms and analysis
V. Sekar, A. Gupta, M. K. Reiter and H. Zhang
In Proceedings of the 2nd International Conference on Communications
Systems and Networks, January 2010.
doi:10.1109/COMSNETS.2010.5432011 ©IEEE
- Making peer-assisted
content distribution robust to collusion using bandwidth puzzles
M. K. Reiter, V. Sekar, C. Spensky and Z. Zhang
In Information Systems Security, 5th International Conference,
ICISS 2009 (Lecture Notes in Computer Science 5905),
pages 132–147, December 2009.
doi:10.1007/978-3-642-10772-6_11 ©Springer
- False data injection attacks against state estimation in electric power grids
Y. Liu, P. Ning and M. K. Reiter
In Proceedings of the 16th ACM Conference on Computer and
Communications Security, pages 21–32, November 2009.
doi:10.1145/1653662.1653666 ©ACM
Additional information: journal version
- Privacy-preserving genomic
computation through program specialization
R. Wang, X. Wang, Z. Li, H. Tang, M. K. Reiter and Z. Dong
In Proceedings of the 16th ACM Conference on Computer and
Communications Security, pages 338–347, November 2009.
doi:10.1145/1653662.1653703 ©ACM
- When and how to change quorums on
wide-area networks
M. G. Merideth, F. Oprea and M. K. Reiter
In Proceedings of the 28th International Symposium on Reliable
Distributed Systems, pages 12–21, September 2009. doi:10.1109/SRDS.2009.35 ©IEEE
- Automatically adapting a trained anomaly detector to software patches
P. Li, D. Gao and M. K. Reiter
In Recent Advances in Intrusion Detection, 12th International
Symposium, RAID 2009 (Lecture Notes in Computer Science 5758),
pages 142–160, September 2009. doi:10.1007/978-3-642-04342-0_8
©Springer
- Data structures with unpredictable timing
D. Bethea and M. K. Reiter
In Computer Security – ESORICS 2009: 14th European Symposium on Research in Computer Security (Lecture Notes in Computer Science 5789), pages 456–471, September 2009. doi:10.1007/978-3-642-04444-1_28 ©Springer
- Browser fingerprinting from coarse traffic summaries: Techniques and implications
T.-F. Yen, X. Huang, F. Monrose and M. K. Reiter
In Detection of Intrusions and Malware, and Vulnerability
Assessment, 6th International Conference, DIMVA 2009 (Lecture
Notes in Computer Science 5587), pages 157–175, July 2009.
doi:10.1007/978-3-642-02918-9_10
©Springer
- Authenticated data compression in
delay tolerant wireless sensor networks
Y.-H. Oh, P. Ning, Y. Liu and M. K. Reiter
In Proceedings of the 6th International Conference on Networked Sensing Systems, pages 137–144, June 2009.
©IEEE
- xDomain: Cross-border proofs of
access
L. Bauer, L. Jia, M. K. Reiter and D. Swasey
In Proceedings of the 14th ACM Symposium on Access Control
Models and Technologies, pages 43–52, June 2009. doi:10.1145/1542207.1542216
©ACM
- Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance
D. Gao, M. K. Reiter and D. Song
IEEE Transactions on Dependable and Secure Computing
6(2):96–110, April-June 2009. doi:10.1109/TDSC.2008.39
©IEEE
- Real life challenges
in access-control management
L. Bauer, L. F. Cranor, R. W. Reeder, M. K. Reiter and K. Vaniea
In Proceedings of the 27th ACM Conference on Human Factors in
Computing Systems, pages 899–908, April 2009. doi:10.1145/1518701.1518838
©ACM
- Safe passage for
passwords and other sensitive data
J. M. McCune, A. Perrig and M. K. Reiter
In Proceedings of the 16th ISOC Network and Distributed System
Security Symposium, pages 301–320, February 2009.
- Seeing-Is-Believing: Using
camera-phones for human-verifiable authentication
J. M. McCune, A. Perrig and M. K. Reiter
International Journal on Security and Networks
4(1–2):43–56, 2009.
doi:10.1504/IJSN.2009.023425
- Write markers for probabilistic quorum systems
M. G. Merideth and M. K. Reiter
In Principles of Distributed Systems, 12th International
Conference, OPODIS 2008 (Lecture Notes in Computer Science 5401),
pages 5–21, December 2008. doi:10.1007/978-3-540-92221-6_3
©Springer
- Fast and
black-box exploit detection and signature generation for commodity
software
X. Wang, Z. Li, J. Y. Choi, J. Xu, M. K. Reiter and C. Kil
ACM Transactions on Information and System Security 12(2),
December 2008. doi:10.1145/1455518.1455523 ©ACM
- Towards practical biometric key
generation with randomized biometric templates
L. Ballard, S. Kamara, F. Monrose and M. K. Reiter
In Proceedings of the 15th ACM Conference on Computer and
Communications Security, pages 235–244, October 2008. doi:10.1145/1455770.1455801
©ACM
- BinHunt: Automatically finding
semantic differences in binary programs
D. Gao, M. K. Reiter and D. Song
In Information and Communications Security, 10th International
Conference, ICICS 2008 (Lecture Notes in Computer Science 5308),
pages 238–255, October 2008.
doi:10.1007/978-3-540-88625-9_16 ©Springer
- On the limits of
payload-oblivious network attack detection
M. P. Collins and M. K. Reiter
In Recent Advances in Intrusion Detection, 11th International
Symposium, RAID 2008 (Lecture Notes in Computer Science 5230),
pages 251–270, September 2008.
doi:10.1007/978-3-540-87403-4_14 ©Springer
- The practical
subtleties of biometric key generation
L. Ballard, S. Kamara and M. K. Reiter
In Proceedings of the 17th USENIX Security Symposium,
pages 61–74, August 2008.
- Traffic aggregation
for malware detection
T.-F. Yen and M. K. Reiter
In Detection of Intrusions and Malware, and Vulnerability
Assessment, 5th International Conference, DIMVA 2008 (Lecture
Notes in Computer Science 5137), pages 207–227, July 2008.
doi:10.1007/978-3-540-70542-0_11
©Springer
- Quiver: Consistent object
sharing for edge services
M. K. Reiter and A. Samar
IEEE Transactions on Parallel and Distributed Systems
19(7):878–889, July 2008.
doi:10.1109/TPDS.2007.70790
©IEEE
- Detecting and resolving policy
misconfigurations in access-control systems
L. Bauer, S. Garriss and M. K. Reiter
In Proceedings of the 13th ACM Symposium on Access Control
Models and Technologies, pages 185–194, June 2008.
doi:10.1145/1377836.1377866
©ACM
Additional information: journal version
- AGIS: Towards automatic generation of
infection signatures
Z. Li, X. Wang, Z. Liang and M. K. Reiter
In Proceedings of the 38th International Conference on Dependable
Systems and Networks, pages 237–246, June 2008.
doi:10.1109/DSN.2008.4630092
©IEEE
- cSamp: A system for network-wide
flow monitoring
V. Sekar, M. K. Reiter, W. Willinger, H. Zhang, R. R. Kompella,
and D. G. Andersen.
In Proceedings of the 5th USENIX Symposium on Networked
Systems Design and Implementation, pages 233–246, April 2008.
- Self-optimizing
distributed trees
M. K. Reiter, A. Samar and C. Wang
In Proceedings of the 22nd IEEE International Parallel and
Distributed Processing Symposium, April 2008.
doi:10.1109/IPDPS.2008.4536248
©IEEE
- A user study of policy creation in a
flexible access-control system
L. Bauer, L. F. Cranor, R. W. Reeder, M. K. Reiter and K. Vaniea
In Proceedings of the 26th ACM Conference on Human Factors
in Computing Systems, pages 543–552, April 2008.
doi:10.1145/1357054.1357143
©ACM
- Expandable grids for visualizing and
authoring computer security policies
R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter, K. Bacon,
K. How and H. Strong
In Proceedings of the 26th ACM Conference on Human Factors
in Computing Systems, pages 1473–1482, April 2008.
doi:10.1145/1357054.1357285
©ACM
- Flicker: An execution
infrastructure for TCB minimization
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter and H. Isozaki
In Proceedings of the 3rd ACM SIGOPS/EuroSys European
Conference on Computer Systems, pages 315–328, April 2008.
doi:10.1145/1352592.1352625
©ACM
- How low can you go?
Recommendations for hardware-supported minimal TCB code execution
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter and A. Seshadri
In Proceedings of the 13th International Conference on
Architectural Support for Programming Languages and Operating Systems,
pages 14–25, March 2008. doi:10.1145/1346281.1346285
©ACM
- Taming the devil:
Techniques for evaluating anonymized network data
S. E. Coull, C. V. Wright, A. D. Keromytis, F. Monrose and M. K. Reiter
In Proceedings of the 2008 ISOC Network and Distributed System
Security Symposium, pages 125–135, February 2008.
Note: The version posted here corrects notational errors in the
published version.
- Low-overhead
Byzantine fault-tolerant storage
J. Hendricks, G. R. Ganger and M. K. Reiter
In Proceedings of the 21st ACM Symposium on Operating System
Principles, pages 73–86, October 2007. doi:10.1145/1294261.1294269
©ACM
- Efficient proving
for practical distributed access-control systems
L. Bauer, S. Garriss and M. K. Reiter
In Computer Security – ESORICS 2007: 12th European
Symposium on Research in Computer Security (Lecture Notes in
Computer Science 4734), pages 19–37, September 2007.
doi:10.1007/978-3-540-74835-9_3
©Springer
- Probabilistic opaque quorum systems
M. G. Merideth and M. K. Reiter
In Distributed Computing: 21st International Symposium, DISC
2007 (Lecture Notes in Computer Science 4731), pages
403–419, September 2007.
doi:10.1007/978-3-540-75142-7_31
©Springer
- Hit-list worm detection and bot
identification in large networks using protocol graphs
M. P. Collins and M. K. Reiter
In Recent Advances in Intrusion Detection, 10th International
Symposium, RAID 2007 (Lecture Notes in Computer Science 4637),
pages 276–295, August 2007.
doi:10.1007/978-3-540-74320-0_15
©Springer
- Verifying distributed
erasure-coded data
J. Hendricks, G. R. Ganger and M. K. Reiter
In Proceedings of the 26th ACM Symposium on Principles of
Distributed Computing, pages 139–146, August 2007.
doi:10.1145/1281100.1281122
©ACM
- A multi-layer
framework for puzzle-based denial-of-service defense
X. Wang and M. K. Reiter
International Journal of Information Security, August 2007.
doi:10.1007/s10207-007-0042-x
©Springer
- Integrity checking in
cryptographic file systems with constant trusted storage
A. Oprea and M. K. Reiter
In Proceedings of the 16th USENIX Security Symposium, pages
183–198, August 2007.
- On web browsing privacy in
anonymized NetFlows
S. E. Coull, M. P. Collins, C. V. Wright, F. Monrose and M. K. Reiter
In Proceedings of the 16th USENIX Security Symposium, pages
339–352, August 2007.
- Lessons learned from the deployment
of a smartphone-based access-control system
L. Bauer, L. F. Cranor, M. K. Reiter and K. Vaniea
In Proceedings of the 3rd Symposium on Usable Privacy and Security,
pages 64–75, July 2007.
doi:10.1145/1280680.1280689
- Minimizing response time
for quorum-system protocols over wide-area networks
F. Oprea and M. K. Reiter
In Proceedings of the 37th International Conference on Dependable
Systems and Networks, pages 409–418, June 2007.
doi:10.1109/DSN.2007.66
©IEEE
- Minimal TCB code execution
(extended abstract)
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter and A. Seshadri
In Proceedings of the 2007 IEEE Symposium on Security and
Privacy, pages 267–272, May 2007.
doi:10.1109/SP.2007.27
©IEEE
- Playing devil's advocate: Inferring
sensitive information from anonymized network traces
S. E. Coull, C. V. Wright, F. Monrose, M. P. Collins and M. K. Reiter
In Proceedings of the 2007 ISOC Network and Distributed System
Security Symposium, pages 35–47, February 2007.
- Consumable credentials in
logic-based access control
K. D. Bowers, L. Bauer, D. Garg, F. Pfenning and M. K. Reiter
In Proceedings of the 2007 ISOC Network and Distributed System
Security Symposium, pages 143–157, February 2007.
- Forensic analysis for epidemic attacks in federated networks
Y. Xie, V. Sekar, M. K. Reiter and H. Zhang
In Proceedings of the 14th IEEE International Conference on
Network Protocols, pages 43–53, November 2006. doi:10.1109/ICNP.2006.320197
©IEEE
- Packet vaccine: Black-box exploit detection and signature generation
X. Wang, Z. Li, J. Xu, M. K. Reiter, C. Kil and J. Y. Choi
In Proceedings of the 13th ACM Conference on Computer and
Communications Security, pages 37–46, October 2006. doi:10.1145/1180405.1180412
©ACM
Additional information: journal version
- WRAPS: Denial-of-service defense through web referrals
X. Wang and M. K. Reiter
In Proceedings of the 25th IEEE Symposium on Reliable
Distributed Systems, pages 51–60, October 2006. doi:10.1109/SRDS.2006.48
©IEEE
- Behavioral distance measurement using hidden Markov models
D. Gao, M. K. Reiter and D. Song
In Recent Advances in Intrusion Detection: 9th International
Symposium, RAID 2006 (Lecture Notes in Computer Science 4219),
pages 19–40, September 2006. doi:10.1007/11856214_2
©Springer
Additional information: journal version
- Finding peer-to-peer file-sharing
using coarse network behaviors
M. P. Collins and M. K. Reiter
In Computer Security – ESORICS 2006: 11th European
Symposium on Research in Computer Security (Lecture Notes in
Computer Science 4189), pages 1–17, September 2006. doi:10.1007/11863908_1
©Springer
- A linear logic of authorization
and knowledge
D. Garg, L. Bauer, K. D. Bowers, F. Pfenning and M. K. Reiter
In Computer Security – ESORICS 2006: 11th European
Symposium on Research in Computer Security (Lecture Notes in
Computer Science 4189), pages 297–312, September 2006. doi:10.1007/11863908_19
©Springer
- On consistency of encrypted files
A. Oprea and M. K. Reiter
In Distributed Computing: 20th International Symposium, DISC
2006 (Lecture Notes in Computer Science 4167), pages
254–268, September 2006. doi:10.1007/11864219_18
©Springer
- Quorum placement in networks: Minimizing network congestion
D. Golovin, A. Gupta, B. M. Maggs, F. Oprea and M. K. Reiter
In Proceedings of the 25th ACM Symposium on Principles of
Distributed Computing, pages 16–25, July 2006. doi:10.1145/1146381.1146388
©ACM
- M2: Multicasting mixes for efficient and anonymous communication
G. Perng, M. K. Reiter and C. Wang
In Proceedings of the 26th IEEE International Conference on
Distributed Computing Systems, July 2006. doi:10.1109/ICDCS.2006.53
©IEEE
- A multi-resolution
approach for worm detection and containment
V. Sekar, Y. Xie, M. K. Reiter and H. Zhang
In Proceedings of the 36th International Conference on
Dependable Systems and Networks, pages 189–198, June
2006. doi:10.1109/DSN.2006.6
©IEEE
- Bump in the ether:
A framework for securing sensitive user input
J. M. McCune, A. Perrig and M. K. Reiter
In Proceedings of the 2006 USENIX Annual Technical
Conference, pages 185–198, June 2006.
- Distributed
construction of a fault-tolerant network from a tree
M. K. Reiter, A. Samar and C. Wang
In Proceedings of the 24th IEEE Symposium on Reliable
Distributed Systems, pages 155–165, October 2005.
doi:10.1109/RELDIS.2005.16
©IEEE
- Lazy verification in
fault-tolerant distributed storage systems
M. Abd-El-Malek, G. R. Ganger, G. R. Goodson, M. K. Reiter and
J. J. Wylie
In Proceedings of the 24th IEEE Symposium on Reliable
Distributed Systems, pages 179–190, October 2005.
doi:10.1109/RELDIS.2005.20
©IEEE
- Fault-scalable Byzantine
fault-tolerant services
M. Abd-El-Malek, G. R. Ganger, G. R. Goodson, M. K. Reiter and
J. J. Wylie
In Proceedings of the 20th ACM Symposium on Operating Systems
Principles, pages 59–74, October 2005.
doi:10.1145/1095810.1095817
©ACM
- Behavioral distance for intrusion detection
D. Gao, M. K. Reiter and D. Song
In Recent Advances in Intrusion Detection: 8th International
Symposium, RAID 2005 (Lecture Notes in Computer Science 3858),
pages 63–81, 2005.
doi:10.1007/11663812_4
©Springer
- Device-enabled authorization in the
Grey system
L. Bauer, S. Garriss, J. M. McCune, M. K. Reiter, J. Rouse and P. Rutenbar
In Information Security: 8th International Conference, ISC 2005
(Lecture Notes in Computer Science 3650), pages 431–445, 2005.
doi:10.1007/11556992_31
©Springer
- Quorum placement in networks to
minimize access delays
A. Gupta, B. M. Maggs, F. Oprea and M. K. Reiter
In Proceedings of the 24th ACM Symposium on Principles of
Distributed Computing, pages 87–96, July 2005. doi:10.1145/1073814.1073829
©ACM
- Building reliable
mix networks with fair exchange
M. K. Reiter, X. Wang and M. Wright
In Applied Cryptography and Network Security: Third
International Conference, ACNS 2005 (Lecture Notes in Computer
Science 3531), pages 378–392, 2005. doi:10.1007/11496137_26
©Springer
- Worm origin identification using
random moonwalks
Y. Xie, V. Sekar, D. Maltz, M. K. Reiter and H. Zhang
In Proceedings of the 2005 IEEE Symposium on Security and
Privacy, pages 242–256, May 2005. doi:10.1109/SP.2005.23
©IEEE
- Seeing-is-believing: Using camera
phones for human-verifiable authentication
J. M. McCune, A. Perrig and M. K. Reiter
In Proceedings of the 2005 IEEE Symposium on Security and
Privacy, pages 110–124, May 2005. doi:10.1109/SP.2005.19
©IEEE
Additional information: journal version
- Distributed proving in access-control
systems
L. Bauer, S. Garriss and M. K. Reiter
In Proceedings of the 2005 IEEE Symposium on Security and
Privacy, pages 81–95, May 2005. doi:10.1109/SP.2005.9
©IEEE
- Detection of denial-of-message
attacks on sensor network broadcasts
J. M. McCune, E. Shi, A. Perrig and M. K. Reiter
In Proceedings of the 2005 IEEE Symposium on Security and
Privacy, pages 64–78, May 2005. doi:10.1109/SP.2005.7
©IEEE
- Space-efficient block storage
integrity
A. Oprea, M. K. Reiter and K. Yang
In Proceedings of the 2005 ISOC Network and Distributed System
Security Symposium, pages 17–28, February 2005.
- Toward a framework
for Internet forensic analysis
V. Sekar, Y. Xie, D. A. Maltz, M. K. Reiter and H. Zhang.
In Proceedings of the 3rd Workshop on Hot Topics in Networks,
November 2004. ©ACM
- Fragile mixing
M. K. Reiter and X. Wang
In Proceedings of the 11th ACM Conference on Computer and
Communications Security, pages 227–235, October 2004.
doi:10.1145/1030083.1030114
©ACM
- Mitigating bandwidth-exhaustion attacks using congestion puzzles
X. Wang and M. K. Reiter
In Proceedings of the 11th ACM Conference on Computer and
Communications Security, pages 257–267, October 2004.
doi:10.1145/1030083.1030118
©ACM
Additional information: journal version
- Gray-box extraction of execution graphs for anomaly detection
D. Gao, M. K. Reiter and D. Song
In Proceedings of the 11th ACM Conference on Computer and
Communications Security, pages 318–329, October 2004.
doi:10.1145/1030083.1030126
©ACM
- Time-scoped searching of encrypted
audit logs
D. Davis, F. Monrose and M. K. Reiter
In Information and Communications Security: 6th International
Conference, ICICS 2004 (Lecture Notes in Computer
Science 3269), pages 532–545, October 2004.
©Springer
- Nested objects in a Byzantine
quorum-replicated system
C. P. Fry and M. K. Reiter
In Proceedings of the 2004 IEEE Symposium on Reliable
Distributed Systems, pages 79–89, October 2004. doi:10.1109/RELDIS.2004.1353005
©IEEE
- Seurat: A pointillist
approach to anomaly detection
Y. Xie, H. Kim, D. R. O'Hallaron, M. K. Reiter and H. Zhang
In Recent Advances in Intrusion Detection: 7th International
Symposium, RAID 2004
(Lecture Notes in Computer Science 3224), pages 238–257,
September 2004.
©Springer
- Timing attacks in low-latency
mix systems
B. N. Levine, M. K. Reiter, C. Wang and M. Wright
In Financial Cryptography: 8th International Conference, FC
2004 (Lecture Notes in Computer Science 3110),
pages 251–265, September 2004.
©Springer
-
Two-party
generation of DSA signatures
P. MacKenzie and M. K. Reiter
International Journal of Information Security
2(3–4):218–239, August 2004.
doi:10.1007/s10207-004-0041-0
©Springer
-
On gray-box
program tracking for anomaly detection
D. Gao, M. K. Reiter and D. Song
In Proceedings of the 13th USENIX Security Symposium,
pages 103–118, August 2004.
-
On user choice in
graphical password schemes
D. Davis, F. Monrose and M. K. Reiter
In Proceedings of the 13th USENIX Security Symposium,
pages 151–164, August 2004.
-
Efficient Byzantine-tolerant
erasure-coded storage
G. R. Goodson, J. J. Wylie, G. R. Ganger and M. K. Reiter
In Proceedings of the 34th International Conference on
Dependable Systems and Networks, June 2004. doi:10.1109/DSN.2004.1311884 ©IEEE
-
Private keyword-based push and pull
with applications to anonymous communication
L. Kissner, A. Oprea, M. K. Reiter, D. Song and K. Yang
In Proceedings of the 2nd International Conference on Applied
Cryptography and Network Security (Lecture Notes in Computer
Science 3089), pages 16–30, June 2004.
©Springer
-
An empirical analysis of target-resident
DoS filters
M. Collins and M. K. Reiter
In Proceedings of the 2004 IEEE Symposium on Security and
Privacy, pages 103–114, May 2004. doi:10.1109/SECPRI.2004.1301318
©IEEE
-
Alternatives to non-malleability:
Definitions, constructions, and applications
P. MacKenzie, M. K. Reiter and K. Yang
In Theory of Cryptography: Proceedings of the First Theory of
Cryptography Conference (Lecture Notes in Computer
Science 2951), pages 171–190, February 2004. ©Springer
-
Delegation of cryptographic servers for
capture-resilient devices
P. MacKenzie and M. K. Reiter
Distributed Computing 16(4):307–327, December 2003.
doi:10.1007/s00446-003-0098-4
©Springer
-
Networked
cryptographic devices resilient to capture
P. MacKenzie and M. K. Reiter
International Journal of Information Security
2(1):1–20, November 2003. doi:10.1007/s10207-003-0022-8
©Springer
-
Automatic generation of two-party computations
P. MacKenzie, A. Oprea and M. K. Reiter
In Proceedings of the 10th ACM Conference on Computer and
Communications Security, pages 210–219, October 2003. doi:10.1145/948109.948139
©ACM
-
The design and implementation of a
JCA-compliant capture protection infrastructure
M. K. Reiter, A. Samar and C. Wang
In Proceedings of the 22nd IEEE Symposium on Reliable
Distributed Systems, October 2003. doi:10.1109/RELDIS.2003.1238086
©IEEE
-
Defending against denial-of-service attacks
with puzzle auctions
X. Wang and M. K. Reiter
In Proceedings of the 2003 IEEE Symposium on Security and
Privacy, pages 78–92, May 2003. doi:10.1109/SECPRI.2003.1199329
©IEEE
Additional information: journal version
-
Objects shared by
Byzantine processes
D. Malkhi, M. Merritt, M. K. Reiter and G. Taubenfeld
Distributed Computing 16(1)37–48, 2003. doi:10.1007/s00446-002-0075-3
©Springer
-
Diffusion without
false rumors: On propagating updates in a Byzantine environment
D. Malkhi, Y. Mansour and M. K. Reiter
Theoretical Computer Science 299(1–3):289–306,
18 April 2003. doi:10.1016/S0304-3975(02)00325-0
-
Advanced concurrency control in Java
P. Felber and M. K. Reiter
Concurrency and Computation: Practice and Experience
14(4):261–285, Wiley, 2002. doi:10.1002/cpe.635
-
Toward speech-generated cryptographic
keys on resource constrained devices
F. Monrose, M. K. Reiter, Q. Li, D. P. Lopresti and C. Shih
In Proceedings of the 11th USENIX Security Symposium, pages
283–296, August 2002.
-
A secure distributed search
system
Y. Xie, D. O'Hallaron and M. K. Reiter
In Proceedings of 11th IEEE International Symposium on High
Performance Distributed Computing, pages 321–330, July 2002.
doi:10.1109/HPDC.2002.1029932
©IEEE
-
Password hardening
based on keystroke dynamics
F. Monrose, M. K. Reiter and S. G. Wetzel
International Journal of Information Security
1(2):69–83, February 2002. doi:10.1007/s102070100006
©Springer
-
Discouraging software piracy using
software aging
M. Jakobsson and M. K. Reiter
In Security and Privacy in Digital Rights Management
(Lecture Notes in Computer Science 2320), 2002.
©Springer
-
Delegation of
cryptographic servers for capture-resilient devices
P. MacKenzie and M. K. Reiter
In Proceedings of the 8th ACM Conference on Computer and
Communications Security, pages 10–19, November 2001. doi:10.1145/501983.501986
©ACM
Additional information: journal version
-
An authorization model for a public
key management service
P. Samarati, M. K. Reiter and S. Jajodia
ACM Transactions on Information and System Security
4(4):453–482, November 2001. doi:10.1145/503339.503343
©ACM
-
Probabilistic quorum
systems
D. Malkhi, M. K. Reiter, A. Wool and R. N. Wright
Information and Computation 170(2): 184–206, 1
November 2001. doi:10.1006/inco.2001.3054
-
Efficient update diffusion in Byzantine
environments
D. Malkhi, M. K. Reiter, O. Rodeh and Y. Sella
In Proceedings of 20th IEEE Symposium on Reliable Distributed
Systems, pages 90–98, October 2001. doi:10.1109/RELDIS.2001.969758
©IEEE
-
Fault detection for
Byzantine quorum systems
L. Alvisi, D. Malkhi, E. Pierce and M. K. Reiter
IEEE Transactions on Parallel and Distributed Systems
12(9):996–1007, September 2001. doi:10.1109/71.954640
©IEEE
-
Selective private function evaluation
with applications to private statistics
R. Canetti, Y. Ishai, R. Kumar, M. K. Reiter, R. Rubinfeld and
R. N. Wright
In Proceedings of the 20th ACM Symposium on Principles of
Distributed Computing, August 2001. doi:10.1145/383962.384047
©ACM
-
Two party generation of DSA
signatures
P. MacKenzie and M. K. Reiter
In Advances in Cryptology—CRYPTO 2001 (Lecture Notes
in Computer Science 2139), pages 137–154, August 2001.
©Springer
Additional information: journal version
-
Persistent objects in the Fleet
system
D. Malkhi, M. K. Reiter, D. Tulone and E. Ziskind
In Proceedings of the 2nd DARPA Information Survivability
Conference and Exposition (DISCEX II), Vol. II, pages
126–136, June 2001. doi:10.1109/DISCEX.2001.932165
©IEEE
-
Using voice to generate cryptographic
keys
F. Monrose, M. K. Reiter, Q. Li and S. Wetzel
In Proceedings of 2001: A Speaker Odyssey, The Speaker
Recognition Workshop, pages 237–242, June 2001.
-
Networked cryptographic
devices resilient to capture
P. MacKenzie and M. K. Reiter
In Proceedings of the 2001 IEEE Symposium on Security and
Privacy, pages 12–25, May 2001. doi:10.1109/SECPRI.2001.924284
©IEEE
Additional information: journal version
-
Cryptographic key generation from
voice
F. Monrose, M. K. Reiter, Q. Li and S. Wetzel
In Proceedings of the 2001 IEEE Symposium on Security and
Privacy, pages 202–213, May 2001. doi:10.1109/SECPRI.2001.924299
©IEEE
-
Backoff protocols for distributed mutual
exclusion and ordering
G. Chockler, D. Malkhi and M. K. Reiter
In Proceedings of the 21st International Conference on
Distributed Computing Systems, pages 11–20, April
2001. doi:10.1109/ICDSC.2001.918928
©IEEE
-
On k-set
consensus problems in asynchronous systems
R. De Prisco, D. Malkhi and M. K. Reiter
IEEE Transactions on Parallel and Distributed Systems
12(1):7–21, January 2001. doi:10.1109/71.899936
©IEEE
-
Secure
execution of Java applets using a remote playground
D. Malkhi and M. K. Reiter
IEEE Transactions on Software Engineering
26(12):1197–1209, December 2000. doi:10.1109/32.888632
©IEEE
-
The load and
availability of Byzantine quorum systems
D. Malkhi, M. K. Reiter and A. Wool
SIAM Journal of Computing 29(6):1889–1906, 2000.
doi:10.1137/S0097539797325235
-
Objects shared by Byzantine
processes
D. Malkhi, M. Merritt, M. K. Reiter and G. Taubenfeld
In Proceedings of the 14th International Symposium on
Distributed Computing (Lecture Notes in Computer Science 1914),
pages 345–359, Springer, October 2000.
©Springer
Additional information: journal version
-
Privacy-preserving global customization
R. M. Arlein, B. Jai, M. Jakobsson, F. Monrose and M. K. Reiter
In Proceedings of the 2000 ACM Conference on Electronic
Commerce, pages 176–184, October 2000. doi:10.1145/352871.352891
©ACM
-
Dynamic Byzantine quorum systems
L. Alvisi, D. Malkhi, E. Pierce, M. K. Reiter and R. N. Wright
In Proceedings of the 30th International Conference on
Dependable Systems and Networks, pages 283–292, June
2000. doi:10.1109/ICDSN.2000.857551
©IEEE
-
An architecture for
survivable coordination in large distributed systems
D. Malkhi and M. K. Reiter
IEEE Transactions on Knowledge and Data Engineering
12(2):187–202, March/April 2000. doi:10.1109/69.842262
©IEEE
-
Password hardening based on
keystroke dynamics
F. Monrose, M. K. Reiter and S. Wetzel
In Proceedings of the 6th ACM Conference on Computer and
Communications Security, pages 73–82, November 1999. doi:10.1145/319709.319720
©ACM
Additional information: journal version
-
On diffusing updates in a Byzantine
environment
D. Malkhi, Y. Mansour and M. K. Reiter
In Proceedings of the 18th IEEE Symposium on Reliable
Distributed Systems, pages 134–143, October 1999. doi:10.1109/RELDIS.1999.805090
©IEEE
Additional information: journal version
-
The design and analysis of graphical
passwords
I. Jermyn, A. Mayer, F. Monrose, A. Rubin and M. K. Reiter
In Proceedings of the 8th USENIX Security Symposium, pages
1–14, August 1999.
-
Authentication
metric analysis and design
M. K. Reiter and S. G. Stubblebine
ACM Transactions on Information and System Security
2(2):138–158, May 1999. doi:10.1145/317087.317088
©ACM
-
On the security of pay-per-click and
other Web advertising schemes
V. Anupam, A. Mayer, K. Nissim, B. Pinkas and M. K. Reiter
Computer Networks 31(11–16):1091–1100, 17 May
1999. doi:10.1016/S1389-1286(99)00023-7
-
On k-set consensus problems in asynchronous systems
R. De Prisco, D. Malkhi and M. K. Reiter
In Proceedings of the 18th ACM Symposium on Principles of
Distributed Computing, pages 257–265, May 1999. doi:10.1145/301308.301368 ©ACM
Additional information: journal version
-
Fault detection for Byzantine quorum
systems
L. Alvisi, D. Malkhi, L. Pierce and M. K. Reiter
In Proceedings of the 7th IFIP Working Conference on Dependable
Computing for Critical Applications, pages 357–371, January
1999. doi:10.1109/DCFTS.1999.814307
©IEEE
Additional information: journal version
-
Resilient authentication using path
independence
M. K. Reiter and S. G. Stubblebine
IEEE Transactions on Computers 47(12):1351–1362,
December 1998. doi:10.1109/12.737682
©IEEE
-
Crowds: Anonymity for web transactions
M. K. Reiter and A. D. Rubin
ACM Transactions on Information and System Security
1(1):66–92, November 1998. doi:10.1145/290163.290168
©ACM
-
Byzantine quorum
systems
D. Malkhi and M. Reiter
Distributed Computing 11(4):203–213, October 1998.
doi:10.1007/s004460050050
©Springer
-
Survivable consensus objects
D. Malkhi and M. Reiter
In Proceedings of the 17th IEEE Symposium on Reliable
Distributed Systems, pages 271–279, October 1998. doi:10.1109/RELDIS.1998.740509
©IEEE
Additional information: journal version
-
Secure and scalable replication in
Phalanx
D. Malkhi and M. Reiter
In Proceedings of the 17th IEEE Symposium on Reliable
Distributed Systems, pages 51–58, October 1998. doi:10.1109/RELDIS.1998.740474
©IEEE
-
Detecting hit shaving in click-through
payment schemes
M. K. Reiter, V. Anupam and A. Mayer
In Proceedings of the 3rd USENIX Workshop on Electronic
Commerce, pages 155–166, August 1998.
-
Secure execution of Java applets using a
remote playground
D. Malkhi, M. Reiter and A. Rubin
In Proceedings of the 1998 IEEE Symposium on Security and
Privacy, pages 40–51, May 1998. doi:10.1109/SECPRI.1998.674822
©IEEE
Additional information: journal version
-
The load and availability
of Byzantine quorum systems
D. Malkhi, M. Reiter and A. Wool
In Proceedings of the 16th ACM Symposium on Principles of
Distributed Computing, pages 249–257, August 1997. doi:10.1145/259380.259450
©ACM
Additional information: journal version
-
Probabilistic quorum systems
D. Malkhi, M. Reiter and R. Wright
In Proceedings of the 16th ACM Symposium on Principles of
Distributed Computing, pages 267–273, August 1997. doi:10.1145/259380.259458
©ACM
Additional information: journal version
-
Unreliable intrusion detection in
distributed computations
D. Malkhi and M. Reiter
In Proceedings of the 10th IEEE Computer Security Foundations
Workshop, pages 116–124, June 1997. doi:10.1109/CSFW.1997.596799
©IEEE
-
Byzantine quorum systems
D. Malkhi and M. Reiter
In Proceedings of the 29th ACM Symposium on Theory of
Computing, pages 569–578, May 1997. doi:10.1145/258533.258650
©ACM
Additional information: journal version
-
Toward acceptable metrics of
authentication
M. K. Reiter and S. G. Stubblebine
In Proceedings of the 1997 IEEE Symposium on Security and
Privacy, pages 10–20, May 1997. doi:10.1109/SECPRI.1997.601308
©IEEE
Additional information: journal version
-
Fair exchange with a semi-trusted third party
M. K. Franklin and M. K. Reiter
In Proceedings of the 4th ACM Conference on Computer and
Communications Security, pages 1–6, April 1997. doi:10.1145/266420.266424
©ACM
-
Path independence for authentication in large-scale systems
M. K. Reiter and S. G. Stubblebine
In Proceedings of the 4th ACM Conference on Computer and
Communications Security, pages 57–66, April 1997. doi:10.1145/266420.266435
©ACM
Additional information: journal version
-
A high-throughput
secure reliable multicast protocol
D. Malkhi and M. Reiter
Journal of Computer Security 5:113–127, IOS Press,
1997.
-
The
Ω key management service
M. K. Reiter, M. K. Franklin, J. B. Lacy and R. N. Wright
Journal of Computer Security 4(4):267–287, IOS Press,
1996.
-
A high-throughput secure reliable
multicast protocol
D. Malki and M. Reiter
In Proceedings of the 9th IEEE Computer Security Foundations
Workshop, pages 9–17, June 1996. doi:10.1109/CSFW.1996.503686
©IEEE
Additional information: journal version
-
The design and
implementation of a secure auction service
M. K. Franklin and M. K. Reiter
IEEE Transactions on Software Engineering
22(5):302–312, May 1996. doi:10.1109/32.502223
©IEEE
-
Low-exponent RSA with related
messages
D. Coppersmith, M. Franklin, J. Patarin and M. Reiter
In Advances in Cryptology—EUROCRYPT '96 (Lecture
Notes in Computer Science 1070), pages 1–9, 1996.
©Springer
-
The Ω key management service
M. K. Reiter, M. K. Franklin, J. B. Lacy and R. N. Wright
In Proceedings of the 3rd ACM Conference on Computer and
Communications Security, pages 38–47, March 1996. doi:10.1145/238168.238184
Additional information: journal version
-
A secure group
membership protocol
M. K. Reiter
IEEE Transactions on Software Engineering
22(1):31–42, January 1996. doi:10.1109/32.481515
©IEEE
-
Securing
causal relationships in distributed systems
M. K. Reiter and L. Gong
The Computer Journal 38(8):633–642, 1995.
doi:10.1093/comjnl/38.8.633
©British Computer Society
-
The Rampart toolkit for building
high-integrity services
M. K. Reiter
In Theory and Practice in Distributed Systems (Lecture
Notes in Computer Science 938), pages 99–110, 1995.
©Springer
-
The design and implementation of a secure
auction service
M. K. Franklin and M. K. Reiter
In Proceedings of the 1995 IEEE Symposium on Security and
Privacy, pages 2–14, May 1995. doi:10.1109/SECPRI.1995.398918
©IEEE
Additional information: journal version
-
Verifiable signature sharing
M. K. Franklin and M. K. Reiter
In Advances in Cryptology—EUROCRYPT '95 (Lecture
Notes in Computer Science 921), pages 50–63, 1995. ©Springer
-
A security architecture
for fault-tolerant systems
M. K. Reiter, K. P. Birman and R. van Renesse
ACM Transactions on Computer Systems 12(4):340–371,
November 1994. doi:10.1145/195792.195823
©ACM
-
Secure agreement protocols: Reliable and
atomic group multicast in Rampart
M. K. Reiter
In Proceedings of the 2nd ACM Conference on Computer and
Communication Security, pages 68–80, November 1994. doi:10.1145/191177.191194
©ACM
-
How to securely replicate services
M. K. Reiter and K. P. Birman
ACM Transactions on Programming Languages and Systems
16(3):986–1009, May 1994. doi:10.1145/177492.177745
©ACM
-
A secure group membership protocol
M. K. Reiter
In Proceedings of the 1994 IEEE Symposium on Research in
Security and Privacy, pages 176–189, May 1994. doi:10.1109/RISP.1994.296582
©IEEE
Additional information: journal version
-
Preventing denial and forgery
of causal relationships in distributed systems
M. K. Reiter and L. Gong
In Proceedings of the 1993 IEEE Symposium on Research in
Security and Privacy, pages 30–40, May 1993. doi:10.1109/RISP.1993.287645
©IEEE
Additional information: journal version
-
Integrating security in a
group oriented distributed system
M. K. Reiter, K. P. Birman and L. Gong
In Proceedings of the 1992 IEEE Symposium on Research in
Security and Privacy, pages 18–32, May 1992. doi:10.1109/RISP.1992.213273
©IEEE