Michael Reiter :: Ph.D. Students
If you are interested in joining my new research group at Duke as a
Ph.D. student, a formal application to
the Department of Computer
Science or Department of
Electrical and Computer Engineering is a necessary first step.
Please see the
application instructions for more information. You are welcome
to send me email to introduce yourself, but do not be discouraged if
I do not respond; I might just be putting off applications until the
usual internal decision-making schedule. I will do my best to look
at all applications that
indicate me as a potential advisor. Evidence of
research aptitude (projects, publications, or even just well-formed
thoughts about your research interests) will strengthen your
I currently advise the following Ph.D. students:
- Andrew Chi
- Adam Humphries
- Zonghao Huang
- Zehuan Li
- Andrew Reed
- Ke Coby Wang
The following students have completed a Ph.D. under my supervision.
- Michael Abd-El-Malek, Ph.D., 2010.
Thesis: File System Virtual Appliances
- Darrell Bethea, Ph.D., 2015.
Thesis: WACCO and LOKO: Strong Consistency at Global Scale
- Robby Cochran, Ph.D., 2016.
Thesis: Symbolic Verification of Remote Client Behavior in Distributed Systems
- Michael Collins,
Thesis: A Protocol Graph
Based Anomaly Detection System
- Debin Gao, Ph.D., 2007.
Thesis: Gray-box Anomaly
Detection Using System Call Monitoring
- Scott Garriss,
Thesis: Efficient, Usable
Proof-Construction Strategies for Distributed Access-Control Systems
- James Hendricks, Ph.D., 2009.
Thesis: Efficient Byzantine Fault Tolerance for Scalable Storage and Services
- Victor Heorhiadi, Ph.D., 2017.
Thesis: Expression and Composition of Optimization-Based Applications for Software-Defined Networking
- Peng Li, Ph.D., 2014.
Thesis: Replication and Placement for Security in Distributed Systems
- Sheng Liu, Ph.D., 2021.
Thesis: Efficient and Safe Migration of Network Functions Using Software-Defined Networking
- Jonathan McCune, Ph.D., 2009.
Thesis: Reducing the Trusted Computing Base for Applications on Commodity Systems
- Michael Merideth, Ph.D., 2009.
Thesis: Efficient Survivability for Highly Replicated Services
- Alina Oprea, Ph.D., 2007.
Thesis: Efficient Cryptographic
Techniques for Securing Storage Systems
Oprea, Ph.D., 2008.
Thesis: Quorum Placement on
- Asad Samar, Ph.D., 2006.
Thesis: Quiver on the Edge:
Consistent Scalable Edge Services
- Vyas Sekar, Ph.D., 2010.
Thesis: Effective Network Management
via System-Wide Coordination and Optimization
- Lei Wei, Ph.D., 2013.
Thesis: Privacy-Preserving Regular Expression Evaluation on Encrypted Data
- Qiuyu Xiao, Ph.D., 2019.
Thesis: Efficient Data Protection by Noising, Masking, and Metering
- Ting-Fang Yen, Ph.D., 2011.
Thesis: Detecting Stealthy Malware Using Behavioral Features in Network Traffic
- Yinqian Zhang, Ph.D., 2014.
Thesis: Cache-Based Side-Channel Attacks in Multi-Tenant Public Clouds and Their Countermeasures
- Ziqiao Zhou, Ph.D., 2020.
Thesis: Evaluating Information Leakage by Quantitative and Interpretable Measurements
I have also worked closely with several other students on their
Ph.D. thesis research (but not as their official advisors).
- Scott Coull,
- Garth Goodson, Ph.D.,
- Qatrunnada Ismail, Ph.D., 2018.
- Fabian Monrose,
- Rob Reeder, Ph.D., 2008.
- Mahmood Sharif,
- Kami Vaniea, Ph.D., 2012.
Wang, Ph.D., 2004.
Wylie, Ph.D., 2005.
Xie, Ph.D., 2005.