
James B. Duke Distinguished Professor
Michael Reiter is a James B. Duke Distinguished Professor of Computer Science and Electrical & Computer Engineering at Duke University. His previous positions include Director of Secure Systems Research at Bell Labs; Professor of Electrical & Computer Engineering and Computer Science at Carnegie Mellon University, where he was the founding Technical Director of CyLab; and Distinguished Professor of Computer Science at the University of North Carolina at Chapel Hill.
Appointments and Affiliations
- James B. Duke Distinguished Professor
- Professor of Computer Science
- Professor of Electrical and Computer Engineering
Contact Information
- Office Location: 308 Research Drive D310, Box 90129, Durham, NC 27708
- Office Phone: (919) 660-6524
- Email Address: michael.reiter@duke.edu
- Websites:
Education
- Ph.D. Cornell University, 1993
Research Interests
Prof. Reiter's research interests include all areas of computer and communications security, fault-tolerant distributed computing, and applied cryptography.
Awards, Honors, and Distinctions
- Outstanding Contributions Award. ACM Special Interest Group on Security, Audit and Control (SIGSAC). 2016
- Fellow. IEEE. 2014
- Fellow. ACM. 2008
Courses Taught
- COMPSCI 351: Computer Security
- COMPSCI 581: Computer Security
- COMPSCI 582: Cryptography
- COMPSCI 590: Advanced Topics in Computer Science
- ECE 590: Advanced Topics in Electrical and Computer Engineering
- ECE 656: Cryptography
In the News
- The Growing Role of Computation in Science (Feb 9, 2022 | Duke Research Blog)
- Duke Awards 22 Distinguished Professorships (Jun 28, 2021)
Representative Publications
- Reiter, Michael K. “Tackling Credential Abuse Together.” In Proceedings of the Thirteenth Acm Conference on Data and Application Security and Privacy. ACM, 2023. https://doi.org/10.1145/3577923.3587262.
- Landwehr, C., M. K. Reiter, L. Williams, G. Tsudik, T. Jaeger, T. Kohno, and A. Kapadia. “Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription.” Ieee Security and Privacy 21, no. 2 (March 1, 2023): 32–42. https://doi.org/10.1109/MSEC.2022.3208721.
- Yandamuri, S., I. Abraham, K. Nayak, and M. K. Reiter. “Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption.” In Leibniz International Proceedings in Informatics, Lipics, Vol. 253, 2023. https://doi.org/10.4230/LIPIcs.OPODIS.2022.24.
- Lucas, K., M. Sharif, L. Bauer, M. K. Reiter, and S. Shintre. “Deceiving ML-Based Friend-or-Foe Identification for Executables.” In Advances in Information Security, 89:217–49, 2023. https://doi.org/10.1007/978-3-031-16613-6_10.
- Wang, K. C., and M. K. Reiter. “Using Amnesia to Detect Credential Database Breaches.” In Advances in Information Security, 89:183–215, 2023. https://doi.org/10.1007/978-3-031-16613-6_9.