Michael K. Reiter
Orcid: 0000-0001-7007-8274Affiliations:
- Duke University, Durham, NC, USA
- Carnegie Mellon University, Pittsburgh, USA (former)
According to our database1,
Michael K. Reiter
authored at least 289 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2008, "For contributions to computer security and fault-tolerant distributed computing.".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography.
Dataset, May, 2024
Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography.
Dataset, April, 2024
IACR Cryptol. ePrint Arch., 2024
Concealing Backdoor Model Updates in Federated Learning by Trigger-Optimized Data Poisoning.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Group-based Robustness: A General Framework for Customized Robustness in the Real World.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
SensorBFT: Fault-Tolerant Target Localization Using Voronoi Diagrams and Approximate Agreement.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
PG: Byzantine Fault-Tolerant and Privacy-Preserving Sensor Fusion with Guaranteed Output Delivery.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon <i>without</i> Threshold Cryptography.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
CrudiTEE: A Stick-And-Carrot Approach to Building Trustworthy Cryptocurrency Wallets with TEEs.
Proceedings of the 6th Conference on Advances in Financial Technologies, 2024
2023
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription.
IEEE Secur. Priv., 2023
HashRand: Efficient Asynchronous Random Beacon without Threshold Cryptographic Setup.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 24th International Middleware Conference, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the Financial Cryptography and Data Security, 2023
Privately Evaluating Region Overlaps with Applications to Collaborative Sensor Output Validation.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
Defeating traffic analysis via differential privacy: a case study on streaming traffic.
Int. J. Inf. Sec., 2022
Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption.
Proceedings of the 26th International Conference on Principles of Distributed Systems, 2022
Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks.
Proceedings of the International Conference on Machine Learning, 2022
Proceedings of the Tenth International Conference on Learning Representations, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Coordinating Followers to Reach Better Equilibria: End-to-End Gradient Descent for Stackelberg Games.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
Proc. ACM Program. Lang., 2021
Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption.
IACR Cryptol. ePrint Arch., 2021
The Netivus Manifesto: making collaborative network management easier for the rest of us.
Comput. Commun. Rev., 2021
Brief Announcement: Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption.
Proceedings of the 35th International Symposium on Distributed Computing, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
Proceedings of the 37th International Conference on Machine Learning, 2020
n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
2019
ACM Trans. Priv. Secur., 2019
Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection.
CoRR, 2019
n-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers.
CoRR, 2019
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IACR Cryptol. ePrint Arch., 2018
On the Suitability of L<sub>p</sub>-norms for Creating and Preventing Adversarial Examples.
CoRR, 2018
Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition.
CoRR, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proc. Priv. Enhancing Technol., 2017
To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps' Privacy Permission Settings.
Proc. Priv. Enhancing Technol., 2017
Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational Workers.
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Int. J. Inf. Sec., 2015
Accelerating the Development of Software-Defined Network Optimization Applications Using SOL.
CoRR, 2015
Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Caesar: High-Speed and Memory-Efficient Forwarding Engine for Future Internet Architecture.
Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for networking and communications systems, 2015
2014
ACM Trans. Inf. Syst. Secur., 2014
J. Am. Medical Informatics Assoc., 2014
SNIPS: A Software-Defined Approach for Scaling Intrusion Prevention Systems via Offloading.
Proceedings of the Information Systems Security - 10th International Conference, 2014
Proceedings of the 12th USENIX conference on File and Storage Technologies, 2014
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud.
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
Proceedings of the 2013 workshop on Hot topics in middleboxes and network function virtualization, 2013
Düppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013
2012
ACM Trans. Storage, 2012
BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems.
ACM Trans. Inf. Syst. Secur., 2012
Out of sight, out of mind: Effects of displaying access-control information near the item it controls.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
Proceedings of the Principles of Security and Trust - First International Conference, 2012
Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, 2012
Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging.
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2012
Discovering access-control misconfigurations: new approaches and evaluation methodologies.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
ACM Trans. Inf. Syst. Secur., 2011
ACM Trans. Inf. Syst. Secur., 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), 2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
More than skin deep: measuring effects of the underlying model on access-control system usability.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
2010
IEEE Trans. Dependable Secur. Comput., 2010
Proceedings of the Replication: Theory and Practice, 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
The security of modern password expiration: an algorithmic framework and empirical analysis.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance.
IEEE Trans. Dependable Secur. Comput., 2009
Int. J. Secur. Networks, 2009
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Network and Distributed System Security Symposium, 2009
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles.
Proceedings of the Information Systems Security, 5th International Conference, 2009
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009
Proceedings of the Computer Security, 2009
Proceedings of the Detection of Intrusions and Malware, 2009
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
IEEE Trans. Parallel Distributed Syst., 2008
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software.
ACM Trans. Inf. Syst. Secur., 2008
Int. J. Inf. Sec., 2008
Proceedings of the 17th USENIX Security Symposium, 2008
Proceedings of the Stabilization, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the Principles of Distributed Systems, 12th International Conference, 2008
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, 2008
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008
Proceedings of the Detection of Intrusions and Malware, 2008
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
How low can you go?: recommendations for hardware-supported minimal TCB code execution.
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008
2007
Proceedings of the Distributed Computing, 21st International Symposium, 2007
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007
Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, 2007
Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
Proceedings of the Network and Distributed System Security Symposium, 2007
Proceedings of the Network and Distributed System Security Symposium, 2007
Proceedings of the Computer Security, 2007
Proceedings of the Computer Security, 2007
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007
2006
Proceedings of the Distributed Computing, 20th International Symposium, 2006
Proceedings of the 2006 USENIX Annual Technical Conference, 2006
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), 2006
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006
Proceedings of the Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing, 2006
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006
Proceedings of the Computer Security, 2006
Proceedings of the Computer Security, 2006
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006
Proceedings of the From Security to Dependability, 10.09. - 15.09.2006, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems (SRDS 2005), 2005
Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems (SRDS 2005), 2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, 2005
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005
Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, 2005
Proceedings of the Network and Distributed System Security Symposium, 2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Information Hiding, 7th International Workshop, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract).
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Financial Cryptography, 2004
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
2003
Theor. Comput. Sci., 2003
Distributed Comput., 2003
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
2002
Proceedings of the 11th USENIX Security Symposium, 2002
Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing (HPDC-11 2002), 2002
2001
IEEE Trans. Parallel Distributed Syst., 2001
IEEE Trans. Parallel Distributed Syst., 2001
ACM Trans. Inf. Syst. Secur., 2001
Proceedings of the 20th Symposium on Reliable Distributed Systems (SRDS 2001), 2001
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001
Proceedings of the 2001: A Speaker Odyssey, 2001
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001
Proceedings of the Security and Privacy in Digital Rights Management, 2001
2000
IEEE Trans. Software Eng., 2000
IEEE Trans. Knowl. Data Eng., 2000
Proceedings of the 2nd ACM Conference on Electronic Commerce (EC-00), 2000
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000
Proceedings of the CCS 2000, 2000
1999
IEEE Internet Comput., 1999
Comput. Networks, 1999
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999
Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing, 1999
1998
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998
Proceedings of the Security and Privacy, 1998
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998
1997
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing, 1997
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997
Proceedings of the CCS '97, 1997
Proceedings of the CCS '97, 1997
1996
IEEE Trans. Software Eng., 1996
Proceedings of the Advances in Cryptology, 1996
1995
1994
Proceedings of the Theory and Practice in Distributed Systems, International Workshop, 1994
Proceedings of the CCS '94, 1994
1993
A Security Architecture for Fault-Tolerant Systems.
PhD thesis, 1993
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993
1992
ACM SIGOPS Oper. Syst. Rev., 1992
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992