


Остановите войну!
for scientists:


default search action
Michael K. Reiter
Person information

- affiliation: Duke University, Durham, NC, USA
- affiliation (former): Carnegie Mellon University, Pittsburgh, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j55]Carl E. Landwehr
, Michael K. Reiter
, Laurie A. Williams
, Gene Tsudik
, Trent Jaeger
, Tadayoshi Kohno
, Apu Kapadia
:
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription. IEEE Secur. Priv. 21(2): 32-42 (2023) - [c214]Michael K. Reiter
:
Tackling Credential Abuse Together. CODASPY 2023: 1 - [c213]Andrew C. Reed, Michael K. Reiter:
Optimally Hiding Object Sizes with Constrained Padding. CSF 2023: 505-520 - [c212]Anrin Chakraborti, Michael K. Reiter:
Privately Evaluating Region Overlaps with Applications to Collaborative Sensor Output Validation. EuroS&P 2023: 1013-1029 - [c211]Sheng Liu, Michael K. Reiter, Theophilus A. Benson:
Nimble: Fast and Safe Migration of Network Functions. INFOCOM 2023: 1-10 - [c210]Anrin Chakraborti, Giulia Fanti, Michael K. Reiter:
Distance-Aware Private Set Intersection. USENIX Security Symposium 2023 - [c209]Keane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Adversarial Training for Raw-Binary Malware Classifiers. USENIX Security Symposium 2023 - [i31]Adithya Bhat, Akhil Bandarupalli, Manish Nagaraj, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
EESMR: Energy Efficient BFT-SMR for the masses. CoRR abs/2304.04998 (2023) - [i30]Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Group-based Robustness: A General Framework for Customized Robustness in the Real World. CoRR abs/2306.16614 (2023) - [i29]Zonghao Huang, Lujo Bauer, Michael K. Reiter:
The Impact of Exposed Passwords on Honeyword Efficacy. CoRR abs/2309.10323 (2023) - 2022
- [j54]Xiaokuan Zhang
, Jihun Hamm, Michael K. Reiter, Yinqian Zhang:
Defeating traffic analysis via differential privacy: a case study on streaming traffic. Int. J. Inf. Sec. 21(3): 689-706 (2022) - [c208]Kai Wang, Lily Xu, Andrew Perrault, Michael K. Reiter, Milind Tambe:
Coordinating Followers to Reach Better Equilibria: End-to-End Gradient Descent for Stackelberg Games. AAAI 2022: 5219-5227 - [c207]Weili Wang, Sen Deng, Jianyu Niu, Michael K. Reiter, Yinqian Zhang:
ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes. CCS 2022: 2841-2855 - [c206]Christopher M. Bender, Patrick Emmanuel, Michael K. Reiter, Junier Oliva:
Practical Integration via Separable Bijective Networks. ICLR 2022 - [c205]Weiran Lin, Keane Lucas, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks. ICML 2022: 13405-13430 - [c204]Sravya Yandamuri, Ittai Abraham, Kartik Nayak, Michael K. Reiter:
Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption. OPODIS 2022: 24:1-24:23 - [i28]Ke Coby Wang, Michael K. Reiter:
Bernoulli honeywords. CoRR abs/2212.12759 (2022) - 2021
- [j53]Joseph Severini, Radhika Niranjan Mysore, Vyas Sekar, Sujata Banerjee, Michael K. Reiter:
The Netivus Manifesto: making collaborative network management easier for the rest of us. Comput. Commun. Rev. 51(2): 10-17 (2021) - [j52]Ziqiao Zhou, Michael K. Reiter:
Interpretable noninterference measurement and its application to processor designs. Proc. ACM Program. Lang. 5(OOPSLA): 1-30 (2021) - [c203]Keane Lucas
, Mahmood Sharif
, Lujo Bauer
, Michael K. Reiter
, Saurabh Shintre:
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes. AsiaCCS 2021: 744-758 - [c202]Iffat Anjum, Mu Zhu, Isaac Polinsky, William Enck, Michael K. Reiter
, Munindar P. Singh:
Role-Based Deception in Enterprise Networks. CODASPY 2021: 65-76 - [c201]Adam Humphries, Kartik Cating-Subramanian, Michael K. Reiter:
TASE: Reducing Latency of Symbolic Execution with Transactional Memory. NDSS 2021 - [c200]Cheng Guo, Brianne Campbell, Apu Kapadia, Michael K. Reiter, Kelly Caine:
Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication. USENIX Security Symposium 2021: 1-18 - [c199]Ke Coby Wang, Michael K. Reiter:
Using Amnesia to Detect Credential Database Breaches. USENIX Security Symposium 2021: 839-855 - [c198]Sravya Yandamuri, Ittai Abraham, Kartik Nayak, Michael K. Reiter:
Brief Announcement: Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption. DISC 2021: 62:1-62:4 - [i27]Kai Wang, Lily Xu, Andrew Perrault, Michael K. Reiter, Milind Tambe:
Coordinating Followers to Reach Better Equilibria: End-to-End Gradient Descent for Stackelberg Games. CoRR abs/2106.03278 (2021) - [i26]Andrew C. Reed, Michael K. Reiter:
Optimally Hiding Object Sizes with Constrained Padding. CoRR abs/2108.01753 (2021) - [i25]Weiran Lin, Keane Lucas, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks. CoRR abs/2112.14232 (2021) - [i24]Anrin Chakraborti, Giulia Fanti, Michael K. Reiter:
Distance-Aware Private Set Intersection. CoRR abs/2112.14737 (2021) - [i23]Adithya Bhat, Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
Apollo - Optimistically Linear and Responsive SMR. IACR Cryptol. ePrint Arch. 2021: 180 (2021) - [i22]Sravya Yandamuri, Ittai Abraham, Kartik Nayak, Michael K. Reiter:
Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption. IACR Cryptol. ePrint Arch. 2021: 184 (2021) - 2020
- [j51]Zeyu Mi
, Haibo Chen
, Yinqian Zhang, ShuangHe Peng, Xiaofeng Wang, Michael K. Reiter
:
CPU Elasticity to Mitigate Cross-VM Runtime Monitoring. IEEE Trans. Dependable Secur. Comput. 17(5): 1094-1108 (2020) - [c197]Isaac Polinsky, Kyle Martin, William Enck, Michael K. Reiter:
n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications. CODASPY 2020: 235-246 - [c196]Christopher M. Bender, Yang Li, Yifeng Shi, Michael K. Reiter, Junier Oliva:
Defense Through Diverse Directions. ICML 2020: 756-766 - [c195]Qiuyu Xiao, Brittany Subialdea, Lujo Bauer
, Michael K. Reiter:
Metering Graphical Data Leakage with Snowman. SACMAT 2020: 1-12 - [c194]Ke Coby Wang, Michael K. Reiter:
Detecting Stuffing of a User's Credentials at Her Own Accounts. USENIX Security Symposium 2020: 2201-2218 - [i21]Christopher M. Bender, Yang Li, Yifeng Shi, Michael K. Reiter, Junier B. Oliva:
Defense Through Diverse Directions. CoRR abs/2003.10602 (2020) - [i20]Iffat Anjum, Mu Zhu, Isaac Polinsky, William Enck, Michael K. Reiter, Munindar P. Singh:
Role-Based Deception in Enterprise Networks. CoRR abs/2008.02979 (2020)
2010 – 2019
- 2019
- [j50]Mahmood Sharif
, Sruti Bhagavatula, Lujo Bauer
, Michael K. Reiter:
A General Framework for Adversarial Examples with Objectives. ACM Trans. Priv. Secur. 22(3): 16:1-16:30 (2019) - [c193]Soumya Basu, Alin Tomescu, Ittai Abraham, Dahlia Malkhi, Michael K. Reiter, Emin Gün Sirer:
Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols. CCS 2019: 2387-2402 - [c192]Guy Golan-Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael K. Reiter, Dragos-Adrian Seredinschi, Orr Tamir, Alin Tomescu:
SBFT: A Scalable and Decentralized Trust Infrastructure. DSN 2019: 568-580 - [c191]Sheng Liu, Theophilus A. Benson, Michael K. Reiter:
Efficient and Safe Network Updates with Suffix Causal Consistency. EuroSys 2019: 23:1-23:15 - [c190]Ke Coby Wang, Michael K. Reiter:
How to End Password Reuse on the Web. NDSS 2019 - [c189]Xiaokuan Zhang, Jihun Hamm, Michael K. Reiter, Yinqian Zhang:
Statistical Privacy for Streaming Traffic. NDSS 2019 - [c188]Maofan Yin, Dahlia Malkhi, Michael K. Reiter
, Guy Golan-Gueta, Ittai Abraham:
HotStuff: BFT Consensus with Linearity and Responsiveness. PODC 2019: 347-356 - [i19]Isaac Polinsky, Kyle Martin, William Enck, Michael K. Reiter:
n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications. CoRR abs/1910.08648 (2019) - [i18]Mahmood Sharif, Lujo Bauer
, Michael K. Reiter:
n-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers. CoRR abs/1912.09059 (2019) - [i17]Mahmood Sharif, Keane Lucas, Lujo Bauer
, Michael K. Reiter, Saurabh Shintre:
Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection. CoRR abs/1912.09064 (2019) - [i16]Ke Coby Wang, Michael K. Reiter:
Detecting stuffing of a user's credentials at her own accounts. CoRR abs/1912.11118 (2019) - [i15]Adam Humphries, Kartik Cating-Subramanian, Michael K. Reiter:
TASE: Reducing latency of symbolic execution with transactional memory. CoRR abs/1912.12363 (2019) - 2018
- [c187]Sisi Duan, Michael K. Reiter, Haibin Zhang:
BEAT: Asynchronous BFT Made Practical. CCS 2018: 2028-2041 - [c186]Victor Heorhiadi, Sanjay Chandrasekaran, Michael K. Reiter, Vyas Sekar:
Intent-driven composition of resource-management SDN applications. CoNEXT 2018: 86-97 - [c185]Mahmood Sharif, Lujo Bauer
, Michael K. Reiter:
On the Suitability of Lp-Norms for Creating and Preventing Adversarial Examples. CVPR Workshops 2018: 1605-1613 - [c184]Guoxing Chen, Ten-Hwang Lai, Michael K. Reiter, Yinqian Zhang:
Differentially Private Access Patterns for Searchable Symmetric Encryption. INFOCOM 2018: 810-818 - [c183]Ziqiao Zhou, Zhiyun Qian
, Michael K. Reiter, Yinqian Zhang:
Static Evaluation of Noninterference Using Approximate Model Counting. IEEE Symposium on Security and Privacy 2018: 514-528 - [i14]Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter:
Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition. CoRR abs/1801.00349 (2018) - [i13]Mahmood Sharif, Lujo Bauer, Michael K. Reiter:
On the Suitability of Lp-norms for Creating and Preventing Adversarial Examples. CoRR abs/1802.09653 (2018) - [i12]Guy Golan-Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael K. Reiter, Dragos-Adrian Seredinschi, Orr Tamir, Alin Tomescu:
SBFT: a Scalable Decentralized Trust Infrastructure for Blockchains. CoRR abs/1804.01626 (2018) - [i11]Ke Coby Wang, Michael K. Reiter:
How to end password reuse on the web. CoRR abs/1805.00566 (2018) - [i10]Chenglu Jin, Marten van Dijk, Michael K. Reiter, Haibin Zhang:
PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion. IACR Cryptol. ePrint Arch. 2018: 1171 (2018) - 2017
- [j49]Jay Aikat, Aditya Akella, Jeffrey S. Chase, Ari Juels, Michael K. Reiter, Thomas Ristenpart, Vyas Sekar, Michael M. Swift:
Rethinking Security in the Era of Cloud Computing. IEEE Secur. Priv. 15(3): 60-69 (2017) - [j48]Qatrunnada Ismail, Tousif Ahmed, Kelly Caine, Apu Kapadia, Michael K. Reiter:
To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps' Privacy Permission Settings. Proc. Priv. Enhancing Technol. 2017(4): 119-137 (2017) - [j47]Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang:
Personalized Pseudonyms for Servers in the Cloud. Proc. Priv. Enhancing Technol. 2017(4): 271-289 (2017) - [c182]Sanchuan Chen, Xiaokuan Zhang, Michael K. Reiter, Yinqian Zhang:
Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu. AsiaCCS 2017: 7-18 - [c181]Sisi Duan, Michael K. Reiter, Haibin Zhang:
Secure Causal Atomic Broadcast, Revisited. DSN 2017: 61-72 - [c180]Weijie Liu, Debin Gao
, Michael K. Reiter:
On-Demand Time Blurring to Support Side-Channel Defense. ESORICS (2) 2017: 210-228 - [c179]Sheng Liu, Michael K. Reiter, Vyas Sekar:
Flow Reconnaissance via Timing Attacks on SDN Switches. ICDCS 2017: 196-206 - [c178]Andrew Chi, Robert A. Cochran, Marie Nesfield, Michael K. Reiter, Cynthia Sturton:
A System to Verify Network Behavior of Known Cryptographic Clients. NSDI 2017: 177-195 - 2016
- [c177]Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang:
A Software Approach to Defeating Side Channels in Last-Level Caches. CCS 2016: 871-882 - [c176]Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer
, Michael K. Reiter
:
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition. CCS 2016: 1528-1540 - [c175]Elli Androulaki, Michael K. Reiter:
CCSW'16: 8th ACM Cloud Computing Security Workshop. CCS 2016: 1882-1883 - [c174]Jassim Aljuraidan, Lujo Bauer, Michael K. Reiter, Matthias Beckerle:
Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational Workers. Financial Cryptography 2016: 60-77 - [c173]Victor Heorhiadi, Shriram Rajagopalan, Hani Jamjoom, Michael K. Reiter, Vyas Sekar:
Gremlin: Systematic Resilience Testing of Microservices. ICDCS 2016: 57-66 - [c172]Victor Heorhiadi, Michael K. Reiter, Vyas Sekar:
Simplifying Software-Defined Network Optimization Using SOL. NSDI 2016: 223-237 - [c171]Jay Aikat, Michael K. Reiter, Kevin Jeffay:
Education Modules for Networking, Cloud Computing, and Security in Systems Courses. SIGCSE 2016: 400 - [c170]Florian Tramèr
, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Stealing Machine Learning Models via Prediction APIs. USENIX Security Symposium 2016: 601-618 - [e5]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Elli Androulaki, Michael K. Reiter:
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, CCSW 2016, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4572-9 [contents] - [i9]Andrew Chi, Robert A. Cochran, Marie Nesfield, Michael K. Reiter, Cynthia Sturton:
Server-side verification of client behavior in cryptographic protocols. CoRR abs/1603.04085 (2016) - [i8]Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang:
A software approach to defeating side channels in last-level caches. CoRR abs/1603.05615 (2016) - [i7]Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Stealing Machine Learning Models via Prediction APIs. CoRR abs/1609.02943 (2016) - 2015
- [j46]Lei Wei, Michael K. Reiter:
Toward practical encrypted email that supports private, regular-expression searches. Int. J. Inf. Sec. 14(5): 397-416 (2015) - [c169]Mehrdad Moradi, Feng Qian, Qiang Xu, Zhuoqing Morley Mao, Darrell Bethea, Michael K. Reiter:
Caesar: High-Speed and Memory-Efficient Forwarding Engine for Future Internet Architecture. ANCS 2015: 171-182 - [c168]Michael K. Reiter:
Side Channels in Multi-Tenant Environments. CCSW 2015: 1 - [c167]Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang:
Mitigating Storage Side Channels Using Statistical Privacy Mechanisms. CCS 2015: 1582-1594 - [c166]Soo-Jin Moon, Vyas Sekar, Michael K. Reiter:
Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration. CCS 2015: 1595-1606 - [c165]Qatrunnada Ismail, Tousif Ahmed
, Apu Kapadia, Michael K. Reiter:
Crowdsourced Exploration of Security Configurations. CHI 2015: 467-476 - [c164]Darrell Bethea, Michael K. Reiter, Feng Qian, Qiang Xu, Zhuoqing Morley Mao:
WACCO and LOKO: Strong Consistency at Global Scale. CIC 2015: 130-141 - [c163]Peng Li, Debin Gao
, Michael K. Reiter:
Replica Placement for Availability in the Worst Case. ICDCS 2015: 599-608 - [c162]Sarah J. Andrabi, Michael K. Reiter, Cynthia Sturton:
Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices. SOUPS 2015: 89-102 - [e4]Michael K. Reiter, David Naccache:
Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings. Lecture Notes in Computer Science 9476, Springer 2015, ISBN 978-3-319-26822-4 [contents] - [i6]Victor Heorhiadi, Michael K. Reiter, Vyas Sekar:
Accelerating the Development of Software-Defined Network Optimization Applications Using SOL. CoRR abs/1504.07704 (2015) - 2014
- [j45]Hye-Chung Kum, Ashok K. Krishnamurthy, Ashwin Machanavajjhala, Michael K. Reiter, Stanley C. Ahalt:
Privacy preserving interactive record linkage (PPIRL). J. Am. Medical Informatics Assoc. 21(2): 212-220 (2014) - [j44]Peng Li, Debin Gao
, Michael K. Reiter:
StopWatch: A Cloud Architecture for Timing Channel Mitigation. ACM Trans. Inf. Syst. Secur. 17(2): 8:1-8:28 (2014) - [c161]Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Cross-Tenant Side-Channel Attacks in PaaS Clouds. CCS 2014: 990-1003 - [c160]Ting-Fang Yen, Victor Heorhiadi, Alina Oprea, Michael K. Reiter, Ari Juels:
An Epidemiological Study of Malware Encounters in a Large Enterprise. CCS 2014: 1117-1130 - [c159]Alana Libonati, Kelly Caine, Apu Kapadia, Michael K. Reiter:
Defending against device theft with human notarization. CollaborateCom 2014: 8-17 - [c158]Michelle L. Mazurek, Yuan Liang, William Melicher, Manya Sleeper, Lujo Bauer, Gregory R. Ganger, Nitin Gupta, Michael K. Reiter:
Toward strong, usable access control for shared distributed data. FAST 2014: 89-103 - [c157]Victor Heorhiadi, Seyed Kaveh Fayaz, Michael K. Reiter, Vyas Sekar:
SNIPS: A Software-Defined Approach for Scaling Intrusion Prevention Systems via Offloading. ICISS 2014: 9-29 - 2013
- [c156]Hye-Chung Kum, Ashok Kumar Krishnamurthy, Darshana Pathak, Michael K. Reiter, Stanley C. Ahalt:
Secure Decoupled Linkage (SDLink) system for building a social genome. IEEE BigData 2013: 7-11 - [c155]Yinqian Zhang, Michael K. Reiter:
Düppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud. CCS 2013: 827-838 - [c154]Seyed Kaveh Fayazbakhsh, Michael K. Reiter, Vyas Sekar:
Verifiable network function outsourcing: requirements, challenges, and roadmap. HotMiddlebox@CoNEXT 2013: 25-30 - [c153]Peng Li, Debin Gao
, Michael K. Reiter:
Mitigating access-driven timing channels in clouds using StopWatch. DSN 2013: 1-12 - [c152]Lei Wei, Michael K. Reiter:
Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud. ESORICS 2013: 147-163 - [c151]Robert A. Cochran, Michael K. Reiter:
Toward Online Verification of Client Behavior in Distributed Applications. NDSS 2013 - [c150]Lujo Bauer
, Lorrie Faith Cranor
, Saranga Komanduri, Michelle L. Mazurek, Michael K. Reiter, Manya Sleeper, Blase Ur:
The post anachronism: the temporal dimension of facebook privacy. WPES 2013: 1-12 - 2012
- [j43]Scott E. Coull, Andrew M. White, Ting-Fang Yen, Fabian Monrose, Michael K. Reiter:
Understanding domain registration abuses. Comput. Secur. 31(7): 806-815 (2012) - [j42]Attila Altay Yavuz
, Peng Ning, Michael K. Reiter:
BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems. ACM Trans. Inf. Syst. Secur. 15(2): 9:1-9:28 (2012) - [j41]Michael Abd-El-Malek, Matthew Wachs, James Cipar, Karan Sanghi, Gregory R. Ganger, Garth A. Gibson
, Michael K. Reiter:
File system virtual appliances: Portable file system implementations. ACM Trans. Storage 8(3): 9:1-9:26 (2012) - [c149]Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Cross-VM side channels and their use to extract private keys. CCS 2012: 305-316 - [c148]Peter F. Klemperer, Yuan Liang, Michelle L. Mazurek, Manya Sleeper, Blase Ur, Lujo Bauer
, Lorrie Faith Cranor
, Nitin Gupta, Michael K. Reiter:
Tag, you can see it!: using tags for access control in photo sharing. CHI 2012: 377-386 - [c147]Lujo Bauer
, Yuan Liang, Michael K. Reiter, Chad Spensky:
Discovering access-control misconfigurations: new approaches and evaluation methodologies. CODASPY 2012: 95-104 - [c146]Victor Heorhiadi, Michael K. Reiter, Vyas Sekar:
New opportunities for load balancing in network-wide intrusion detection systems. CoNEXT 2012: 361-372 - [c145]Lei Wei, Michael K. Reiter:
Third-Party Private DFA Evaluation on Encrypted Files in the Cloud. ESORICS 2012: 523-540 - [c144]Attila Altay Yavuz
, Peng Ning, Michael K. Reiter:
Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging. Financial Cryptography 2012: 148-163 - [c143]Vyas Sekar, Norbert Egi, Sylvia Ratnasamy, Michael K. Reiter, Guangyu Shi:
Design and Implementation of a Consolidated Middlebox Architecture. NSDI 2012: 323-336 - [c142]Ting-Fang Yen, Michael K. Reiter:
Revisiting Botnet Models and Their Implications for Takedown Strategies. POST 2012: 249-268 - [c141]Kami Vaniea, Lujo Bauer
, Lorrie Faith Cranor
, Michael K. Reiter:
Out of sight, out of mind: Effects of displaying access-control information near the item it controls. PST 2012: 128-136 - 2011
- [j40]Lujo Bauer
, Scott Garriss, Michael K. Reiter:
Detecting and resolving policy misconfigurations in access-control systems. ACM Trans. Inf. Syst. Secur. 14(1): 2:1-2:28 (2011) - [j39]Yao Liu, Peng Ning, Michael K. Reiter:
False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 14(1): 13:1-13:33 (2011) - [j38]Darrell Bethea, Robert A. Cochran, Michael K. Reiter:
Server-side verification of client behavior in online games. ACM Trans. Inf. Syst. Secur. 14(4): 32:1-32:27 (2011) - [c140]Lei Wei, Scott E. Coull, Michael K. Reiter:
Bounded vector signatures and their applications. AsiaCCS 2011: 277-285 - [c139]Robert W. Reeder, Lujo Bauer
, Lorrie Faith Cranor
, Michael K. Reiter, Kami Vaniea:
More than skin deep: measuring effects of the underlying model on access-control system usability. CHI 2011: 2065-2074 - [c138]Xin Huang, Fabian Monrose, Michael K. Reiter:
Amplifying limited expert input to sanitize large network traces. DSN 2011: 494-505 - [c137]