default search action
Michael K. Reiter
Person information
- affiliation: Duke University, Durham, NC, USA
- affiliation (former): Carnegie Mellon University, Pittsburgh, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c227]Lulu Zhou, Zeyu Liu, Fan Zhang, Michael K. Reiter:
CrudiTEE: A Stick-And-Carrot Approach to Building Trustworthy Cryptocurrency Wallets with TEEs. AFT 2024: 16:1-16:25 - [c226]Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Chen-Da Liu-Zhang, Michael K. Reiter:
Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles. DSN 2024: 456-469 - [c225]Weili Wang, Jianyu Niu, Michael K. Reiter, Yinqian Zhang:
Formally Verifying a Rollback-Prevention Protocol for TEEs. FORTE 2024: 155-173 - [c224]Akhil Bandarupalli, Adithya Bhat, Somali Chaterji, Michael K. Reiter, Aniket Kate, Saurabh Bagchi:
SensorBFT: Fault-Tolerant Target Localization Using Voronoi Diagrams and Approximate Agreement. ICDCS 2024: 186-197 - [c223]Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Group-based Robustness: A General Framework for Customized Robustness in the Real World. NDSS 2024 - [c222]Ke Coby Wang, Michael K. Reiter:
Bernoulli Honeywords. NDSS 2024 - [c221]Hongbin Liu, Michael K. Reiter, Neil Zhenqiang Gong:
Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models. USENIX Security Symposium 2024 - [c220]Zonghao Huang, Lujo Bauer, Michael K. Reiter:
The Impact of Exposed Passwords on Honeyword Efficacy. USENIX Security Symposium 2024 - [c219]Pranay Jain, Andrew C. Reed, Michael K. Reiter:
Near-Optimal Constrained Padding for Object Retrievals with Dependencies. USENIX Security Symposium 2024 - [c218]Jiarong Xing, Sophia Yoo, Xenofon Foukas, Daehyeok Kim, Michael K. Reiter:
On the Criticality of Integrity Protection in 5G Fronthaul Networks. USENIX Security Symposium 2024 - [d2]Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography. Version 1. Zenodo, 2024 [all versions] - [d1]Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography. Version 2. Zenodo, 2024 [all versions] - [i40]Hongbin Liu, Michael K. Reiter, Neil Zhenqiang Gong:
Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models. CoRR abs/2402.14977 (2024) - [i39]Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Chen-Da Liu-Zhang, Michael K. Reiter:
Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles. CoRR abs/2405.02431 (2024) - [i38]Yujie Zhang, Neil Gong, Michael K. Reiter:
Concealing Backdoor Model Updates in Federated Learning by Trigger-Optimized Data Poisoning. CoRR abs/2405.06206 (2024) - [i37]Peiyao Sheng, Chenyuan Wu, Dahlia Malkhi, Michael K. Reiter, Chrysoula Stathakopoulou, Michael Wei, Maofan Yin:
On Orchestrating Parallel Broadcasts for Distributed Ledgers. CoRR abs/2407.00030 (2024) - [i36]Zonghao Huang, Neil Zhenqiang Gong, Michael K. Reiter:
A General Framework for Data-Use Auditing of ML Models. CoRR abs/2407.15100 (2024) - [i35]Lulu Zhou, Zeyu Liu, Fan Zhang, Michael K. Reiter:
CrudiTEE: A Stick-and-Carrot Approach to Building Trustworthy Cryptocurrency Wallets with TEEs. CoRR abs/2407.16473 (2024) - [i34]Peiyao Sheng, Chenyuan Wu, Dahlia Malkhi, Michael K. Reiter, Chrysoula Stathakopoulou, Michael Wei, Maofan Yin:
On Orchestrating Parallel Broadcasts for Distributed Ledgers. IACR Cryptol. ePrint Arch. 2024: 923 (2024) - 2023
- [j55]Carl E. Landwehr, Michael K. Reiter, Laurie A. Williams, Gene Tsudik, Trent Jaeger, Tadayoshi Kohno, Apu Kapadia:
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription. IEEE Secur. Priv. 21(2): 32-42 (2023) - [c217]Andrew Chi, Blake Anderson, Michael K. Reiter:
Prioritizing Remediation of Enterprise Hosts by Malware Execution Risk. ACSAC 2023: 550-564 - [c216]Michael K. Reiter:
Tackling Credential Abuse Together. CODASPY 2023: 1 - [c215]Andrew C. Reed, Michael K. Reiter:
Optimally Hiding Object Sizes with Constrained Padding. CSF 2023: 505-520 - [c214]Anrin Chakraborti, Michael K. Reiter:
Privately Evaluating Region Overlaps with Applications to Collaborative Sensor Output Validation. EuroS&P 2023: 1013-1029 - [c213]Adithya Bhat, Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
The Unique Chain Rule and Its Applications. FC (1) 2023: 38-55 - [c212]Sheng Liu, Michael K. Reiter, Theophilus A. Benson:
Nimble: Fast and Safe Migration of Network Functions. INFOCOM 2023: 1-10 - [c211]Adithya Bhat, Akhil Bandarupalli, Manish Nagaraj, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
EESMR: Energy Efficient BFT - SMR for the masses. Middleware 2023: 1-14 - [c210]Anrin Chakraborti, Giulia Fanti, Michael K. Reiter:
Distance-Aware Private Set Intersection. USENIX Security Symposium 2023: 319-336 - [c209]Keane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Adversarial Training for Raw-Binary Malware Classifiers. USENIX Security Symposium 2023: 1163-1180 - [i33]Adithya Bhat, Akhil Bandarupalli, Manish Nagaraj, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
EESMR: Energy Efficient BFT-SMR for the masses. CoRR abs/2304.04998 (2023) - [i32]Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Group-based Robustness: A General Framework for Customized Robustness in the Real World. CoRR abs/2306.16614 (2023) - [i31]Zonghao Huang, Lujo Bauer, Michael K. Reiter:
The Impact of Exposed Passwords on Honeyword Efficacy. CoRR abs/2309.10323 (2023) - [i30]Zonghao Huang, Neil Gong, Michael K. Reiter:
Mendata: A Framework to Purify Manipulated Training Data. CoRR abs/2312.01281 (2023) - [i29]Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
HashRand: Efficient Asynchronous Random Beacon without Threshold Cryptographic Setup. IACR Cryptol. ePrint Arch. 2023: 1755 (2023) - 2022
- [j54]Xiaokuan Zhang, Jihun Hamm, Michael K. Reiter, Yinqian Zhang:
Defeating traffic analysis via differential privacy: a case study on streaming traffic. Int. J. Inf. Sec. 21(3): 689-706 (2022) - [c208]Kai Wang, Lily Xu, Andrew Perrault, Michael K. Reiter, Milind Tambe:
Coordinating Followers to Reach Better Equilibria: End-to-End Gradient Descent for Stackelberg Games. AAAI 2022: 5219-5227 - [c207]Weili Wang, Sen Deng, Jianyu Niu, Michael K. Reiter, Yinqian Zhang:
ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes. CCS 2022: 2841-2855 - [c206]Christopher M. Bender, Patrick Emmanuel, Michael K. Reiter, Junier Oliva:
Practical Integration via Separable Bijective Networks. ICLR 2022 - [c205]Weiran Lin, Keane Lucas, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks. ICML 2022: 13405-13430 - [c204]Sravya Yandamuri, Ittai Abraham, Kartik Nayak, Michael K. Reiter:
Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption. OPODIS 2022: 24:1-24:23 - [i28]Ke Coby Wang, Michael K. Reiter:
Bernoulli honeywords. CoRR abs/2212.12759 (2022) - 2021
- [j53]Joseph Severini, Radhika Niranjan Mysore, Vyas Sekar, Sujata Banerjee, Michael K. Reiter:
The Netivus Manifesto: making collaborative network management easier for the rest of us. Comput. Commun. Rev. 51(2): 10-17 (2021) - [j52]Ziqiao Zhou, Michael K. Reiter:
Interpretable noninterference measurement and its application to processor designs. Proc. ACM Program. Lang. 5(OOPSLA): 1-30 (2021) - [c203]Keane Lucas, Mahmood Sharif, Lujo Bauer, Michael K. Reiter, Saurabh Shintre:
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes. AsiaCCS 2021: 744-758 - [c202]Iffat Anjum, Mu Zhu, Isaac Polinsky, William Enck, Michael K. Reiter, Munindar P. Singh:
Role-Based Deception in Enterprise Networks. CODASPY 2021: 65-76 - [c201]Adam Humphries, Kartik Cating-Subramanian, Michael K. Reiter:
TASE: Reducing Latency of Symbolic Execution with Transactional Memory. NDSS 2021 - [c200]Cheng Guo, Brianne Campbell, Apu Kapadia, Michael K. Reiter, Kelly Caine:
Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication. USENIX Security Symposium 2021: 1-18 - [c199]Ke Coby Wang, Michael K. Reiter:
Using Amnesia to Detect Credential Database Breaches. USENIX Security Symposium 2021: 839-855 - [c198]Sravya Yandamuri, Ittai Abraham, Kartik Nayak, Michael K. Reiter:
Brief Announcement: Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption. DISC 2021: 62:1-62:4 - [i27]Kai Wang, Lily Xu, Andrew Perrault, Michael K. Reiter, Milind Tambe:
Coordinating Followers to Reach Better Equilibria: End-to-End Gradient Descent for Stackelberg Games. CoRR abs/2106.03278 (2021) - [i26]Andrew C. Reed, Michael K. Reiter:
Optimally Hiding Object Sizes with Constrained Padding. CoRR abs/2108.01753 (2021) - [i25]Weiran Lin, Keane Lucas, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks. CoRR abs/2112.14232 (2021) - [i24]Anrin Chakraborti, Giulia Fanti, Michael K. Reiter:
Distance-Aware Private Set Intersection. CoRR abs/2112.14737 (2021) - [i23]Adithya Bhat, Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
Apollo - Optimistically Linear and Responsive SMR. IACR Cryptol. ePrint Arch. 2021: 180 (2021) - [i22]Sravya Yandamuri, Ittai Abraham, Kartik Nayak, Michael K. Reiter:
Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption. IACR Cryptol. ePrint Arch. 2021: 184 (2021) - 2020
- [j51]Zeyu Mi, Haibo Chen, Yinqian Zhang, ShuangHe Peng, Xiaofeng Wang, Michael K. Reiter:
CPU Elasticity to Mitigate Cross-VM Runtime Monitoring. IEEE Trans. Dependable Secur. Comput. 17(5): 1094-1108 (2020) - [c197]Isaac Polinsky, Kyle Martin, William Enck, Michael K. Reiter:
n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications. CODASPY 2020: 235-246 - [c196]Christopher M. Bender, Yang Li, Yifeng Shi, Michael K. Reiter, Junier Oliva:
Defense Through Diverse Directions. ICML 2020: 756-766 - [c195]Qiuyu Xiao, Brittany Subialdea, Lujo Bauer, Michael K. Reiter:
Metering Graphical Data Leakage with Snowman. SACMAT 2020: 1-12 - [c194]Ke Coby Wang, Michael K. Reiter:
Detecting Stuffing of a User's Credentials at Her Own Accounts. USENIX Security Symposium 2020: 2201-2218 - [i21]Christopher M. Bender, Yang Li, Yifeng Shi, Michael K. Reiter, Junier B. Oliva:
Defense Through Diverse Directions. CoRR abs/2003.10602 (2020) - [i20]Iffat Anjum, Mu Zhu, Isaac Polinsky, William Enck, Michael K. Reiter, Munindar P. Singh:
Role-Based Deception in Enterprise Networks. CoRR abs/2008.02979 (2020)
2010 – 2019
- 2019
- [j50]Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter:
A General Framework for Adversarial Examples with Objectives. ACM Trans. Priv. Secur. 22(3): 16:1-16:30 (2019) - [c193]Soumya Basu, Alin Tomescu, Ittai Abraham, Dahlia Malkhi, Michael K. Reiter, Emin Gün Sirer:
Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols. CCS 2019: 2387-2402 - [c192]Guy Golan-Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael K. Reiter, Dragos-Adrian Seredinschi, Orr Tamir, Alin Tomescu:
SBFT: A Scalable and Decentralized Trust Infrastructure. DSN 2019: 568-580 - [c191]Sheng Liu, Theophilus A. Benson, Michael K. Reiter:
Efficient and Safe Network Updates with Suffix Causal Consistency. EuroSys 2019: 23:1-23:15 - [c190]Ke Coby Wang, Michael K. Reiter:
How to End Password Reuse on the Web. NDSS 2019 - [c189]Xiaokuan Zhang, Jihun Hamm, Michael K. Reiter, Yinqian Zhang:
Statistical Privacy for Streaming Traffic. NDSS 2019 - [c188]Maofan Yin, Dahlia Malkhi, Michael K. Reiter, Guy Golan-Gueta, Ittai Abraham:
HotStuff: BFT Consensus with Linearity and Responsiveness. PODC 2019: 347-356 - [i19]Isaac Polinsky, Kyle Martin, William Enck, Michael K. Reiter:
n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications. CoRR abs/1910.08648 (2019) - [i18]Mahmood Sharif, Lujo Bauer, Michael K. Reiter:
n-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers. CoRR abs/1912.09059 (2019) - [i17]Mahmood Sharif, Keane Lucas, Lujo Bauer, Michael K. Reiter, Saurabh Shintre:
Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection. CoRR abs/1912.09064 (2019) - [i16]Ke Coby Wang, Michael K. Reiter:
Detecting stuffing of a user's credentials at her own accounts. CoRR abs/1912.11118 (2019) - [i15]Adam Humphries, Kartik Cating-Subramanian, Michael K. Reiter:
TASE: Reducing latency of symbolic execution with transactional memory. CoRR abs/1912.12363 (2019) - 2018
- [c187]Sisi Duan, Michael K. Reiter, Haibin Zhang:
BEAT: Asynchronous BFT Made Practical. CCS 2018: 2028-2041 - [c186]Victor Heorhiadi, Sanjay Chandrasekaran, Michael K. Reiter, Vyas Sekar:
Intent-driven composition of resource-management SDN applications. CoNEXT 2018: 86-97 - [c185]Mahmood Sharif, Lujo Bauer, Michael K. Reiter:
On the Suitability of Lp-Norms for Creating and Preventing Adversarial Examples. CVPR Workshops 2018: 1605-1613 - [c184]Guoxing Chen, Ten-Hwang Lai, Michael K. Reiter, Yinqian Zhang:
Differentially Private Access Patterns for Searchable Symmetric Encryption. INFOCOM 2018: 810-818 - [c183]Ziqiao Zhou, Zhiyun Qian, Michael K. Reiter, Yinqian Zhang:
Static Evaluation of Noninterference Using Approximate Model Counting. IEEE Symposium on Security and Privacy 2018: 514-528 - [i14]Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter:
Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition. CoRR abs/1801.00349 (2018) - [i13]Mahmood Sharif, Lujo Bauer, Michael K. Reiter:
On the Suitability of Lp-norms for Creating and Preventing Adversarial Examples. CoRR abs/1802.09653 (2018) - [i12]Guy Golan-Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael K. Reiter, Dragos-Adrian Seredinschi, Orr Tamir, Alin Tomescu:
SBFT: a Scalable Decentralized Trust Infrastructure for Blockchains. CoRR abs/1804.01626 (2018) - [i11]Ke Coby Wang, Michael K. Reiter:
How to end password reuse on the web. CoRR abs/1805.00566 (2018) - [i10]Chenglu Jin, Marten van Dijk, Michael K. Reiter, Haibin Zhang:
PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion. IACR Cryptol. ePrint Arch. 2018: 1171 (2018) - 2017
- [j49]Jay Aikat, Aditya Akella, Jeffrey S. Chase, Ari Juels, Michael K. Reiter, Thomas Ristenpart, Vyas Sekar, Michael M. Swift:
Rethinking Security in the Era of Cloud Computing. IEEE Secur. Priv. 15(3): 60-69 (2017) - [j48]Qatrunnada Ismail, Tousif Ahmed, Kelly Caine, Apu Kapadia, Michael K. Reiter:
To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps' Privacy Permission Settings. Proc. Priv. Enhancing Technol. 2017(4): 119-137 (2017) - [j47]Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang:
Personalized Pseudonyms for Servers in the Cloud. Proc. Priv. Enhancing Technol. 2017(4): 271-289 (2017) - [c182]Sanchuan Chen, Xiaokuan Zhang, Michael K. Reiter, Yinqian Zhang:
Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu. AsiaCCS 2017: 7-18 - [c181]Sisi Duan, Michael K. Reiter, Haibin Zhang:
Secure Causal Atomic Broadcast, Revisited. DSN 2017: 61-72 - [c180]Weijie Liu, Debin Gao, Michael K. Reiter:
On-Demand Time Blurring to Support Side-Channel Defense. ESORICS (2) 2017: 210-228 - [c179]Sheng Liu, Michael K. Reiter, Vyas Sekar:
Flow Reconnaissance via Timing Attacks on SDN Switches. ICDCS 2017: 196-206 - [c178]Andrew Chi, Robert A. Cochran, Marie Nesfield, Michael K. Reiter, Cynthia Sturton:
A System to Verify Network Behavior of Known Cryptographic Clients. NSDI 2017: 177-195 - 2016
- [c177]Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang:
A Software Approach to Defeating Side Channels in Last-Level Caches. CCS 2016: 871-882 - [c176]Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter:
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition. CCS 2016: 1528-1540 - [c175]Elli Androulaki, Michael K. Reiter:
CCSW'16: 8th ACM Cloud Computing Security Workshop. CCS 2016: 1882-1883 - [c174]Jassim Aljuraidan, Lujo Bauer, Michael K. Reiter, Matthias Beckerle:
Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational Workers. Financial Cryptography 2016: 60-77 - [c173]Victor Heorhiadi, Shriram Rajagopalan, Hani Jamjoom, Michael K. Reiter, Vyas Sekar:
Gremlin: Systematic Resilience Testing of Microservices. ICDCS 2016: 57-66 - [c172]Victor Heorhiadi, Michael K. Reiter, Vyas Sekar:
Simplifying Software-Defined Network Optimization Using SOL. NSDI 2016: 223-237 - [c171]Jay Aikat, Michael K. Reiter, Kevin Jeffay:
Education Modules for Networking, Cloud Computing, and Security in Systems Courses. SIGCSE 2016: 400 - [c170]Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Stealing Machine Learning Models via Prediction APIs. USENIX Security Symposium 2016: 601-618 - [e5]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Elli Androulaki, Michael K. Reiter:
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, CCSW 2016, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4572-9 [contents] - [i9]Andrew Chi, Robert A. Cochran, Marie Nesfield, Michael K. Reiter, Cynthia Sturton:
Server-side verification of client behavior in cryptographic protocols. CoRR abs/1603.04085 (2016) - [i8]Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang:
A software approach to defeating side channels in last-level caches. CoRR abs/1603.05615 (2016) - [i7]Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Stealing Machine Learning Models via Prediction APIs. CoRR abs/1609.02943 (2016) - 2015
- [j46]Lei Wei, Michael K. Reiter:
Toward practical encrypted email that supports private, regular-expression searches. Int. J. Inf. Sec. 14(5): 397-416 (2015) - [c169]Mehrdad Moradi, Feng Qian, Qiang Xu, Zhuoqing Morley Mao, Darrell Bethea, Michael K. Reiter:
Caesar: High-Speed and Memory-Efficient Forwarding Engine for Future Internet Architecture. ANCS 2015: 171-182 - [c168]Michael K. Reiter:
Side Channels in Multi-Tenant Environments. CCSW 2015: 1 - [c167]Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang:
Mitigating Storage Side Channels Using Statistical Privacy Mechanisms. CCS 2015: 1582-1594 - [c166]Soo-Jin Moon, Vyas Sekar, Michael K. Reiter:
Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration. CCS 2015: 1595-1606 - [c165]Qatrunnada Ismail, Tousif Ahmed, Apu Kapadia, Michael K. Reiter:
Crowdsourced Exploration of Security Configurations. CHI 2015: 467-476 - [c164]Darrell Bethea, Michael K. Reiter, Feng Qian, Qiang Xu, Zhuoqing Morley Mao:
WACCO and LOKO: Strong Consistency at Global Scale. CIC 2015: 130-141 - [c163]Peng Li, Debin Gao, Michael K. Reiter:
Replica Placement for Availability in the Worst Case. ICDCS 2015: 599-608 - [c162]Sarah J. Andrabi, Michael K. Reiter, Cynthia Sturton:
Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices. SOUPS 2015: 89-102 - [e4]Michael K. Reiter, David Naccache:
Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings. Lecture Notes in Computer Science 9476, Springer 2015, ISBN 978-3-319-26822-4 [contents] - [i6]Victor Heorhiadi, Michael K. Reiter, Vyas Sekar:
Accelerating the Development of Software-Defined Network Optimization Applications Using SOL. CoRR abs/1504.07704 (2015) - 2014
- [j45]Hye-Chung Kum, Ashok K. Krishnamurthy, Ashwin Machanavajjhala, Michael K. Reiter, Stanley C. Ahalt:
Privacy preserving interactive record linkage (PPIRL). J. Am. Medical Informatics Assoc. 21(2): 212-220 (2014) - [j44]Peng Li, Debin Gao, Michael K. Reiter:
StopWatch: A Cloud Architecture for Timing Channel Mitigation. ACM Trans. Inf. Syst. Secur. 17(2): 8:1-8:28 (2014) - [c161]Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Cross-Tenant Side-Channel Attacks in PaaS Clouds. CCS 2014: 990-1003 - [c160]Ting-Fang Yen, Victor Heorhiadi, Alina Oprea, Michael K. Reiter, Ari Juels:
An Epidemiological Study of Malware Encounters in a Large Enterprise. CCS 2014: 1117-1130 - [c159]Alana Libonati, Kelly Caine, Apu Kapadia, Michael K. Reiter:
Defending against device theft with human notarization. CollaborateCom 2014: 8-17 - [c158]Michelle L. Mazurek, Yuan Liang, William Melicher, Manya Sleeper, Lujo Bauer, Gregory R. Ganger, Nitin Gupta, Michael K. Reiter:
Toward strong, usable access control for shared distributed data. FAST 2014: 89-103 - [c157]Victor Heorhiadi, Seyed Kaveh Fayaz, Michael K. Reiter, Vyas Sekar:
SNIPS: A Software-Defined Approach for Scaling Intrusion Prevention Systems via Offloading. ICISS 2014: 9-29 - 2013
- [c156]