Michael Reiter
Computer Science
James B. Duke Distinguished Professor of Computer Science
Research Themes
Trustworthy Computing
Research Interests
Prof. Reiter's research interests include all areas of computer and communications security, fault-tolerant distributed computing, and applied cryptography.
Bio
Michael Reiter is a James B. Duke Distinguished Professor of Computer Science and Electrical & Computer Engineering at Duke University. His previous positions include Director of Secure Systems Research at Bell Labs; Professor of Electrical & Computer Engineering and Computer Science at Carnegie Mellon University, where he was the founding Technical Director of CyLab; and Distinguished Professor of Computer Science at the University of North Carolina at Chapel Hill.
Education
- Ph.D. Cornell University, 1993
Positions
- James B. Duke Distinguished Professor of Computer Science
- Professor of Computer Science
- Professor of Electrical and Computer Engineering
Awards, Honors, and Distinctions
- Test of Time Award. Intel Hardware Security Academic Awards. 2024
- Lasting Research Award. ACM Conference on Data and Application Security and Privacy. 2024
- Test of Time Award. ACM Conference on Computer and Communications Security. 2022
- Test of Time Award. ACM Conference on Computer and Communications Security. 2019
- Outstanding Contributions Award. ACM Special Interest Group on Security, Audit and Control (SIGSAC). 2016
- Fellow. IEEE. 2014
- Fellow. ACM. 2008
Courses Taught
- ECE 899: Special Readings in Electrical Engineering
- ECE 891: Internship
- ECE 656: Cryptography
- ECE 590: Advanced Topics in Electrical and Computer Engineering
- COMPSCI 590: Advanced Topics in Computer Science
- COMPSCI 582: Cryptography
- COMPSCI 581: Computer Security
- COMPSCI 393: Research Independent Study
- COMPSCI 391: Independent Study
- COMPSCI 351: Introduction to Computer Security
Publications
- Zhou L, Liu Z, Zhang F, Reiter MK. CrudiTEE: A Stick-And-Carrot Approach to Building Trustworthy Cryptocurrency Wallets with TEEs. In: Leibniz International Proceedings in Informatics, LIPIcs. 2024.
- Huang Z, Gong NZ, Reiter MK. A General Framework for Data-Use Auditing of ML Models. 2024.
- Zhang Y, Gong N, Reiter MK. Concealing Backdoor Model Updates in Federated Learning by Trigger-Optimized Data Poisoning. 2024.
- Wang W, Niu J, Reiter MK, Zhang Y. Formally Verifying a Rollback-Prevention Protocol for TEEs. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2024. p. 155–73.
- Bandarupalli A, Bhat A, Chaterji S, Reiter MK, Kate A, Bagchi S. SensorBFT: Fault-Tolerant Target Localization Using Voronoi Diagrams and Approximate Agreement. In: Proceedings - International Conference on Distributed Computing Systems. 2024. p. 186–97.
- Bandarupalli A, Bhat A, Bagchi S, Kate A, Liu-Zhang CD, Reiter MK. Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles. In: Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2024. 2024. p. 456–69.
- Liu H, Reiter MK, Gong NZ. Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models. In: Proceedings of the 33rd USENIX Security Symposium. 2024. p. 2919–36.
- Huang Z, Bauer L, Reiter MK. The Impact of Exposed Passwords on Honeyword Efficacy. In: Proceedings of the 33rd USENIX Security Symposium. 2024. p. 559–76.
- Jain P, Reed AC, Reiter MK. Near-Optimal Constrained Padding for Object Retrievals with Dependencies. In: Proceedings of the 33rd USENIX Security Symposium. 2024. p. 4087–102.
- Xing J, Yoo S, Foukas X, Kim D, Reiter MK. On the Criticality of Integrity Protection in 5G Fronthaul Networks. In: Proceedings of the 33rd USENIX Security Symposium. 2024. p. 4463–79.
- Chi A, Anderson B, Reiter MK. Prioritizing Remediation of Enterprise Hosts by Malware Execution Risk. In: ACM International Conference Proceeding Series. 2023. p. 550–64.
- Bhat A, Bandarupalli A, Nagaraj M, Bagchi S, Kate A, Reiter MK. EESMR: Energy Efficient BFT - -SMR for the masses. In: Middleware 2023 - Proceedings of the 24th ACM/IFIP International Middleware Conference. 2023. p. 1–14.
- Reiter MK. Tackling Credential Abuse Together. In: Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy. ACM; 2023. p. 1–1.
- Landwehr C, Reiter MK, Williams L, Tsudik G, Jaeger T, Kohno T, et al. Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription. IEEE Security and Privacy. 2023 Mar 1;21(2):32–42.
- Yandamuri S, Abraham I, Nayak K, Reiter MK. Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption. In: Leibniz International Proceedings in Informatics, LIPIcs. 2023.
- Chakraborti A, Fanti G, Reiter MK. Distance-Aware Private Set Intersection. In: 32nd USENIX Security Symposium, USENIX Security 2023. 2023. p. 319–36.
- Chakraborti A, Reiter MK. Privately Evaluating Region Overlaps with Applications to Collaborative Sensor Output Validation. In: Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023. 2023. p. 1013–29.
- Lucas K, Sharif M, Bauer L, Reiter MK, Shintre S. Deceiving ML-Based Friend-or-Foe Identification for Executables. In: Advances in Information Security. 2023. p. 217–49.
- Wang KC, Reiter MK. Using Amnesia to Detect Credential Database Breaches. In: Advances in Information Security. 2023. p. 183–215.
- Liu S, Reiter MK, Benson TA. Nimble: Fast and Safe Migration of Network Functions. In: Proceedings - IEEE INFOCOM. 2023.
- Lucas K, Bauer L, Pai S, Reiter MK, Lin W, Sharif M. Adversarial Training for Raw-Binary Malware Classifiers. In: 32nd USENIX Security Symposium, USENIX Security 2023. 2023. p. 1163–80.
- Reed AC, Reiter MK. Optimally Hiding Object Sizes with Constrained Padding. In: Proceedings - IEEE Computer Security Foundations Symposium. 2023. p. 505–20.
- Wang KC, Reiter MK. Bernoulli honeywords. 2022.
- Wang W, Deng S, Niu J, Reiter MK, Zhang Y. ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes. In: Proceedings of the ACM Conference on Computer and Communications Security. 2022. p. 2841–55.
- Wang K, Xu L, Perrault A, Reiter MK, Tambe M. Coordinating Followers to Reach Better Equilibria: End-to-End Gradient Descent for Stackelberg Games. In: Proceedings of the 36th AAAI Conference on Artificial Intelligence, AAAI 2022. 2022. p. 5219–27.
- Zhang X, Hamm J, Reiter MK, Zhang Y. Defeating traffic analysis via differential privacy: a case study on streaming traffic. International Journal of Information Security. 2022 Jun 1;21(3):689–706.
- Lin W, Lucas K, Bauer L, Reiter MK, Sharif M. Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks. In: Proceedings of Machine Learning Research. 2022. p. 13405–30.
- Bender CM, Emmanuel PR, Reiter MK, Oliva JB. PRACTICAL INTEGRATION VIA SEPARABLE BIJECTIVE NETWORKS. In: ICLR 2022 - 10th International Conference on Learning Representations. 2022.
- Chakraborti A, Fanti G, Reiter MK. Distance-Aware Private Set Intersection. 2021 Dec 29;
- Lin W, Lucas K, Bauer L, Reiter MK, Sharif M. Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks. 2021 Dec 28;
- Yandamuri S, Abraham I, Nayak K, Reiter M. Brief announcement: Communication-efficient BFT using small trusted hardware to tolerate minority corruption. In: Leibniz International Proceedings in Informatics, LIPIcs. 2021.
- Zhou Z, Reiter MK. Interpretable noninterference measurement and its application to processor designs. Proceedings of the ACM on Programming Languages. 2021 Oct 1;5(OOPSLA).
- Reed AC, Reiter MK. Optimally Hiding Object Sizes with Constrained Padding. 2021 Aug.
- Lucas K, Sharif M, Bauer L, Reiter MK, Shintre S. Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes. In: ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. 2021. p. 744–58.
- Anjum I, Zhu M, Polinsky I, Enck W, Reiter MK, Singh MP. Role-Based Deception in Enterprise Networks. In: CODASPY 2021 - Proceedings of the 11th ACM Conference on Data and Application Security and Privacy. 2021. p. 65–76.
- Severini J, Mysore RN, Sekar V, Banerjee S, Reiter MK. The Netivus Manifesto: Making Collaborative Network Management Easier for the Rest of Us. Vol. 51, Computer Communication Review. 2021. p. 10–7.
- Humphries A, Cating-Subramanian K, Reiter MK. TASE: Reducing Latency of Symbolic Execution with Transactional Memory. In: 28th Annual Network and Distributed System Security Symposium, NDSS 2021. 2021.
- Guo C, Campbell B, Kapadia A, Reiter MK, Caine K. Effect of mood, location, trust, and presence of others on video-based social authentication. In: Proceedings of the 30th USENIX Security Symposium. 2021. p. 1–18.
- Wang KC, Reiter MK. Using amnesia to detect credential database breaches. In: Proceedings of the 30th USENIX Security Symposium. 2021. p. 839–55.
- Mi Z, Chen H, Zhang Y, Peng S, Wang X, Reiter M. CPU Elasticity to Mitigate Cross-VM Runtime Monitoring. IEEE Transactions on Dependable and Secure Computing. 2020 Sep 1;17(5):1094–108.
- Xiao Q, Subialdea B, Bauer L, Reiter MK. Metering graphical data leakage with snowman. In: Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. 2020. p. 1–12.
- Polinsky I, Martin K, Enck W, Reiter MK. N-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications. In: CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy. 2020. p. 235–46.
- Wang KC, Reiter MK. Detecting stuffing of a user's credentials at her own accounts. In: Proceedings of the 29th USENIX Security Symposium. 2020. p. 2201–18.
- Bender CM, Li Y, Shi Y, Reiter MK, Oliva JB. Defense through diverse directions. In: 37th International Conference on Machine Learning, ICML 2020. 2020. p. 733–43.
- Lucas K, Sharif M, Bauer L, Reiter MK, Shintre S. Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes. 2019 Dec.
- Sharif M, Bauer L, Reiter MK. $n$-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers. 2019 Dec.
- Basu S, Malkhi D, Tomescu A, Reiter MK, Abraham I, Sirer EG. Efficient verifiable secret sharing with share recovery in BFT protocols. In: Proceedings of the ACM Conference on Computer and Communications Security. 2019. p. 2387–402.
- Yin M, Malkhi D, Reiter MK, Gueta GG, Abraham I. HotStuff: BFT Consensus with linearity and responsiveness. In: Proceedings of the Annual ACM Symposium on Principles of Distributed Computing. 2019. p. 347–56.
- Sharif M, Bhagavatula S, Bauer L, Reiter MK. A general framework for adversarial examples with objectives. ACM Transactions on Privacy and Security. 2019 Jun 10;22(3).
- Golan Gueta G, Abraham I, Grossman S, Malkhi D, Pinkas B, Reiter M, et al. SBFT: A Scalable and Decentralized Trust Infrastructure. In: Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019. 2019. p. 568–80.
- Liu S, Benson TA, Reiter MK. Efficient and safe network updates with suffix causal consistency. In: Proceedings of the 14th EuroSys Conference 2019. 2019.
- Wang KC, Reiter MK. How to End Password Reuse on the Web. In: Proceedings 2019 Network and Distributed System Security Symposium. Internet Society; 2019.
- Andrabi SJ, Reiter MK, Sturton C. Usability of augmented reality for revealing secret messages to users but not their devices. In: SOUPS 2015 - Proceedings of the 11th Symposium on Usable Privacy and Security. 2019. p. 89–102.
- Wang KC, Reiter MK. How to End Password Reuse on the Web. In: 26th Annual Network and Distributed System Security Symposium, NDSS 2019. 2019.
- Zhang X, Hamm J, Reiter MK, Zhang Y. Statistical Privacy for Streaming Traffic. In: 26th Annual Network and Distributed System Security Symposium, NDSS 2019. 2019.
- Heorhiadi V, Chandrasekaran S, Reiter MK, Sekar V. Intent-driven composition of resource-management SDN applications. In: CoNEXT 2018 - Proceedings of the 14th International Conference on Emerging Networking EXperiments and Technologies. 2018. p. 86–97.
- Duan S, Reiter MK, Zhang H. BEAT: Asynchronous BFT made practical. In: Proceedings of the ACM Conference on Computer and Communications Security. 2018. p. 2028–41.
- Chen G, Lai TH, Reiter MK, Zhang Y. Differentially Private Access Patterns for Searchable Symmetric Encryption. In: Proceedings - IEEE INFOCOM. 2018. p. 810–8.
- Zhou Z, Qian Z, Reiter MK, Zhang Y. Static Evaluation of Noninterference Using Approximate Model Counting. In: Proceedings - IEEE Symposium on Security and Privacy. 2018. p. 514–28.
- Duan S, Reiter MK, Zhang H. Secure Causal Atomic Broadcast, Revisited. In: Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017. 2017. p. 61–72.
- Liu S, Reiter MK, Sekar V. Flow Reconnaissance via Timing Attacks on SDN Switches. In: Proceedings - International Conference on Distributed Computing Systems. 2017. p. 196–206.
- Aikat J, Akella A, Chase JS, Juels A, Reiter MK, Ristenpart T, et al. Rethinking Security in the Era of Cloud Computing. IEEE Security and Privacy. 2017 May 1;15(3):60–9.
- Chen S, Zhang X, Reiter MK, Zhang Y. Detecting privileged side-channel attacks in shielded execution with Déjà Vu. In: ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. 2017. p. 7–18.
- Liu W, Gao D, Reiter MK. On-demand time blurring to support side-channel defense. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2017. p. 210–28.
- Aikat J, Akella A, Chase JS, Juels A, Reiter MK, Ristenpart T, et al. Rethinking Security in the Era of Cloud Computing. IEEE Security and Privacy. 2017 Jan 1;15(3):60–9.
- Chi A, Cochran RA, Nesfield M, Reiter MK, Sturton C. A system to verify network behavior of known cryptographic clients. In: Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017. 2017. p. 177–95.
- Aljuraidan J, Bauer L, Reiter MK, Beckerle M. Introducing reputation systems to the economics of outsourcing computations to rational workers. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2017. p. 60–77.
- Androulaki E, Reiter MK. CCSW 2016 - Proceedings of the 2016 ACM Cloud Computing Security Workshop, co-located with CCS 2016: Foreword. In: CCSW 2016 - Proceedings of the 2016 ACM Cloud Computing Security Workshop, co-located with CCS 2016. 2016. p. iii.
- Sharif M, Bhagavatula S, Bauer L, Reiter MK. Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In: Proceedings of the ACM Conference on Computer and Communications Security. 2016. p. 1528–40.
- Androulaki E, Reiter MK. 8th ACM Cloud computing security workshop. In: Proceedings of the ACM Conference on Computer and Communications Security. 2016. p. 1882–3.
- Zhou Z, Reiter MK, Zhang Y. A software approach to defeating side channels in last-level caches. In: Proceedings of the ACM Conference on Computer and Communications Security. 2016. p. 871–82.
- Heorhiadi V, Rajagopalan S, Jamjoom H, Reiter MK, Sekar V. Gremlin: Systematic Resilience Testing of Microservices. In: Proceedings - International Conference on Distributed Computing Systems. 2016. p. 57–66.
- Chi A, Cochran R, Nesfield M, Reiter MK, Sturton C. Server-side verification of client behavior in cryptographic protocols. 2016 Mar.
- Bethea D, Reiter MK, Qian F, Xu Q, Mao ZM. WACCO and LOKO: Strong Consistency at Global Scale. In: Proceedings - 2015 IEEE Conference on Collaboration and Internet Computing, CIC 2015. 2016. p. 130–41.
- Tramèr F, Zhang F, Juels A, Reiter MK, Ristenpart T. Stealing Machine Learning Models via Prediction APIs. In: Holz T, Savage S, editors. 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016. USENIX Association; 2016. p. 601–18.
- Snyder P, Kanich C, Reiter MK. The effect of repeated login prompts on phishing susceptibility. In: 2016 LASER Workshop - Learning from Authoritative Security Experiment Results. 2016. p. 13–9.
- Heorhiadi V, Reiter MK, Sekar V. Simplifying software-defined network optimization using SOL. In: Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2016. 2016. p. 223–37.
- Xiao Q, Reiter MK, Zhang Y. Mitigating storage side channels using statistical privacy mechanisms. In: Proceedings of the ACM Conference on Computer and Communications Security. 2015. p. 1582–94.
- Moon SJ, Sekar V, Reiter MK. Nomad: Mitigating arbitrary cloud side channels via provider-assisted migration. In: Proceedings of the ACM Conference on Computer and Communications Security. 2015. p. 1595–606.
- Wei L, Reiter MK. Toward practical encrypted email that supports private, regular-expression searches. International Journal of Information Security. 2015 Oct 1;14(5):397–416.
- Li P, Gao D, Reiter MK. Replica Placement for Availability in the Worst Case. In: Proceedings - International Conference on Distributed Computing Systems. 2015. p. 599–608.
- Moradi M, Qian F, Xu Q, Mao ZM, Bethea D, Reiter MK. Caesar: High-speed and memory-efficient forwarding engine for future internet architecture. In: ANCS 2015 - 11th 2015 ACM/IEEE Symposium on Architectures for Networking and Communications Systems. 2015. p. 171–82.
- Heorhiadi V, Reiter MK, Sekar V. Accelerating the Development of Software-Defined Network Optimization Applications Using SOL. 2015 Apr.
- Ismail Q, Ahmed T, Kapadia A, Reiter MK. Crowdsourced exploration of security configurations. In: Conference on Human Factors in Computing Systems - Proceedings. 2015. p. 467–76.
- Libonati A, Caine K, Kapadia A, Reiter MK. Defending against device theft with human notarization. In: CollaborateCom 2014 - Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing. 2015. p. 8–17.
- Zhang Y, Juels A, Reiter MK, Ristenpart T. Cross-tenant side-channel attacks in PaaS clouds. In: Proceedings of the ACM Conference on Computer and Communications Security. 2014. p. 990–1003.
- Yen TF, Heorhiadi V, Oprea A, Reiter MK, Juels A. An epidemiological study of malware encounters in a large enterprise. In: Proceedings of the ACM Conference on Computer and Communications Security. 2014. p. 1117–30.
- Li P, Gao D, Reiter MK. Stop watch: A cloud architecture for timing channel mitigation. ACM Transactions on Information and System Security. 2014 Nov 1;17(2).
- Reiter M, Neves N. Message from program Chairs. In: Proceedings of the International Conference on Dependable Systems and Networks. 2014. p. xvi.
- Heorhiadi V, Fayaz SK, Reiter MK, Sekar V. SNIPS: A software-defined approach for scaling intrusion prevention systems via offloading. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2014. p. 9–29.
- Mazurek ML, Liang Y, Melicher W, Sleeper M, Bauer L, Ganger GR, et al. Toward strong, usable access control for shared distributed data. In: Proceedings of the 12th USENIX Conference on File and Storage Technologies, FAST 2014. 2014. p. 89–103.
- Zhang Y, Reiter MK. Düppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud. In: Proceedings of the ACM Conference on Computer and Communications Security. 2013. p. 827–37.
- Bauer L, Cranor LF, Komanduri S, Mazurek ML, Reiter MK, Sleeper M, et al. The post anachronism: The temporal dimension of Facebook privacy. In: Proceedings of the ACM Conference on Computer and Communications Security. 2013. p. 1–12.
- Wei L, Reiter MK. Ensuring file authenticity in private DFA evaluation on encrypted files in the cloud. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2013. p. 147–63.
- Li P, Gao D, Reiter MK. Mitigating access-driven timing channels in clouds using StopWatch. In: Proceedings of the International Conference on Dependable Systems and Networks. 2013.
- Kum HC, Krishnamurthy A, Pathak D, Reiter MK, Ahalt S. Secure Decoupled Linkage (SDLink) system for building a social genome. In: Proceedings - 2013 IEEE International Conference on Big Data, Big Data 2013. 2013. p. 7–11.
- Fayazbakhsh SK, Reiter MK, Sekar V. Verifiable network function outsourcing: Requirements, challenges, and roadmap. In: HotMiddlebox 2013 - Proceedings of the 2013 Workshop on Hot Topics in Middleboxes and Network Function Virtualization. 2013. p. 25–30.
- Cochran RA, Reiter MK. Toward Online Verification of Client Behavior in Distributed Applications. In: 20th Annual Network and Distributed System Security Symposium, NDSS 2013. 2013.
- Heorhiadi V, Reiter MK, Sekar V. New opportunities for load balancing in network-wide intrusion detection systems. In: CoNEXT 2012 - Proceedings of the 2012 ACM Conference on Emerging Networking Experiments and Technologies. 2012. p. 361–72.
- Zhang Y, Juels A, Reiter MK, Ristenpart T. Cross-VM side channels and their use to extract private keys. In: Proceedings of the ACM Conference on Computer and Communications Security. 2012. p. 305–16.
- Vaniea K, Bauer L, Cranor LF, Reiter MK. Out of sight, out of mind: Effects of displaying access-control information near the item it controls. In: 2012 10th Annual International Conference on Privacy, Security and Trust, PST 2012. 2012. p. 128–36.
- Vaniea K, Bauer L, Cranor LF, Reiter MK. Studying access-control usability in the lab: Lessons learned from four studies. In: ACM International Conference Proceeding Series. 2012. p. 31–40.
- Coull SE, White AM, Yen TF, Monrose F, Reiter MK. Understanding domain registration abuses. In: Computers and Security. 2012. p. 806–15.
- Yavuz AA, Ning P, Reiter MK. Efficient, compromise resilient and append-only cryptographic schemes for secure audit logging. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2012. p. 148–63.
- Wei L, Reiter MK. Third-party private DFA evaluation on encrypted files in the cloud. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2012. p. 523–40.
- Abd-El-malek M, Wachs M, Cipar J, Sanghi K, Ganger GR, Gibson GA, et al. File system virtual appliances: Portable file system implementations. ACM Transactions on Storage. 2012 Sep 1;8(3).
- Yavuz AA, Ning P, Reiter MK. BAF and FI-BAF: Efficient and publicly verifiable cryptographic schemes for secure logging in resource-constrained systems. ACM Transactions on Information and System Security. 2012 Jul 1;15(2).
- Yen TF, Reiter MK. Revisiting botnet models and their implications for takedown strategies. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2012. p. 249–68.
- Bauer L, Liang Y, Reiter MK, Spensky C. Discovering Access-Control Misconfigurations: New Approaches and Evaluation Methodologies. In: CODASPY’12 - Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy. 2012. p. 95–104.
- Sekar V, Egi N, Ratnasamy S, Reiter MK, Shi G. Design and implementation of a consolidated middlebox architecture. In: Proceedings of NSDI 2012: 9th USENIX Symposium on Networked Systems Design and Implementation. 2012. p. 323–36.
- Sekar V, Ratnasamy S, Reiter MK, Egi N, Shi G. The middlebox manifesto: Enabling innovation in middlebox deployment. In: Proceedings of the 10th ACM Workshop on Hot Topics in Networks, HotNets-10. 2011.
- Huang X, Monrose F, Reiter MK. Amplifying limited expert input to sanitize large network traces. In: Proceedings of the International Conference on Dependable Systems and Networks. 2011. p. 494–505.
- Liu Y, Ning P, Reiter MK. False data injection attacks against state estimation in electric power grids. In: ACM Transactions on Information and System Security. 2011.
- Bauer L, Garriss S, Reiter MK. Detecting and resolving policy misconfigurations in access-control systems. In: ACM Transactions on Information and System Security. 2011.
- Libonati A, McCune JM, Reiter MK. Usability Testing a Malware-Resistant Input Mechanism. In: Proceedings of the Symposium on Network and Distributed System Security, NDSS 2011. 2011.
- Zhang Y, Juels A, Oprea A, Reiter MK. HomeAlone: Co-residency detection in the cloud via side-channel analysis. In: Proceedings - IEEE Symposium on Security and Privacy. 2011. p. 313–28.
- Wei L, Reiter MK, Mayer-Patel K. Summary-invisible networking: Techniques and defenses. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2011. p. 210–25.
- Bethea D, Cochran RA, Reiter MK. Server-Side Verification Of Client Behavior In Online Games. ACM Transactions on Information and System Security. 2011 Jan 1;14(4):1–27.
- Wei L, Coull SE, Reiter MK. Bounded vector signatures and their applications. In: Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011. 2011. p. 277–85.
- Reeder RW, Bauer L, Cranor LF, Reiter MK, Vaniea K. More than skin deep: Measuring effects of the underlying model on access-control system usability. In: Conference on Human Factors in Computing Systems - Proceedings. 2011. p. 2065–74.
- Zhang Y, Monrose F, Reiter MK. The security of modern password expiration: An algorithmic framework and empirical analysis. In: Proceedings of the ACM Conference on Computer and Communications Security. 2010. p. 176–86.
- Sekar V, Krishnaswamy R, Gupta A, Reiter MK. Network-wide deployment of intrusion detection and prevention systems. In: Proceedings of the 6th International Conference on Emerging Networking Experiments and Technologies, Co-NEXT’10. 2010.
- Coull SE, White AM, Yen TF, Monrose F, Reiter MK. Understanding domain registration abuses. In: IFIP Advances in Information and Communication Technology. 2010. p. 68–79.
- Hendricks J, Sinnamohideen S, Ganger GR, Reiter MK. Zzyzx: Scalable fault tolerance through Byzantine locking. In: Proceedings of the International Conference on Dependable Systems and Networks. 2010. p. 363–72.
- Yen TF, Reiter MK. Are your hosts trading or plotting? Telling P2P file-sharing and bots apart. In: Proceedings - International Conference on Distributed Computing Systems. 2010. p. 241–52.
- Mazurek ML, Arsenault JP, Bresee J, Gupta N, Ion I, Johns C, et al. Access control for home data sharing: Evaluating social acceptability. In: Conference on Human Factors in Computing Systems - Proceedings. 2010. p. 645–54.
- Sekar V, Gupta A, Reiter MK, Zhang H. Coordinated sampling sans origin-destination identifiers: Algorithms and analysis. In: 2010 2nd International Conference on COMmunication Systems and NETworks, COMSNETS 2010. 2010.
- Wang X, Reiter MK. Using web-referral architectures to mitigate denial-of-service threats. IEEE Transactions on Dependable and Secure Computing. 2010 Apr 30;7(2):203–16.
- Merideth MG, Reiter MK. Selected results from the latest decade of quorum systems research. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2010. p. 185–206.
- Li P, Liu L, Gao D, Reiter MK. On challenges in evaluating malware clustering. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2010. p. 238–55.
- Bethea D, Cochran RA, Reiter MK. Server-side Verification of Client Behavior in Online Games. In: Proceedings of the Symposium on Network and Distributed System Security, NDSS 2010. 2010.
- Sekar V, Reiter MK, Zhang H. Revisiting the case for a minimalist approach for network flow monitoring. In: Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC. 2010. p. 328–41.
- Reiter MK, Sekar V, Spensky C, Zhang Z. Making peer-assisted content distribution robust to collusion using bandwidth puzzles. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2009. p. 132–47.
- Li P, Gao D, Reiter MK. Automatically adapting a trained anomaly detector to software patches. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2009. p. 142–60.
- Oh YH, Ning P, Liu Y, Reiter MK. Authenticated data compression in delay tolerant wireless sensor networks. In: INSS2009 - 6th International Conference on Networked Sensing Systems. 2009. p. 137–44.
- Wang R, Wang XF, Li Z, Tang H, Reiter MK, Dong Z. Privacy-preserving genomic computation through program specialization. In: Proceedings of the ACM Conference on Computer and Communications Security. 2009. p. 338–47.
- Bauer L, Cranor LF, Reeder RW, Reiter MK, Vaniea K. Real life challenges in access-control management. In: Conference on Human Factors in Computing Systems - Proceedings. 2009. p. 899–908.
- Merideth MG, Oprea F, Reiter MK. When and how to change quorums on wide area networks. In: Proceedings of the IEEE Symposium on Reliable Distributed Systems. 2009. p. 12–21.
- Liu Y, Ning P, Reiter MK. False data injection attacks against state estimation in electric power grids. In: Proceedings of the ACM Conference on Computer and Communications Security. 2009. p. 21–32.
- Bauer L, Jia L, Reiter MK, Swasey D. XDomain: Cross-border proofs of access. In: Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. 2009. p. 43–52.
- Bethea D, Reiter MK. Data structures with unpredictable timing. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2009. p. 456–71.
- Yen TF, Huang X, Monrose F, Reiter MK. Browser fingerprinting from coarse traffic summaries: Techniques and implications. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2009. p. 157–75.
- Coull SE, Monrose F, Reiter MK, Bailey M. The challenges of effectively anonymizing network data. In: Proceedings - Cybersecurity Applications and Technology Conference for Homeland Security, CATCH 2009. 2009. p. 230–6.
- Gao D, Reiter MK, Song D. Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance. IEEE Transactions on Dependable and Secure Computing. 2009 Jan 1;6(2):96–110.
- McCune JM, Perrig A, Reiter MK. Seeing-Is-Believing: Using camera phones for human-verifiable authentication. International Journal of Security and Networks. 2009 Jan 1;4(1–2):43–56.
- McCune JM, Perrig A, Reiter MK. Safe Passage for Passwords and Other Sensitive Data∗. In: Proceedings of the Symposium on Network and Distributed System Security, NDSS 2009. 2009.
- Bauer L, Cranor LF, Reeder RW, Reiter MK, Vaniea K. A user study of policy creation in a flexible access-control system. In: Conference on Human Factors in Computing Systems - Proceedings. 2008. p. 543–52.
- Reeder RW, Bauer L, Cranor LF, Reiter MK, Bacon K, How K, et al. Expandable grids for visualizing and authoring computer security policies. In: Conference on Human Factors in Computing Systems - Proceedings. 2008. p. 1473–82.
- Bauer L, Garriss S, Reiter MK. Detecting and resolving policy misconfigurations in Access-control systems. In: Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. 2008. p. 185–94.
- Ballard L, Kamara S, Reiter MK, Monrose F. Towards practical biometric key generation with randomized biometric templates. In: Proceedings of the ACM Conference on Computer and Communications Security. 2008. p. 235–44.
- Reiter MK, Samar A. Quiver: Consistent object sharing for edge services. IEEE Transactions on Parallel and Distributed Systems. 2008 Dec 1;19(7):878–89.
- Wang X, Li Z, Choi JY, Xu J, Reiter MK, Kil C. Fast and black-box exploit detection and signature generation for commodity software. ACM Transactions on Information and System Security. 2008 Dec 1;12(2).
- Merideth MG, Reiter MK. Write markers for probabilistic quorum systems. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2008. p. 5–21.
- McCune JM, Parno BJ, Perrig A, Reiter MK, Isozaki H. Flicker: An execution infrastructure for tcb minimization. In: EuroSys’08 - Proceedings of the EuroSys 2008 Conference. 2008. p. 315–28.
- Collins MP, Reiter MK. On the limits of payload-oblivious network attack detection. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2008. p. 251–70.
- Li Z, Wang XF, Liang Z, Reiter MK. AGIS: Towards automatic generation of infection signatures. In: Proceedings of the International Conference on Dependable Systems and Networks. 2008. p. 237–46.
- Reiter MK, Samar A, Wang C. Self-optimizing distributed trees. In: IPDPS Miami 2008 - Proceedings of the 22nd IEEE International Parallel and Distributed Processing Symposium, Program and CD-ROM. 2008.
- Yen TF, Reiter MK. Traffic aggregation for malware detection. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2008. p. 207–27.
- Wang XF, Reiter MK. A multi-layer framework for puzzle-based denial-of-service defense. International Journal of Information Security. 2008 Aug 1;7(4):243–63.
- McCune JM, Parno B, Perrig A, Reiter MK, Seshadri A. How low can you go?: Recommendations for hardware-supported minimal TCB code execution. In: Operating Systems Review (ACM). 2008. p. 14–25.
- McCune JM, Parno BJ, Perrig A, Reiter MK, Isozaki H. Flicker: An execution infrastructure for TCB minimization. In: Operating Systems Review (ACM). 2008. p. 315–28.
- Ballard L, Kamara S, Reiter MK. The practical subtleties of biometric key generation. In: Proceedings of the 17th USENIX Security Symposium. 2008. p. 61–74.
- Sekar V, Reiter MK, Willinger W, Zhang H, Kompella RR, Andersen DG. CSAMP: A system for network-wide flow monitoring. In: 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2008. 2008. p. 233–46.
- Gao D, Reiter MK, Song D. BinHunt: Automatically finding semantic differences in binary programs. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2008. p. 238–55.
- Coull SE, Wright CV, Keromytis AD, Monrose F, Reiter MK. Taming the Devil: Techniques for Evaluating Anonymized Network Data. In: Proceedings of the Symposium on Network and Distributed System Security, NDSS 2008. 2008.
- Hendricks J, Ganger GR, Reiter MK. Verifying distributed erasure-coded data. In: Proceedings of the Annual ACM Symposium on Principles of Distributed Computing. 2007. p. 139–46.
- Bauer L, Cranor LF, Reiter MK, Vaniea K. Lessons learned from the deployment of a smartphone-based access-control system. In: ACM International Conference Proceeding Series. 2007. p. 64–75.
- Hendricks J, Ganger GR, Reiter MK. Low-overhead byzantine fault-tolerant storage. In: SOSP’07 - Proceedings of 21st ACM SIGOPS Symposium on Operating Systems Principles. 2007. p. 73–86.
- Cornwell J, Fette I, Hsieh G, Prabaker M, Rao J, Tang K, et al. User-controllable security and privacy for pervasive computing. In: Proceedings - 8th IEEE Workshop on Mobile Computing Systems and Applications, HOTMOBILE 2007. 2007. p. 14–9.
- Hendricks J, Ganger GR, Reiter MK. Low-overhead byzantine fault-tolerant storage. In: Operating Systems Review (ACM). 2007. p. 73–86.
- Oprea F, Reiter MK. Minimizing response time for quorum-system protocols over wide-area networks. In: Proceedings of the International Conference on Dependable Systems and Networks. 2007. p. 409–18.
- McCune JM, Parno B, Perrig A, Reiter MK, Seshadri A. Minimal TCB code execution. In: Proceedings - IEEE Symposium on Security and Privacy. 2007. p. 267–72.
- Reiter MK. Trustworthy services and the biological analogy. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2007. p. 1.
- Bauer L, Garriss S, Reiter MK. Efficient proving for practical distributed access-control systems. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2007. p. 19–37.
- Oprea A, Reiter MK. Integrity checking in cryptographic file systems with constant trusted storage. In: 16th USENIX Security Symposium. 2007. p. 183–98.
- Collins MP, Reiter MK. Hit-list worm detection and bot identification in large networks using protocol graphs. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2007. p. 276–95.
- Abd-El-Malek M, Ganger GR, Goodson GR, Reiter MK, Wylie JJ. Towards bounded wait-free PASIS. In: Dagstuhl Seminar Proceedings. 2007.
- Bowers KD, Bauer L, Garg D, Pfenning F, Reiter MK. Consumable Credentials in Logic-Based Access-Control Systems. In: Proceedings of the Symposium on Network and Distributed System Security, NDSS 2007. 2007.
- Coull SE, Wright CV, Monrose F, Collins MP, Reiter MK. Playing Devil’s Advocate: Inferring Sensitive Information from Anonymized Network Traces. In: Proceedings of the Symposium on Network and Distributed System Security, NDSS 2007. 2007.
- Coull SE, Collins MP, Wright CV, Monrose F, Reiter MK. On web browsing privacy in anonymized netflows. In: 16th USENIX Security Symposium. 2007. p. 339–52.
- Merideth MG, Reiter MK. Probabilistic opaque quorum systems. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2007. p. 403–19.
- Sekar V, Yinglian X, Reiter MK, Hui Z. A multi-resolution approach for worm detection and containment. In: Proceedings of the International Conference on Dependable Systems and Networks. 2006. p. 189–98.
- Xie Y, Sekar V, Reiter MK, Zhang H. Forensic analysis for epidemic attacks in federated networks. In: Proceedings - International Conference on Network Protocols, ICNP. 2006. p. 43–53.
- Perng G, Reiter MK, Wang C. M2: Multicasting mixes for efficient and anonymous communication. In: Proceedings - International Conference on Distributed Computing Systems. 2006.
- Yinglian X, Reiter MK, O’Hallaron D. Protecting privacy in key-value search systems. In: Proceedings - Annual Computer Security Applications Conference, ACSAC. 2006. p. 493–504.
- Wang XF, Reiter MK. WRAPS: Denial-of-service defense through web referrals. In: Proceedings of the IEEE Symposium on Reliable Distributed Systems. 2006. p. 51–60.
- Wang X, Li Z, Xu J, Reiter MK, Kil C, Choi JY. Packet vaccine: Black-box exploit detection and signature generation. In: Proceedings of the ACM Conference on Computer and Communications Security. 2006. p. 37–46.
- Golovin D, Gupta A, Maggs BM, Oprea F, Reiter MK. Quorum placement in networks: Minimizing network congestion. In: Proceedings of the Annual ACM Symposium on Principles of Distributed Computing. 2006. p. 16–25.
- Peterson L, Anderson T, Blumenthal D, Casey D, Clark D, Estrin D, et al. GENI design principles. Computer. 2006 Sep 1;39(9):102–5.
- McCune JM, Perrig A, Reiter MK. Bump in the Ether: A framework for securing sensitive user input. In: USENIX 2006 Annual Technical Conference. 2006. p. 185–98.
- Collins MP, Reiter MK. Finding peer-to-peer file-sharing using coarse network behaviors. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2006. p. 1–17.
- Gao D, Reiter MK, Song D. Behavioral distance for intrusion detection. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2006. p. 63–81.
- Perng G, Reiter MK, Wang C. Censorship resistance revisited. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2006. p. 62–76.
- Oprea A, Reiter MK. On consistency of encrypted files. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2006. p. 254–68.
- Garg D, Bauer L, Bowers KD, Pfenning F, Reiter MK. A linear logic of authorization and knowledge. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2006. p. 297–312.
- Gao D, Reiter MK, Song D. Behavioral distance measurement using Hidden Markov Models. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2006. p. 19–40.
- Kearns M, Reiter M. Message from the program chairs. In: Proceedings of the ACM Conference on Electronic Commerce. 2005.
- Reiter MK, Samar A, Wang C. Distributed construction of a fault-tolerant network from a tree. In: Proceedings of the IEEE Symposium on Reliable Distributed Systems. 2005. p. 155–65.
- Abd-El-Malek M, Ganger GR, Goodson GR, Reiter MK, Wylie JJ. Lazy verification in fault-tolerant distributed storage systems. In: Proceedings of the IEEE Symposium on Reliable Distributed Systems. 2005. p. 179–90.
- Abd-El-Malek M, Ganger GR, Goodson GR, Reiter MK, Wylie JJ. Fault-scalable Byzantine fault-tolerant services. Operating Systems Review (ACM). 2005 Dec 1;39(5):59–74.
- Abd-El-Malek M, Ganger GR, Goodson GR, Reiter MK, Wylie JJ. Fault-scalable Byzantine fault-tolerant services. In: Proceedings of the 20th ACM Symposium on Operating Systems Principles, SOSP 2005. 2005. p. 59–74.
- Xie Y, Sekar V, Maltz DA, Reiter MK, Zhang H. Worm origin identification using random moonwalks. In: Proceedings - IEEE Symposium on Security and Privacy. 2005. p. 242–56.
- Bauer L, Garriss S, Reiter MK. Distributed proving in access-control systems. In: Proceedings - IEEE Symposium on Security and Privacy. 2005. p. 81–95.
- McCune JM, Perrig A, Reiter MK. Seeing-is-believing: Using camera phones for human-verifiable authentication. In: Proceedings - IEEE Symposium on Security and Privacy. 2005. p. 110–24.
- McCune JM, Shi E, Perrig A, Reiter MK. Detection of denial-of-message attacks on sensor network broadcasts. In: Proceedings - IEEE Symposium on Security and Privacy. 2005. p. 64–78.
- Bauer L, Garriss S, McCune JM, Reiter MK, Rouse J, Rutenbar P. Device-enabled authorization in the grey system. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2005. p. 431–45.
- Reiter M. Security by, and for, converged mobile devices. In: Lecture Notes in Computer Science. 2005. p. 1.
- Gupta A, Maggs BM, Oprea F, Reiter MK. Quorum placement in networks to minimize access delays. In: Proceedings of the Annual ACM Symposium on Principles of Distributed Computing. 2005. p. 87–96.
- Oprea A, Reiter MK, Yang K. Space-Efficient Block Storage Integrity. In: Proceedings of the Symposium on Network and Distributed System Security, NDSS 2005. 2005.
- Reiter MK, Wang XF, Wright M. Building reliable mix networks with fair exchange. In: Lecture Notes in Computer Science. 2005. p. 378–92.
- Fry CP, Reiter MK. Nested objects in a Byzantine quorum-replicated system. In: Proceedings of the IEEE Symposium on Reliable Distributed Systems. 2004. p. 79–89.
- Reiter M, Rohatgi P. Homeland security. IEEE Internet Computing. 2004 Nov 1;8(6):16–7.
- Collins M, Reiter MK. An empirical analysis of target-resident DoS filters. In: Proceedings - IEEE Symposium on Security and Privacy. 2004. p. 103–14.
- Gao D, Reiter MK, Song D. On gray-box program tracking for anomaly detection. In: Proceedings of the 13th USENIX Security Symposium. 2004.
- Levine BN, Reiter MK, Wang C, Wright M. Timing attacks in low-latency mix systems (Extended Abstract). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2004 Jan 1;3110:251–65.
- Wang X, Reiter MK. Mitigating bandwidth-exhaustion attacks using congestion puzzles. In: Proceedings of the ACM Conference on Computer and Communications Security. 2004. p. 257–67.
- MacKenzie P, Reiter MK, Yang K. Alternatives to non-malleability: Definitions, constructions, and applications (extended abstract). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2004 Jan 1;2951:171–90.
- Xie Y, Kim HA, O’Hallaron DR, Reiter MK, Zhang H. Seurat: A pointillist approach to anomaly detection. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2004 Jan 1;3224:238–57.
- Goodson GR, Wylie JJ, Ganger GR, Reiter MK. Efficient Byzantine-tolerant erasure-coded storage. In: Proceedings of the International Conference on Dependable Systems and Networks. 2004. p. 135–44.
- Reiter MK, Wang X. Fragile mixing. In: Proceedings of the ACM Conference on Computer and Communications Security. 2004. p. 227–35.
- Davis D, Monrose F, Reiter MK. Time-scoped searching of encrypted audit logs. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2004 Jan 1;3269:532–45.
- Kissner L, Oprea A, Reiter MK, Song D, Yang K. Private keyword-based push and pull with applications to anonymous communication extended abstract. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2004 Jan 1;3089:16–30.
- Davis D, Monrose F, Reiter MK. On user choice in graphical password schemes. In: Proceedings of the 13th USENIX Security Symposium. 2004.
- Reiter MK, Samar A, Wang C. The design and implementation of a JCA-compliant capture protection infrastructure. In: Proceedings of the IEEE Symposium on Reliable Distributed Systems. 2003. p. 339–48.
- MacKenzie P, Reiter MK. Delegation of cryptographic servers for capture-resilient devices. Distributed Computing. 2003 Dec 1;16(4):307–27.
- Wang XF, Reiter MK. Defending against denial-of-service attacks with puzzle auctions. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 2003. p. 78–92.
- Malkhi D, Mansour Y, Reiter MK. Diffusion without false rumors: On propagating updates in a Byzantine environment. Theoretical Computer Science. 2003 Apr 18;299(1–3):289–306.
- Malkhi D, Merritt M, Reiter MK, Taubenfeld G. Objects shared by Byzantine processes. Distributed Computing. 2003 Feb 1;16(1):37–48.
- MacKenzie P, Oprea A, Reiter MK. Automatic generation of two-party computations. In: Proceedings of the ACM Conference on Computer and Communications Security. 2003. p. 210–9.
- Wang XF, Reiter MK. Defending against denial-of-service attacks with puzzle auctions. In: Proceedings - IEEE Symposium on Security and Privacy. 2003. p. 78–92.
- Felber P, Reiter MK. Advanced concurrency control in Java. Concurrency and Computation: Practice and Experience. 2002 Apr 10;14(4):261–85.
- Jakobsson M, Reiter MK. Discouraging software piracy using software aging. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2002. p. 1–12.
- Monrose F, Reiter MK, Li Q, Lopresti DP, Shih C. Toward speech-generated cryptographic keys on resource constrained devices. In: Proceedings of the 11th USENIX Security Symposium. 2002.
- Malkhi D, Reiter MK, Wool A, Wright RN. Probabilistic quorum systems. Information and Computation. 2001 Nov 1;170(2):184–206.
- Alvisi L, Malkhi D, Pierce E, Reiter MK. Fault detection for Byzantine quorum systems. IEEE Transactions on Parallel and Distributed Systems. 2001 Sep 1;12(9):996–1007.
- Monrose F, Reiter MK, Li Q, Wetzel S. Using voice to generate cryptographic keys. In: 2001: A Speaker Odyssey - The Speaker Recognition Workshop. 2001. p. 237–42.
- Canetti R, Ishai Y, Kumar R, Reiter MK, Rubinfeld R, Wright RN. Selective private function evaluation with applications to private statistics. In: Proceedings of the Annual ACM Symposium on Principles of Distributed Computing. 2001. p. 293–302.
- Chockler G, Malkhi D, Reiter MK. Backoff protocols for distributed mutual exclusion and ordering. In: Proceedings - International Conference on Distributed Computing Systems. 2001. p. 11–20.
- MacKenzie P, Reiter MK. Networked cryptographic devices resilient to capture. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 2001. p. 12–25.
- MacKenzie P, Reiter MK. Delegation of cryptographic servers for capture-resilient devices. In: Proceedings of the ACM Conference on Computer and Communications Security. 2001. p. 10–9.
- De Prisco R, Malkhi D, Reiter M. On k-set consensus problems in asynchronous systems. IEEE Transactions on Parallel and Distributed Systems. 2001 Jan 1;12(1):7–21.
- Samarati P, Reiter MK, Jajodia S. An Authorization Model for a Public Key Management Service. ACM Transactions on Information and System Security. 2001 Jan 1;4(4):453–82.
- Monrose F, Reiter MK, Li Q, Wetzel S. Cryptographic key generation from voice. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 2001. p. 202–13.
- MacKenzie P, Reiter MK. Two-party generation of DSA signatures. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2001. p. 137–54.
- Adams C, Burmester M, Desmedt Y, Reiter M, Zimmermann P. Which PKI (Public Key Infrastructure) is the right one? In: Proceedings of the ACM Conference on Computer and Communications Security. 2000. p. 98–101.
- Malkhi D, Reiter MK. An architecture for survivable coordination in large distributed systems. IEEE Transactions on Knowledge and Data Engineering. 2000 Dec 1;12(2):187–202.
- Alvisi L, Malkhi D, Pierce E, Reiter MK, Wright RN. Dynamic byzantine quorum systems. In: Proceedings of the 2002 International Conference on Dependable Systems and Networks. 2000. p. 283–92.
- Arlein RM, Jai B, Jakobsson M, Monrose F, Reiter MK. Privacy-preserving global customization. In: EC 2000 - Proceedings of the 2nd ACM Conference on Electronic Commerce. 2000. p. 176–84.
- Malkhi D, Reiter MK, Wool A. Load and availability of Byzantine quorum systems. SIAM Journal on Computing. 2000 Apr 1;29(6):1889–906.
- Malkhi D, Mansour Y, Reiter MK. On diffusing updates in a Byzantine environment. In: Proceedings of the IEEE Symposium on Reliable Distributed Systems. 1999. p. 134–43.
- Malkhi D, Mansour Y, Reiter M. On Propagating Updates in a Byzantine Environment. 1999 Aug.
- Anupam V, Mayer A, Nissim K, Pinkas B, Reiter MK. On the security of pay-per-click and other Web advertising schemes. Computer Networks. 1999 May 17;31(11):1091–100.
- Jermyn I, Mayer A, Monrose F, Reiter MK, Rubin AD. The design and analysis of graphical passwords. In: 8th USENIX Security Symposium. 1999.
- De Prisco R, Malkhi D, Reiter MK. On k-set consensus problems in asynchronous systems. Proceedings of the Annual ACM Symposium on Principles of Distributed Computing. 1999 Jan 1;257–65.
- Monrose F, Reiter MK, Wetzel S. Password hardening based on keystroke dynamics. In: Proceedings of the ACM Conference on Computer and Communications Security. 1999. p. 73–82.
- Reiter MK, Rubin AD. Anonymous web transactions with crowds. Communications of the ACM. 1999 Jan 1;42(2):32–8.
- Malkhi D, Reiter MK. Survivable consensus objects. In: Proceedings of the IEEE Symposium on Reliable Distributed Systems. 1998. p. 271–9.
- Malkhi D, Reiter MK. Secure and scalable replication in Phalanx. In: Proceedings of the IEEE Symposium on Reliable Distributed Systems. 1998. p. 51–8.
- Reiter MK, Stubblebine SG. Resilient authentication using path independence. IEEE Transactions on Computers. 1998 Dec 1;47(12):1351–62.
- Malkhi D, Reiter MK, Rubin AD. Secure execution of Java applets using a remote playground. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 1998. p. 40–51.
- Malkhi D, Reiter M. Byzantine quorum systems. Distributed Computing. 1998 Jan 1;11(4):203–13.
- Malkhi D, Reiter M. Unreliable intrusion detection in distributed computations. In: Proceedings of the Computer Security Foundations Workshop. 1997. p. 116–24.
- Malkhi D, Reiter M, Wright R. Probabilistic quorum systems. In: Proceedings of the Annual ACM Symposium on Principles of Distributed Computing. 1997. p. 267–73.
- Malkhi D, Reiter M. Byzantine quorum systems. In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing. 1997. p. 569–78.
- Malkhi D, Reiter M, Wool A. Load and availability of Byzantine quorum systems. In: Proceedings of the Annual ACM Symposium on Principles of Distributed Computing. 1997. p. 249–57.
- Reiter MK, Stubblebine SG. Path independence for authentication in large-scale systems. In: Proceedings of the ACM Conference on Computer and Communications Security. 1997. p. 57–66.
- Franklin MK, Reiter MK. Fair exchange with a semi-trusted third party. In: Proceedings of the ACM Conference on Computer and Communications Security. 1997. p. 1–5.
- Reiter MK, Stubblebine SG. Toward acceptable metrics of authentication. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 1997. p. 10–20.
- Malkhi D, Reiter M. High-throughput secure reliable multicast protocol. Journal of Computer Security. 1997 Jan 1;5(2):113–27.
- Franklin MK, Reiter MK. The design and implementation of a secure auction service. IEEE Transactions on Software Engineering. 1996 Dec 1;22(5):302–12.
- Reiter MK. A secure group membership protocol. IEEE Transactions on Software Engineering. 1996 Dec 1;22(1):31–42.
- Malki D, Reiter M. High-throughput secure reliable multicast protocol. In: Proceedings of the Computer Security Foundations Workshop. 1996. p. 9–17.
- Reiter MK. Distributing Trust with the Rampart Toolkit. Communications of the ACM. 1996 Jan 1;39(4):71–4.
- Reiter MK, Franklin MK, Lacy JB, Wright RN. Ω key management service. Journal of Computer Security. 1996 Jan 1;4(4):267–87.
- Reiter MK, Franklin MK, Lacy JB, Wright RN. Ω key management service. In: Proceedings of the ACM Conference on Computer and Communications Security. 1996. p. 38–47.
- Franklin MK, Reiter MK. Design and implementation of a secure auction service. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 1995. p. 2–14.
- Reiter MK. Secure group membership protocol. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 1994. p. 175–89.
- Blaze M, Lacy J, London T, Reiter M. Issues and Mechanisms for Trustworthy Systems: Creating Transparent Mistrust. AT&T Technical Journal. 1994 Jan 1;73(5):30–9.
- Reiter M, Gong L. Preventing denial and forgery of causal relationships in distributed systems. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 1993. p. 30–40.
- Reiter M, Birman K, Gong L. Integrating security in a group oriented distributed system. In: Proceedings of the Symposium on Security and Privacy. 1992. p. 18–32.
In The News
- AI is the Biggest Cybersecurity Question Mark. Is It Also the Answer? (Nov 12, 2024 | Pratt School of Engineering)
- The Growing Role of Computation in Science (Feb 9, 2022 | Duke Research Blog)
- Duke Awards 22 Distinguished Professorships (Jun 28, 2021 | )