Michael Reiter :: Selected Publications by Forum

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Some bibliometrics for these papers can be found at Google Scholar and the ACM Digital Library.

This is not a complete list of my publications. Please see my curriculum vitae for a complete list.

A C D E F H I J L N O P R S T U W
ACNS
ASIACCS
ASPLOS
C&C
C&S
CCS
CHI
CODASPY
Comp. J.
Comp. Net.
COMSNETS
CoNEXT
CRYPTO
CSF
DCCA
DIMVA
DISC
DC
DSN
EC (ACM)
EC (Usenix)
ESORICS
EUROCRYPT
EuroSys
FAST
FC
HotMiddlebox
HotNets
HPC
ICDCS
ICICS
ICISS
ICNP
I&C
IJIS
IJSN
IMC
INSS
IPDPS
ISC
JCS
JoC
LASER NDSS
NSDI
OPODIS PODC
POST
PST
RAID S&P
SACMAT
SEC
SOSP
SOUPS
SRDS
STOC
TC
TCC
TCS
TDSC
TISSEC
TKDE
TOCS
TOPLAS
TOS
TPDS
TSE
Usenix ATC
Usenix Sec.
WPES

Back to Michael Reiter's home page


ACM Conference on Computer and Communications Security (CCS)
2014 Cross-tenant side-channel attacks in PaaS clouds
Y. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart. Pages 990–1003. doi:10.1145/2660267.2660356
An epidemiological study of malware encounters in a large enterprise
T.-F. Yen, V. Heorhiadi, A. Oprea, M. K. Reiter, and A. Juels. Pages 1117–1130. doi:10.1145/2660267.2660330
2013 Düppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud
Y. Zhang and M. K. Reiter. Pages 827–837. doi:10.1145/2508859.2516741   ©ACM
2012 Cross-VM side channels and their use to extract private keys
Y. Zhang, A. Juels, M. K. Reiter and T. Ristenpart. Pages 305–316. doi:10.1145/2382196.2382230   ©ACM
2010 The security of modern password expiration: An algorithmic framework and empirical analysis
Y. Zhang, F. Monrose and M. K. Reiter. Pages 176–186. doi:10.1145/1866307.1866328   ©ACM
2009 False data injection attacks against state estimation in electric power grids
Y. Liu, P. Ning and M. K. Reiter. Pages 21–32. doi:10.1145/1653662.1653666   ©ACM
Note: This paper is superceded by the journal version.
Privacy-preserving genomic computation through program specialization
R. Wang, X. Wang, Z. Li, H. Tang, M. K. Reiter and Z. Dong. Pages 338–347. doi:10.1145/1653662.1653703   ©ACM
2008 Towards practical biometric key generation with randomized biometric templates
L. Ballard, S. Kamara, F. Monrose and M. K. Reiter. Pages 235–244. doi:10.1145/1455770.1455801   ©ACM
2006 Packet vaccine: Black-box exploit detection and signature generation
X. Wang, Z. Li, J. Xu, M. K. Reiter, C. Kil and J. Y. Choi. Pages 37–46. doi:10.1145/1180405.1180412   ©ACM
Note: This paper is superceded by the journal version.
2004 Fragile mixing
M. K. Reiter and X. Wang. Pages 227–235. doi:10.1145/1030083.1030114   ©ACM
Mitigating bandwidth-exhaustion attacks using congestion puzzles
X. Wang and M. K. Reiter. Pages 257–267. doi:10.1145/1030083.1030118   ©ACM
Note: This paper is superceded by the journal version.
Gray-box extraction of execution graphs for anomaly detection
D. Gao, M. K. Reiter and D. Song. Pages 318–329. doi:10.1145/1030083.1030126   ©ACM
2003 Automatic generation of two-party computations
P. MacKenzie, A. Oprea and M. K. Reiter. Pages 210–219. doi:10.1145/948109.948139   ©ACM
2001 Delegation of cryptographic servers for capture-resilient devices
P. MacKenzie and M. K. Reiter. Pages 10–19. doi:10.1145/501983.501986   ©ACM
Note: This paper is superceded by the journal version.
1999 Password hardening based on keystroke dynamics
F. Monrose, M. K. Reiter and S. Wetzel. Pages 73–82. doi:10.1145/319709.319720   ©ACM
Note: This paper is superceded by the journal version.
1997 Fair exchange with a semi-trusted third party
M. K. Franklin and M. K. Reiter. Pages 1–6. doi:10.1145/266420.266424   ©ACM
Path independence for authentication in large-scale systems
M. K. Reiter and S. G. Stubblebine. Pages 57–66. doi:10.1145/266420.266435   ©ACM
Note: This paper is superceded by the journal version.
1996 The Ω key management service
M. K. Reiter, M. K. Franklin, J. B. Lacy and R. N. Wright. Pages 38–47. doi:10.1145/238168.238184   ©ACM
Note: This paper is superceded by the journal version.
1994 Secure agreement protocols: Reliable and atomic group multicast in Rampart
M. K. Reiter. Pages 68–80. doi:10.1145/191177.191194   ©ACM


ACM Conference on Data and Application Security and Privacy (CODASPY) [©ACM]
2012 Discovering access-control misconfigurations: New approaches and evaluation methodologies
L. Bauer, Y. Liang, M. K. Reiter and C. Spensky. Pages 95–104. doi:10.1145/2133601.2133613


ACM Conference on Electronic Commerce (EC) [©ACM]
2000 Privacy-preserving global customization
R. M. Arlein, B. Jai, M. Jakobsson, F. Monrose and M. K. Reiter. Pages 176–184. doi:10.1145/352871.352891


ACM Conference on Human Factors in Computing Systems (CHI) [©ACM]
2012 Tag, you can see it! Using tags for access control in photo sharing
P. F. Klemperer, Y. Liang, M. L. Mazurek, M. Sleeper, B. Ur, L. Bauer, L. F. Cranor, N. Gupta and M. K. Reiter. Pages 377–386. doi:10.1145/2207676.2207728
2011 More than skin deep: Measuring effects of the underlying model on access-control system usability
R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter and K. Vaniea. Pages 2065–2074. doi:10.1145/1978942.1979243
2009 Real life challenges in access-control management
L. Bauer, L. F. Cranor, R. W. Reeder, M. K. Reiter and K. Vaniea. Pages 899–908. doi:10.1145/1518701.1518838
2008 A user study of policy creation in a flexible access-control system
L. Bauer, L. F. Cranor, R. W. Reeder, M. K. Reiter and K. Vaniea. Pages 543–552. doi:10.1145/1357054.1357143
Expandable grids for visualizing and authoring computer security policies
R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter, K. Bacon, K. How and H. Strong. Pages 1473–1482. doi:10.1145/1357054.1357285


ACM Symposium on Access Control Models and Technologies (SACMAT) [©ACM]
2009 xDomain: Cross-border proofs of access
L. Bauer, L. Jia, M. K. Reiter and D. Swasey. Pages 43–52. doi:10.1145/1542207.1542216
2008 Detecting and resolving policy misconfigurations in access-control systems
L. Bauer, S. Garriss and M. K. Reiter. Pages 185–194. doi:10.1145/1377836.1377866
Note: This paper is superceded by the journal version.


ACM Symposium on Information, Computer and Communications Security (ASIACCS) [©ACM]
2011 Bounded vector signatures and their applications
L. Wei, S. E. Coull and M. K. Reiter. Pages 277–285. doi:10.1145/1966913.1966949


IFIP TC-11 International Information Security Conference (SEC) [© Springer-Verlag]
2010 Understanding domain registration abuses
S. E. Coull, A. M. White, T.-F. Yen, F. Monrose and M. K. Reiter. Pages 68-79. doi:10.1007/978-3-642-15257-3_7
Note: This paper is superceded by the journal version.


ACM Symposium on Operating Systems Principles (SOSP) [©ACM]
2007 Low-overhead Byzantine fault-tolerant storage
J. Hendricks, G. R. Ganger and M. K. Reiter. Pages 73–86. doi:10.1145/1294261.1294269
2005 Fault-scalable Byzantine fault-tolerant services
M. Abd-El-Malek, G. R. Ganger, G. R. Goodson, M. K. Reiter and J. J. Wylie. Pages 59–74. doi:10.1145/1095810.1095817


ACM Symposium on Principles of Distributed Computing (PODC) [©ACM]
2007 Verifying distributed erasure-coded data
J. Hendricks, G. R. Ganger and M. K. Reiter. Pages 139–146. doi:10.1145/1281100.1281122
2006 Quorum placement in networks: Minimizing network congestion
D. Golovin, A. Gupta, B. M. Maggs, F. Oprea and M. K. Reiter. Pages 16–25. doi:10.1145/1146381.1146388
2005 Quorum placement in networks to minimize access delays
A. Gupta, B. M. Maggs, F. Oprea and M. K. Reiter. Pages 87–96. doi:10.1145/1073814.1073829
2001 Selective private function evaluation with applications to private statistics
R. Canetti, Y. Ishai, R. Kumar, M. K. Reiter, R. Rubinfeld and R. N. Wright. Pages 293–304. doi:10.1145/383962.384047
1999 On k-set consensus problems in asynchronous systems
R. De Prisco, D. Malkhi and M. K. Reiter. Pages 257–265. doi:10.1145/301308.301368
Note: This paper is superceded by the journal version.
1997 The load and availability of Byzantine quorum systems
D. Malkhi, M. Reiter and A. Wool. Pages 249–257. doi:10.1145/259380.259450
Note: This paper is superceded by the journal version.
Probabilistic quorum systems
D. Malkhi, M. Reiter and R. Wright. Pages 267–273. doi:10.1145/259380.259458
Note: This paper is superceded by the journal version.


ACM Symposium on Theory of Computing (STOC) [©ACM]
1997 Byzantine quorum systems
D. Malkhi and M. Reiter. Pages 569–578. doi:10.1145/258533.258650
Note: This paper is superceded by the journal version.


ACM Transactions on Computer Systems (TOCS) [©ACM]
1994 A security architecture for fault-tolerant systems
M. K. Reiter, K. P. Birman and R. van Renesse. 12(4):340–371. doi:10.1145/195792.195823


ACM Transactions on Information and System Security (TISSEC)
2014 StopWatch: A cloud architecture for timing channel mitigation
P. Li, D. Gao, and M. K. Reiter. 17(2). doi:10.1145/2670940
2011 Server-side verification of client behavior in online games
D. Bethea, R. A. Cochran and M. K. Reiter. 14(4). doi:10.1145/2043628.2043633   ©ACM
Detecting and resolving policy misconfigurations in access-control systems
L. Bauer, S. Garriss and M. K. Reiter. 14(1). doi:10.1145/1952982.1952984   ©ACM
False data injection attacks against state estimation in electric power grids
Y. Liu, P. Ning and M. K. Reiter. 14(1). doi:10.1145/1952982.1952995   ©ACM
2008 Fast and black-box exploit detection and signature generation for commodity software
X. Wang, Z. Li, J. Y. Choi, J. Xu, M. K. Reiter and C. Kil. 12(2). doi:10.1145/1455518.1455523   ©ACM
2001 An authorization model for a public key management service
P. Samarati, M. K. Reiter and S. Jajodia. 4(4):453–482. doi:10.1145/503339.503343   ©ACM
1999 Authentication metric analysis and design
M. K. Reiter and S. G. Stubblebine. 2(2):138–158. doi:10.1145/317087.317088   ©ACM
1998 Crowds: Anonymity for web transactions
M. K. Reiter and A. D. Rubin. 1(1):66–92. doi:10.1145/290163.290168   ©ACM


ACM Transactions on Programming Languages and Systems (TOPLAS)
1994 How to securely replicate services
M. K. Reiter and K. P. Birman. 16(3):986–1009, May 1994. doi:10.1145/177492.177745   ©ACM


ACM Transactions on Storage (TOS) [©ACM]
2012 File system virtual appliances: Portable file system implementations
M. Abd-El-Malek, M. Wachs, J. Cipar, K. Sanghi, G. R. Ganger, G. A. Gibson and M. K. Reiter. 8(3), September 2012. doi:10.1145/2339118.2339120


ACM Workshop on Hot Topics in Middleboxes and Network Function Virtualization [©ACM]
2013 Verifiable network function outsourcing: Requirements, challenges, and roadmap
S. K. Fayazbakhsh, M. K. Reiter, and V. Sekar. Pages 25–30. doi:10.1145/2535828.2535831


ACM Workshop on Hot Topics in Networks [©ACM]
2011 The middlebox manifesto: Enabling innovation in middlebox deployment
V. Sekar, S. Ratnasamy, M. K. Reiter, N. Egi and G. Shi. doi:10.1145/2070562.2070583
2004 Toward a framework for Internet forensic analysis
V. Sekar, Y. Xie, D. A. Maltz, M. K. Reiter and H. Zhang.


ACM Workshop on Privacy in the Electronic Society
2013 The post anachronism: The temporal dimension of Facebook privacy
L. Bauer, L. F. Cranor, S. Komanduri, M. L. Mazurek, M. K. Reiter, M. Sleeper, and B. Ur. Pages 1–12. doi:10.1145/2517840.2517859


Applied Cryptography and Network Security (ACNS) [© Springer-Verlag]
2005 Building reliable mix networks with fair exchange
M. K. Reiter, X. Wang and M. Wright. Lecture Notes in Computer Science 3531, pages 378–392. doi:10.1007/11496137_26
2004 Private keyword-based push and pull with applications to anonymous communication
L. Kissner, A. Oprea, M. K. Reiter, D. Song and K. Yang. Lecture Notes in Computer Science 3089, pages 16–30.


The Computer Journal [© British Computer Society]
1995 Securing causal relationships in distributed systems
M. K. Reiter and L. Gong. 38(8):633–642. doi:10.1093/comjnl/38.8.633


Computer Networks
1999 On the security of pay-per-click and other Web advertising schemes
V. Anupam, A. Mayer, K. Nissim, B. Pinkas and M. K. Reiter. 31(11–16):1091–1100. doi:10.1016/S1389-1286(99)00023-7


Computers and Security [© Elsevier Ltd.]
2012 Understanding domain registration abuses
S. E. Coull, A. M. White, T.-F. Yen, F. Monrose and M. K. Reiter. 31(7):806–815. doi:10.1016/j.cose.2012.05.005


Concurrency and Computation: Practice and Experience
2002 Advanced concurrency control in Java
P. Felber and M. K. Reiter. 14(4):261–285. doi:10.1002/cpe.635


Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) [© Springer-Verlag]
2009 Browser fingerprinting from coarse traffic summaries: Techniques and implications
T.-F. Yen, X. Huang, F. Monrose and M. K. Reiter. Lecture Notes in Computer Science 5587, pages 157–175. doi:10.1007/978-3-642-02918-9_10
2008 Traffic aggregation for malware detection
T.-F. Yen and M. K. Reiter. Lecture Notes in Computer Science 5137, pages 207–227. doi:10.1007/978-3-540-70542-0_11


Conference on Privacy, Security and Trust (PST) [© IEEE]
2012 Out of sight, out of mind: Effects of displaying access-control information near the item it controls
K. Vaniea, L. Bauer, L. F. Cranor and M. K. Reiter. Pages 128–136. doi:10.1109/PST.2012.6297929


International Conference on Communications and Networks (COMSNETS) [© IEEE]
2010 Coordinated sampling sans origin-destination identifiers: Algorithms and analysis
V. Sekar, A. Gupta, M. K. Reiter and H. Zhang. doi:10.1109/COMSNETS.2010.5432011


International Conference on Emerging Networking Experiments and Technologies (CoNEXT) [©ACM]
2012 New opportunities for load balancing in network-wide intrusion detection systems
V. Heorhiadi, M. K. Reiter and V. Sekar. doi:10.1145/2413176.2413218
2010 Network-wide deployment of intrusion detection and prevention systems
V. Sekar, R. Krishnaswamy, A. Gupta and M. K. Reiter. doi:10.1145/1921168.1921192


CRYPTO [© Springer-Verlag]
2001 Two party generation of DSA signatures
P. MacKenzie and M. K. Reiter. Lecture Notes in Computer Science 2139, pages 137–154.
Note: This paper is superceded by the journal version.


Distributed Computing [© Springer-Verlag]
2003 Objects shared by Byzantine processes
D. Malkhi, M. Merritt, M. K. Reiter and G. Taubenfeld. 16(1)37–48. doi:10.1007/s00446-002-0075-3
Delegation of cryptographic servers for capture-resilient devices
P. MacKenzie and M. K. Reiter. 16(4):307–327. doi:10.1007/s00446-003-0098-4
1998 Byzantine quorum systems
D. Malkhi and M. Reiter. 11(4):203–213. doi:10.1007/s004460050050


EUROCRYPT [© Springer-Verlag]
1996 Low-exponent RSA with related messages
D. Coppersmith, M. Franklin, J. Patarin and M. Reiter. Lecture Notes in Computer Science 1070, pages 1–9.
1995 Verifiable signature sharing
M. K. Franklin and M. K. Reiter. Lecture Notes in Computer Science 921, pages 50–63.


European Conference on Computer Systems (EuroSys) [©ACM]
2008 Flicker: An execution infrastructure for TCB minimization
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter and H. Isozaki. Pages 315–328. doi:10.1145/1352592.1352625


European Symposium on Research in Computer Security (ESORICS) [© Springer-Verlag]
2013 Ensuring file authenticity in private DFA evaluation on encrypted files in the cloud
L. Wei and M. K. Reiter. Lecture Notes in Computer Science 8134, pages 147–163. doi:10.1007/978-3-642-40203-6_9
2012 Third-party private DFA evaluation on encrypted files in the cloud
L. Wei and M. K. Reiter. Lecture Notes in Computer Science 7459, pages 523–540. doi:10.1007/978-3-642-33167-1_30
2009 Data structures with unpredictable timing
D. Bethea and M. K. Reiter. Lecture Notes in Computer Science 5789, pages 456–471. doi:10.1007/978-3-642-04444-1_28
2007 Efficient proving for practical distributed access-control systems
L. Bauer, S. Garriss and M. K. Reiter. Lecture Notes in Computer Science 4734, pages 19–37. doi:10.1007/978-3-540-74835-9_3
2006 Finding peer-to-peer file-sharing using coarse network behaviors
M. P. Collins and M. K. Reiter. Lecture Notes in Computer Science 4189, pages 1–17. doi:10.1007/11863908_1
A linear logic of authorization and knowledge
D. Garg, L. Bauer, K. D. Bowers, F. Pfenning and M. K. Reiter. Lecture Notes in Computer Science 4189, pages 297–312. doi:10.1007/11863908_19


IEEE Computer Security Foundations (CSF) [© IEEE]
1997 Unreliable intrusion detection in distributed computations
D. Malkhi and M. Reiter. Pages 116–124. doi:10.1109/CSFW.1997.596799
1996 A high-throughput secure reliable multicast protocol
D. Malki and M. Reiter. Pages 9–17. doi:10.1109/CSFW.1996.503686
Note: This paper is superceded by the journal version.


IEEE International Conference on Network Protocols (ICNP) [© IEEE]
2006 Forensic analysis for epidemic attacks in federated networks
Y. Xie, V. Sekar, M. K. Reiter and H. Zhang. Pages 43–53. doi:10.1109/ICNP.2006.320197


IEEE International Conference on Networked Sensing Systems (INSS) [© IEEE]
2009 Authenticated data compression in delay tolerant wireless sensor networks
Y.-H. Oh, P. Ning, Y. Liu and M. K. Reiter. Pages 137–144.


IEEE International Parallel and Distributed Processing Symposium (IPDPS) [© IEEE]
2008 Self-optimizing distributed trees
M. K. Reiter, A. Samar and C. Wang. doi:10.1109/IPDPS.2008.4536248


IEEE International Symposium on High Performance Distributed Computing [© IEEE]
2002 A secure distributed search system
Y. Xie, D. O'Hallaron and M. K. Reiter. Pages 321–330. doi:10.1109/HPDC.2002.1029932


IEEE Symposium on Reliable Distributed Systems (SRDS) [© IEEE]
2009 When and how to change quorums on wide area networks
M. G. Merideth, F. Oprea and M. K. Reiter. Pages 12–21. doi:10.1109/SRDS.2009.35
2006 WRAPS: Denial-of-service defense through web referrals
X. Wang and M. K. Reiter. Pages 51–60. doi:10.1109/SRDS.2006.48
2005 Distributed construction of a fault-tolerant network from a tree
M. K. Reiter, A. Samar and C. Wang. Pages 155–165. doi:10.1109/RELDIS.2005.16
Lazy verification in fault-tolerant distributed storage systems
M. Abd-El-Malek, G. R. Ganger, G. R. Goodson, M. K. Reiter and J. J. Wylie. Pages 179–190. doi:10.1109/RELDIS.2005.20
2004 Nested objects in a Byzantine quorum-replicated system
C. P. Fry and M. K. Reiter. Pages 79–89. doi:10.1109/RELDIS.2004.1353005
2003 The design and implementation of a JCA-compliant capture protection infrastructure
M. K. Reiter, A. Samar and C. Wang. doi:10.1109/RELDIS.2003.1238086
2001 Efficient update diffusion in Byzantine environments
D. Malkhi, M. K. Reiter, O. Rodeh and Y. Sella. Pages 90–98. doi:10.1109/RELDIS.2001.969758
1999 On diffusing updates in a Byzantine environment
D. Malkhi, Y. Mansour and M. K. Reiter. Pages 134–143. doi:10.1109/RELDIS.1999.805090
Note: This paper is superceded by the journal version.
1998 Survivable consensus objects
D. Malkhi and M. Reiter. Pages 271–279. doi:10.1109/RELDIS.1998.740509
Note: This paper is superceded by the journal version.
Secure and scalable replication in Phalanx
D. Malkhi and M. Reiter. Pages 51–58. doi:10.1109/RELDIS.1998.740474


IEEE Symposium on Security and Privacy (S&P) [© IEEE]
2011 HomeAlone: Co-residency detection in the cloud via side-channel analysis
Y. Zhang, A. Juels, A. Oprea and M. K. Reiter. Pages 313–328. doi:10.1109/SP.2011.31
2007 Minimal TCB code execution (extended abstract)
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter and A. Seshadri. Pages 267–272. doi:10.1109/SP.2007.27
2005 Detection of denial-of-message attacks on sensor network broadcasts
J. M. McCune, E. Shi, A. Perrig and M. K. Reiter. Pages 64–78. doi:10.1109/SP.2005.7
Distributed proving in access-control systems
L. Bauer, S. Garriss and M. K. Reiter. Pages 81–95. doi:10.1109/SP.2005.9
Seeing-is-believing: Using camera phones for human-verifiable authentication
J. M. McCune, A. Perrig and M. K. Reiter. Pages 110–124. doi:10.1109/SP.2005.19
Note: This paper is superceded by the journal version.
Worm origin identification using random moonwalks
Y. Xie, V. Sekar, D. Maltz, M. K. Reiter and H. Zhang. Pages 242–256. doi:10.1109/SP.2005.23
2004 An empirical analysis of target-resident DoS filters
M. Collins and M. K. Reiter. Pages 103–114. doi:10.1109/SECPRI.2004.1301318
2003 Defending against denial-of-service attacks with puzzle auctions
X. Wang and M. K. Reiter. Pages 78–92. doi:10.1109/SECPRI.2003.1199329
Note: This paper is superceded by the journal version.
2001 Networked cryptographic devices resilient to capture
P. MacKenzie and M. K. Reiter. Pages 12–25. doi:10.1109/SECPRI.2001.924284
Note: This paper is superceded by the journal version.
Cryptographic key generation from voice
F. Monrose, M. K. Reiter, Q. Li and S. Wetzel. Pages 202–213, May 2001. doi:10.1109/SECPRI.2001.924299
1998 Secure execution of Java applets using a remote playground
D. Malkhi, M. Reiter and A. Rubin. Pages 40–51. doi:10.1109/SECPRI.1998.674822
Note: This paper is superceded by the journal version.
1997 Toward acceptable metrics of authentication
M. K. Reiter and S. G. Stubblebine. Pages 10–20. doi:10.1109/SECPRI.1997.601308
Note: This paper is superceded by the journal version.
1995 The design and implementation of a secure auction service
M. K. Franklin and M. K. Reiter. Pages 2–14. doi:10.1109/SECPRI.1995.398918
Note: This paper is superceded by the journal version.
1994 A secure group membership protocol
M. K. Reiter. Pages 176–189. doi:10.1109/RISP.1994.296582
Note: This paper is superceded by the journal version.
1993 Preventing denial and forgery of causal relationships in distributed systems
M. K. Reiter and L. Gong. Pages 30–40. doi:10.1109/RISP.1993.287645
Note: This paper is superceded by the journal version.
1992 Integrating security in a group oriented distributed system
M. K. Reiter, K. P. Birman and L. Gong. Pages 18–32. doi:10.1109/RISP.1992.213273


IEEE Transactions on Computers (TC) [© IEEE]
1998 Resilient authentication using path independence
M. K. Reiter and S. G. Stubblebine. 47(12):1351–1362. doi:10.1109/12.737682


IEEE Transactions on Dependable and Secure Computing (TDSC) [© IEEE]
2009 Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance
D. Gao, M. K. Reiter and D. Song. 6(2):96–110. doi:10.1109/TDSC.2008.39


IEEE Transactions on Knowledge and Data Engineering (TKDE) [© IEEE]
2000 An architecture for survivable coordination in large distributed systems
D. Malkhi and M. K. Reiter. 12(2):187–202. doi:10.1109/69.842262


IEEE Transactions on Parallel and Distributed Systems (TPDS) [© IEEE]
2008 Quiver: Consistent object sharing for edge services
M. K. Reiter and A. Samar. 19(7):878–889. doi:10.1109/TPDS.2007.70790
2001 On k-set consensus problems in asynchronous systems
R. De Prisco, D. Malkhi and M. K. Reiter. 12(1):7–21. doi:10.1109/71.899936
Fault detection for Byzantine quorum systems
L. Alvisi, D. Malkhi, E. Pierce and M. K. Reiter. 12(9):996–1007. doi:10.1109/71.954640


IEEE Transactions on Software Engineering (TSE) [© IEEE]
2000 Secure execution of Java applets using a remote playground
D. Malkhi and M. K. Reiter. 26(12):1197–1209. doi:10.1109/32.888632
1996 A secure group membership protocol
M. K. Reiter. 22(1):31–42. doi:10.1109/32.481515
The design and implementation of a secure auction service
M. K. Franklin and M. K. Reiter. 22(5):302–312. doi:10.1109/32.502223


IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) [© IEEE]
2013 Mitigating access-driven timing channels in clouds using StopWatch
P. Li, D. Gao, and M. K. Reiter. doi:10.1109/DSN.2013.6575299
Note: This paper is superceded by the journal version.
2011 Amplifying limited expert input to sanitize large network traces
X. Huang, F. Monrose and M. K. Reiter. Pages 494–505. doi:10.1109/DSN.2011.5958262
2010 Zzyzx: Scalable fault tolerance through Byzantine locking
J. Hendricks, S. Sinnamohideen, G. R. Ganger and M. K. Reiter. Pages 363–372. doi:10.1109/DSN.2010.5544297
2008 AGIS: Towards automatic generation of infection signatures
Z. Li, X. Wang, Z. Liang and M. K. Reiter. Pages 237–246. doi:10.1109/DSN.2008.4630092
2007 Minimizing response time for quorum-system protocols over wide-area networks
F. Oprea and M. K. Reiter. Pages 409–418. doi:10.1109/DSN.2007.66
2006 A multi-resolution approach for worm detection and containment
V. Sekar, Y. Xie, M. K. Reiter and H. Zhang. Pages 189–198. doi:10.1109/DSN.2006.6
2004 Efficient Byzantine-tolerant erasure-coded storage
G. R. Goodson, J. J. Wylie, G. R. Ganger and M. K. Reiter. doi:10.1109/DSN.2004.1311884
2000 Dynamic Byzantine quorum systems
L. Alvisi, D. Malkhi, E. Pierce, M. K. Reiter and R. N. Wright. Pages 283–292. doi:10.1109/ICDSN.2000.857551


IFIP Working Conference on Dependable Computing for Critical Applications (DCCA) [© IEEE]
1999 Fault detection for Byzantine quorum systems
L. Alvisi, D. Malkhi, L. Pierce and M. K. Reiter. Pages 357–371. doi:10.1109/DCFTS.1999.814307
Note: This paper is superceded by the journal version.


Information and Computation
2001 Probabilistic quorum systems
D. Malkhi, M. K. Reiter, A. Wool and R. N. Wright. 170(2): 184–206. doi:10.1006/inco.2001.3054


Information Security Conference (ISC) [© Springer-Verlag]
2010 Summary-invisible networking: Techniques and defenses
L. Wei, M. K. Reiter and K. Mayer-Patel. Lecture Notes in Computer Science 6531, pages 210–225. doi:10.1007/978-3-642-18178-8_19
2004 Device-enabled authorization in the Grey system
L. Bauer, S. Garriss, J. M. McCune, M. K. Reiter, J. Rouse, and P. Rutenbar. Lecture Notes in Computer Science 3650, pages 431–445. doi:10.1007/11556992_31


International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) [©ACM]
2008 How low can you go? Recommendations for hardware-supported minimal TCB code execution
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter and A. Seshadri. Pages 14–25. doi:10.1145/1346281.1346285


International Conference on Distributed Computing Systems (ICDCS) [© IEEE]
2010 Are your hosts trading or plotting? Telling P2P file-sharing and bots apart
T.-F. Yen and M. K. Reiter. Pages 241–252. doi:10.1109/ICDCS.2010.76
2006 M2: Multicasting mixes for efficient and anonymous communication
G. Perng, M. K. Reiter and C. Wang. doi:10.1109/ICDCS.2006.53
2001 Backoff protocols for distributed mutual exclusion and ordering
G. Chockler, D. Malkhi and M. K. Reiter. Pages 11–20. doi:10.1109/ICDSC.2001.918928


International Conference on Financial Cryptography (FC) [© Springer-Verlag]
2012 Efficient, compromise resilient and append-only cryptographic schemes for secure audit logging
A. A. Yavuz, P. Ning and M. K. Reiter. Lecture Notes in Computer Science 7397, pages 148–163. doi:10.1007/978-3-642-32946-3_12
2004 Timing attacks in low-latency mix systems
B. N. Levine, M. K. Reiter, C. Wang and M. Wright. Lecture Notes in Computer Science 3110, pages 251–265.


International Conference on Information and Communications Security (ICICS) [© Springer-Verlag]
2008 BinHunt: Automatically finding semantic differences in binary programs
D. Gao, M. K. Reiter and D. Song. Lecture Notes in Computer Science 5308, pages 238–255. doi:10.1007/978-3-540-88625-9_16
2004 Time-scoped searching of encrypted audit logs
D. Davis, F. Monrose and M. K. Reiter. Lecture Notes in Computer Science 3269, pages 532–545.


International Conference on Information Systems Security [© Springer]
2014 SNIPS: A software-defined approach for scaling intrusion prevention systems via offloading
V. Heorhiadi, S. K. Fayaz, M. K. Reiter, and V. Sekar. Lecture Notes in Computer Science 8880, pages 9–29. doi:10.1007/978-3-319-13841-1_2
2009 Making peer-assisted content distribution robust to collusion using bandwidth puzzles
M. K. Reiter, V. Sekar, C. Spensky and Z. Zhang. Lecture Notes in Computer Science 5905, pages 132–147. doi:10.1007/978-3-642-10772-6_11


International Conference on Principles of Distributed Systems (OPODIS) [© Springer]
2008 Write markers for probabilistic quorum systems
M. G. Merideth and M. K. Reiter. Lecture Notes in Computer Science 5401, pages 5–21. doi:10.1007/978-3-540-92221-6_3


International Conference on Principles of Security and Trust (POST) [© Springer]
2012 Revisiting botnet models and their implications for takedown strategies
T.-F. Yen and M. K. Reiter. Lecture Notes in Computer Science 7215, pages 249–268. doi:10.1007/978-3-642-28641-4_14


International Journal of Information Security
2014 Toward practical encrypted email that supports private, regular-expression searches
L. Wei and M. K. Reiter. doi:10.1007/s10207-014-0268-3
2007 A multi-layer framework for puzzle-based denial-of-service defense
X. Wang and M. K. Reiter. doi:10.1007/s10207-007-0042-x   ©Springer
2004 Two-party generation of DSA signatures
P. MacKenzie and M. K. Reiter. 2(3–4):218–239. doi:10.1007/s10207-004-0041-0   ©Springer
2003 Networked cryptographic devices resilient to capture
P. MacKenzie and M. K. Reiter. 2(1):1–20. doi:10.1007/s10207-003-0022-8   ©Springer
2002 Password hardening based on keystroke dynamics
F. Monrose, M. K. Reiter and S. G. Wetzel. 1(2):69–83. doi:10.1007/s102070100006   ©Springer


International Journal on Security and Networks
2009 Seeing-Is-Believing: Using camera-phones for human-verifiable authentication
J. M. McCune, A. Perrig and M. K. Reiter. 4(1–2):43–56. doi:10.1504/IJSN.2009.023425


International Symposium on Distributed Computing (DISC) [© Springer-Verlag]
2007 Probabilistic opaque quorum systems
M. G. Merideth and M. K. Reiter. Lecture Notes in Computer Science 4731, pages 403–419. doi:10.1007/978-3-540-75142-7_31
2006 On consistency of encrypted files
A. Oprea and M. K. Reiter. Lecture Notes in Computer Science 4167, pages 254–268. doi:10.1007/11864219_18
2000 Objects shared by Byzantine processes
D. Malkhi, M. Merritt, M. K. Reiter and G. Taubenfeld. Lecture Notes in Computer Science 1914, pages 345–359.
Note: This paper is superceded by the journal version.


International Symposium on Recent Advances in Intrusion Detection (RAID) [© Springer-Verlag]
2010 On challenges in evaluating malware clustering
P. Li, L. Liu, D. Gao and M. K. Reiter. Lecture Notes in Computer Science 6307, pages 238–255. doi:10.1007/978-3-642-15512-3_13
2009 Automatically adapting a trained anomaly detector to software patches
P. Li, D. Gao and M. K. Reiter. Lecture Notes in Computer Science 5758, pages 142–160. doi:10.1007/978-3-642-04342-0_8
2008 On the limits of payload-oblivious network attack detection
M. P. Collins and M. K. Reiter. Lecture Notes in Computer Science 5230, pages 251–270. doi:10.1007/978-3-540-87403-4_14
2007 Hit-list worm detection and bot identification in large networks using protocol graphs
M. P. Collins and M. K. Reiter. Lecture Notes in Computer Science 4637, pages 276–295. doi:10.1007/978-3-540-74320-0_15
2006 Behavioral distance measurement using hidden Markov models
D. Gao, M. K. Reiter and D. Song. Lecture Notes in Computer Science 4219, pages 19–40. doi:10.1007/11856214_2
Note: This paper is superceded by the journal version.
2005 Behavioral distance for intrusion detection
D. Gao, M. K. Reiter and D. Song. Lecture Notes in Computer Science 3858, pages 63–81. doi:10.1007/11663812_4
2004 Seurat: A pointillist approach to anomaly detection
Y. Xie, H. Kim, D. R. O'Hallaron, M. K. Reiter and H. Zhang. Lecture Notes in Computer Science 3224, pages 238–257.


Internet Measurement Conference (IMC) [©ACM]
2010 Revisiting the case for a minimalist approach for network flow monitoring
V. Sekar, M. K. Reiter and H. Zhang. Pages 328–341. doi:10.1145/1879141.1879186


Internet Society Network and Distributed System Security Symposium (NDSS) [© Internet Society]
2013 Toward online verification of client behavior in distributed applications
R. A. Cochran and M. K. Reiter.
2011 Usability testing a malware-resistant input mechanism
A. Libonati, J. M. McCune and M. K. Reiter. Pages 435–451.
2010 Server-side verification of client behavior in online games
D. Bethea, R. A. Cochran and M. K. Reiter. Pages 21–36.
Note: This paper is superceded by the journal version.
2009 Safe passage for passwords and other sensitive data
J. M. McCune, A. Perrig and M. K. Reiter. Pages 301–320.
2008 Taming the devil: Techniques for evaluating anonymized network data
S. E. Coull, C. V. Wright, A. D. Keromytis, F. Monrose and M. K. Reiter. Pages 125–135.
Note: The version posted here corrects notational errors in the published version.
2007 Playing devil's advocate: Inferring sensitive information from anonymized network traces
S. E. Coull, C. V. Wright, F. Monrose, M. P. Collins and M. K. Reiter. Pages 35–47.
Consumable credentials in logic-based access control
K. D. Bowers, L. Bauer, D. Garg, F. Pfenning and M. K. Reiter. Pages 143–157.
2005 Space-efficient block storage integrity
A. Oprea, M. K. Reiter and K. Yang. Pages 17–28.


Journal of Computer Security
1997 A high-throughput secure reliable multicast protocol
D. Malkhi and M. Reiter. 5:113–127.
1996 The Ω key management service
M. K. Reiter, M. K. Franklin, J. B. Lacy and R. N. Wright. 4(4):267–287.


Learning from Authoritative Security Experiment Results (LASER) [©ACM]
2012 Studying access-control usability in the lab: Lessons learned from four studies
K. Vaniea, L. Bauer, L. F. Cranor and M. K. Reiter. Pages 31–40. doi:10.1145/2379616.2379621


Security and Privacy in Digital Rights Management [© Springer-Verlag]
2002 Discouraging software piracy using software aging
M. Jakobsson and M. K. Reiter. Lecture Notes in Computer Science 2320, pages 1–12.


SIAM Journal of Computing
2000 The load and availability of Byzantine quorum systems
D. Malkhi, M. K. Reiter and A. Wool. 29(6):1889–1906. doi:10.1137/S0097539797325235


Symposium on Usable Privacy and Security (SOUPS)
2007 Lessons learned from the deployment of a smartphone-based access-control system
L. Bauer, L. F. Cranor, M. K. Reiter and K. Vaniea. Pages 64–75. doi:10.1145/1280680.1280689


Theoretical Computer Science
2003 Diffusion without false rumors: On propagating updates in a Byzantine environment
D. Malkhi, Y. Mansour and M. K. Reiter. 299(1–3):289–306. doi:10.1016/S0304-3975(02)00325-0


Theory of Cryptography Conference (TCC) [© Springer-Verlag]
2004 Alternatives to non-malleability: Definitions, constructions, and applications
P. MacKenzie, M. K. Reiter and K. Yang. Lecture Notes in Computer Science 2951, pages 171–190.


USENIX Annual Technical Conference
2006 Bump in the ether: A framework for securing sensitive user input
J. M. McCune, A. Perrig and M. K. Reiter. Pages 185–198.


USENIX Conference on File and Storage Technologies (FAST)
2014 Toward strong, usable access control for shared distributed data
M. L. Mazurek, Y. Liang, W. Melicher, M. Sleeper, L. Bauer, G. R. Ganger, N. Gupta, and M. K. Reiter. Pages 89–103.


USENIX Security Symposium
2008 The practical subtleties of biometric key generation
L. Ballard, S. Kamara and M. K. Reiter. Pages 61–74.
2007 Integrity checking in cryptographic file systems with constant trusted storage
A. Oprea and M. K. Reiter. Pages 183–198.
On web browsing privacy in anonymized NetFlows
S. E. Coull, M. P. Collins, C. V. Wright, F. Monrose and M. K. Reiter. Pages 339–352.
2004 On gray-box program tracking for anomaly detection
D. Gao, M. K. Reiter and D. Song. Pages 103–118.
On user choice in graphical password schemes
D. Davis, F. Monrose and M. K. Reiter. Pages 151–164.
2002 Toward speech-generated cryptographic keys on resource constrained devices
F. Monrose, M. K. Reiter, Q. Li, D. P. Lopresti and C. Shih. Pages 283–296.
1999 The design and analysis of graphical passwords
I. Jermyn, A. Mayer, F. Monrose, A. Rubin and M. K. Reiter. Pages 1–14.


USENIX Symposium on Networked Systems Design and Implementation (NSDI)
2012 Design and implementation of a consolidated middlebox architecture
V. Sekar, N. Egi, S. Ratnasamy, M. K. Reiter and G. Shi
2008 cSamp: A system for network-wide flow monitoring
V. Sekar, M. K. Reiter, W. Willinger, H. Zhang, R. R. Kompella, and D. G. Andersen. Pages 233–246.


USENIX Workshop on Electronic Commerce
1998 Detecting hit shaving in click-through payment schemes
M. K. Reiter, V. Anupam and A. Mayer. Pages 155–166.


Back to top
Back to Michael Reiter's home page