Michael K. Reiter

Orcid: 0000-0001-7007-8274

Affiliations:
  • Duke University, Durham, NC, USA
  • Carnegie Mellon University, Pittsburgh, USA (former)


According to our database1, Michael K. Reiter authored at least 275 papers between 1992 and 2024.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2008, "For contributions to computer security and fault-tolerant distributed computing.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models.
CoRR, 2024

2023
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription.
IEEE Secur. Priv., 2023

HashRand: Efficient Asynchronous Random Beacon without Threshold Cryptographic Setup.
IACR Cryptol. ePrint Arch., 2023

Mendata: A Framework to Purify Manipulated Training Data.
CoRR, 2023

The Impact of Exposed Passwords on Honeyword Efficacy.
CoRR, 2023

Group-based Robustness: A General Framework for Customized Robustness in the Real World.
CoRR, 2023

Adversarial Training for Raw-Binary Malware Classifiers.
Proceedings of the 32nd USENIX Security Symposium, 2023

Distance-Aware Private Set Intersection.
Proceedings of the 32nd USENIX Security Symposium, 2023

EESMR: Energy Efficient BFT - SMR for the masses.
Proceedings of the 24th International Middleware Conference, 2023

Nimble: Fast and Safe Migration of Network Functions.
Proceedings of the IEEE INFOCOM 2023, 2023

The Unique Chain Rule and Its Applications.
Proceedings of the Financial Cryptography and Data Security, 2023

Privately Evaluating Region Overlaps with Applications to Collaborative Sensor Output Validation.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Optimally Hiding Object Sizes with Constrained Padding.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

Tackling Credential Abuse Together.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

Prioritizing Remediation of Enterprise Hosts by Malware Execution Risk.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Defeating traffic analysis via differential privacy: a case study on streaming traffic.
Int. J. Inf. Sec., 2022

Bernoulli honeywords.
CoRR, 2022

Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption.
Proceedings of the 26th International Conference on Principles of Distributed Systems, 2022

Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks.
Proceedings of the International Conference on Machine Learning, 2022

Practical Integration via Separable Bijective Networks.
Proceedings of the Tenth International Conference on Learning Representations, 2022

ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Coordinating Followers to Reach Better Equilibria: End-to-End Gradient Descent for Stackelberg Games.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Interpretable noninterference measurement and its application to processor designs.
Proc. ACM Program. Lang., 2021

Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption.
IACR Cryptol. ePrint Arch., 2021

Apollo - Optimistically Linear and Responsive SMR.
IACR Cryptol. ePrint Arch., 2021

The Netivus Manifesto: making collaborative network management easier for the rest of us.
Comput. Commun. Rev., 2021

Brief Announcement: Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption.
Proceedings of the 35th International Symposium on Distributed Computing, 2021

Using Amnesia to Detect Credential Database Breaches.
Proceedings of the 30th USENIX Security Symposium, 2021

Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication.
Proceedings of the 30th USENIX Security Symposium, 2021

TASE: Reducing Latency of Symbolic Execution with Transactional Memory.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Role-Based Deception in Enterprise Networks.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
CPU Elasticity to Mitigate Cross-VM Runtime Monitoring.
IEEE Trans. Dependable Secur. Comput., 2020

Detecting Stuffing of a User's Credentials at Her Own Accounts.
Proceedings of the 29th USENIX Security Symposium, 2020

Metering Graphical Data Leakage with Snowman.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

Defense Through Diverse Directions.
Proceedings of the 37th International Conference on Machine Learning, 2020

n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
A General Framework for Adversarial Examples with Objectives.
ACM Trans. Priv. Secur., 2019

Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection.
CoRR, 2019

n-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers.
CoRR, 2019

HotStuff: BFT Consensus with Linearity and Responsiveness.
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, 2019

Statistical Privacy for Streaming Traffic.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

How to End Password Reuse on the Web.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Efficient and Safe Network Updates with Suffix Causal Consistency.
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019

SBFT: A Scalable and Decentralized Trust Infrastructure.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion.
IACR Cryptol. ePrint Arch., 2018

SBFT: a Scalable Decentralized Trust Infrastructure for Blockchains.
CoRR, 2018

On the Suitability of L<sub>p</sub>-norms for Creating and Preventing Adversarial Examples.
CoRR, 2018

Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition.
CoRR, 2018

Static Evaluation of Noninterference Using Approximate Model Counting.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Differentially Private Access Patterns for Searchable Symmetric Encryption.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

On the Suitability of Lp-Norms for Creating and Preventing Adversarial Examples.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018

Intent-driven composition of resource-management SDN applications.
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies, 2018

BEAT: Asynchronous BFT Made Practical.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Personalized Pseudonyms for Servers in the Cloud.
Proc. Priv. Enhancing Technol., 2017

To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps' Privacy Permission Settings.
Proc. Priv. Enhancing Technol., 2017

Rethinking Security in the Era of Cloud Computing.
IEEE Secur. Priv., 2017

A System to Verify Network Behavior of Known Cryptographic Clients.
Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, 2017

Flow Reconnaissance via Timing Attacks on SDN Switches.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

On-Demand Time Blurring to Support Side-Channel Defense.
Proceedings of the Computer Security - ESORICS 2017, 2017

Secure Causal Atomic Broadcast, Revisited.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Server-side verification of client behavior in cryptographic protocols.
CoRR, 2016

Stealing Machine Learning Models via Prediction APIs.
Proceedings of the 25th USENIX Security Symposium, 2016

Education Modules for Networking, Cloud Computing, and Security in Systems Courses.
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

Simplifying Software-Defined Network Optimization Using SOL.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

Gremlin: Systematic Resilience Testing of Microservices.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational Workers.
Proceedings of the Financial Cryptography and Data Security, 2016

A Software Approach to Defeating Side Channels in Last-Level Caches.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

CCSW'16: 8th ACM Cloud Computing Security Workshop.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Toward practical encrypted email that supports private, regular-expression searches.
Int. J. Inf. Sec., 2015

Accelerating the Development of Software-Defined Network Optimization Applications Using SOL.
CoRR, 2015

Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Replica Placement for Availability in the Worst Case.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

WACCO and LOKO: Strong Consistency at Global Scale.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

Crowdsourced Exploration of Security Configurations.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

Mitigating Storage Side Channels Using Statistical Privacy Mechanisms.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Side Channels in Multi-Tenant Environments.
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 2015

Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Caesar: High-Speed and Memory-Efficient Forwarding Engine for Future Internet Architecture.
Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for networking and communications systems, 2015

2014
StopWatch: A Cloud Architecture for Timing Channel Mitigation.
ACM Trans. Inf. Syst. Secur., 2014

Privacy preserving interactive record linkage (PPIRL).
J. Am. Medical Informatics Assoc., 2014

SNIPS: A Software-Defined Approach for Scaling Intrusion Prevention Systems via Offloading.
Proceedings of the Information Systems Security - 10th International Conference, 2014

Toward strong, usable access control for shared distributed data.
Proceedings of the 12th USENIX conference on File and Storage Technologies, 2014

Defending against device theft with human notarization.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

Cross-Tenant Side-Channel Attacks in PaaS Clouds.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

An Epidemiological Study of Malware Encounters in a Large Enterprise.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
The post anachronism: the temporal dimension of facebook privacy.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Toward Online Verification of Client Behavior in Distributed Applications.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud.
Proceedings of the Computer Security - ESORICS 2013, 2013

Mitigating access-driven timing channels in clouds using StopWatch.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Verifiable network function outsourcing: requirements, challenges, and roadmap.
Proceedings of the 2013 workshop on Hot topics in middleboxes and network function virtualization, 2013

Düppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Secure Decoupled Linkage (SDLink) system for building a social genome.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013

2012
File system virtual appliances: Portable file system implementations.
ACM Trans. Storage, 2012

BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems.
ACM Trans. Inf. Syst. Secur., 2012

Understanding domain registration abuses.
Comput. Secur., 2012

Out of sight, out of mind: Effects of displaying access-control information near the item it controls.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Revisiting Botnet Models and Their Implications for Takedown Strategies.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

Design and Implementation of a Consolidated Middlebox Architecture.
Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, 2012

Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging.
Proceedings of the Financial Cryptography and Data Security, 2012

Third-Party Private DFA Evaluation on Encrypted Files in the Cloud.
Proceedings of the Computer Security - ESORICS 2012, 2012

New opportunities for load balancing in network-wide intrusion detection systems.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2012

Discovering access-control misconfigurations: new approaches and evaluation methodologies.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Tag, you can see it!: using tags for access control in photo sharing.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

Cross-VM side channels and their use to extract private keys.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
False data injection attacks against state estimation in electric power grids.
ACM Trans. Inf. Syst. Secur., 2011

Server-side verification of client behavior in online games.
ACM Trans. Inf. Syst. Secur., 2011

Detecting and resolving policy misconfigurations in access-control systems.
ACM Trans. Inf. Syst. Secur., 2011

Bounded Vector Signatures and their Applications.
IACR Cryptol. ePrint Arch., 2011

HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Usability Testing a Malware-Resistant Input Mechanism.
Proceedings of the Network and Distributed System Security Symposium, 2011

The middlebox manifesto: enabling innovation in middlebox deployment.
Proceedings of the Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), 2011

Amplifying limited expert input to sanitize large network traces.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

More than skin deep: measuring effects of the underlying model on access-control system usability.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
Using Web-Referral Architectures to Mitigate Denial-of-Service Threats.
IEEE Trans. Dependable Secur. Comput., 2010

Selected Results from the Latest Decade of Quorum Systems Research.
Proceedings of the Replication: Theory and Practice, 2010

On Challenges in Evaluating Malware Clustering.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Summary-Invisible Networking: Techniques and Defenses.
Proceedings of the Information Security - 13th International Conference, 2010

Revisiting the case for a minimalist approach for network flow monitoring.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

Are Your Hosts Trading or Plotting? Telling P2P File-Sharing and Bots Apart.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Zzyzx: Scalable fault tolerance through Byzantine locking.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

Network-wide deployment of intrusion detection and prevention systems.
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010

Access control for home data sharing: evaluating social acceptability.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

The security of modern password expiration: an algorithmic framework and empirical analysis.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance.
IEEE Trans. Dependable Secur. Comput., 2009

Seeing-Is-Believing: using camera phones for human-verifiable authentication.
Int. J. Secur. Networks, 2009

When and How to Change Quorums on Wide Area Networks.
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009

xDomain: cross-border proofs of access.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Automatically Adapting a Trained Anomaly Detector to Software Patches.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Safe Passage for Passwords and Other Sensitive Data.
Proceedings of the Network and Distributed System Security Symposium, 2009

Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles.
Proceedings of the Information Systems Security, 5th International Conference, 2009

Better Architectures and New Security Applications for Network Monitoring.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

Data Structures with Unpredictable Timing.
Proceedings of the Computer Security, 2009

Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications.
Proceedings of the Detection of Intrusions and Malware, 2009

Real life challenges in access-control management.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

Privacy-preserving genomic computation through program specialization.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Quiver: Consistent and Scalable Object Sharing for Edge Services.
IEEE Trans. Parallel Distributed Syst., 2008

Fast and Black-box Exploit Detection and Signature Generation for Commodity Software.
ACM Trans. Inf. Syst. Secur., 2008

A multi-layer framework for puzzle-based denial-of-service defense.
Int. J. Inf. Sec., 2008

The Practical Subtleties of Biometric Key Generation.
Proceedings of the 17th USENIX Security Symposium, 2008

Keynote: Trustworthy Services and the Biological Analogy.
Proceedings of the Stabilization, 2008

On the Limits of Payload-Oblivious Network Attack Detection.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Write Markers for Probabilistic Quorum Systems.
Proceedings of the Principles of Distributed Systems, 12th International Conference, 2008

cSamp: A System for Network-Wide Flow Monitoring.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008

Taming the Devil: Techniques for Evaluating Anonymized Network Data.
Proceedings of the Network and Distributed System Security Symposium, 2008

Self-optimizing distributed trees.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

BinHunt: Automatically Finding Semantic Differences in Binary Programs.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Flicker: an execution infrastructure for tcb minimization.
Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, 2008

AGIS: Towards automatic generation of infection signatures.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

Traffic Aggregation for Malware Detection.
Proceedings of the Detection of Intrusions and Malware, 2008

Expandable grids for visualizing and authoring computer security policies.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

A user study of policy creation in a flexible access-control system.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

Towards practical biometric key generation with randomized biometric templates.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

How low can you go?: recommendations for hardware-supported minimal TCB code execution.
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008

2007
Probabilistic Opaque Quorum Systems.
Proceedings of the Distributed Computing, 21st International Symposium, 2007

Integrity Checking in Cryptographic File Systems with Constant Trusted Storage.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

On Web Browsing Privacy in Anonymized NetFlows.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Minimal TCB Code Execution.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Lessons learned from the deployment of a smartphone-based access-control system.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

Low-overhead byzantine fault-tolerant storage.
Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, 2007

Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

Verifying distributed erasure-coded data.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007

Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
Proceedings of the Network and Distributed System Security Symposium, 2007

Consumable Credentials in Linear-Logic-Based Access-Control Systems.
Proceedings of the Network and Distributed System Security Symposium, 2007

Trustworthy Services and the Biological Analogy.
Proceedings of the Computer Security, 2007

Efficient Proving for Practical Distributed Access-Control Systems.
Proceedings of the Computer Security, 2007

Minimizing Response Time for Quorum-System Protocols over Wide-Area Networks.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
On Consistency of Encrypted Files.
Proceedings of the Distributed Computing, 20th International Symposium, 2006

Bump in the Ether: A Framework for Securing Sensitive User Input.
Proceedings of the 2006 USENIX Annual Technical Conference, Boston, MA, USA, May 30, 2006

WRAPS: Denial-of-Service Defense through Web Referrals.
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), 2006

Behavioral Distance Measurement Using Hidden Markov Models.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

Quorum placement in networks: minimizing network congestion.
Proceedings of the Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing, 2006

Forensic Analysis for Epidemic Attacks in Federated Networks.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006

M2: Multicasting Mixes for Efficient and Anonymous Communication.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

A Linear Logic of Authorization and Knowledge.
Proceedings of the Computer Security, 2006

Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors.
Proceedings of the Computer Security, 2006

A Multi-Resolution Approach for Worm Detection and Containment.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

Towards bounded wait-free PASIS.
Proceedings of the From Security to Dependability, 10.09. - 15.09.2006, 2006

Packet vaccine: black-box exploit detection and signature generation.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

Protecting Privacy in Key-Value Search Systems.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Distributed Construction of a Fault-Tolerant Network from a Tree.
Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems (SRDS 2005), 2005

Lazy Verification in Fault-Tolerant Distributed Storage Systems.
Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems (SRDS 2005), 2005

Worm Origin Identification Using Random Moonwalks.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Detection of Denial-of-Message Attacks on Sensor Network Broadcasts.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Distributed Proving in Access-Control Systems.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Fault-scalable Byzantine fault-tolerant services.
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, 2005

Behavioral Distance for Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

Quorum placement in networks to minimize access delays.
Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, 2005

Space-Efficient Block Storage Integrity.
Proceedings of the Network and Distributed System Security Symposium, 2005

Device-Enabled Authorization in the Grey-System.
Proceedings of the Information Security, 8th International Conference, 2005

Censorship Resistance Revisited.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Building Reliable Mix Networks with Fair Exchange.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
Homeland Security.
IEEE Internet Comput., 2004

Two-party generation of DSA signatures.
Int. J. Inf. Sec., 2004

On Gray-Box Program Tracking for Anomaly Detection.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

On User Choice in Graphical Password Schemes.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract).
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004

Nested Objects in a Byzantine Quorum-Replicated System.
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004

An Empirical Analysis of Target-Resident DoS Filters.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

Seurat: A Pointillist Approach to Anomaly Detection.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

Security by, and for, Converged Mobile Devices.
Proceedings of the Information Security and Cryptology, 2004

Time-Scoped Searching of Encrypted Audit Logs.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Timing Attacks in Low-Latency Mix Systems (Extended Abstract).
Proceedings of the Financial Cryptography, 2004

Efficient Byzantine-Tolerant Erasure-Coded Storage.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Mitigating bandwidth-exhaustion attacks using congestion puzzles.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

Fragile mixing.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

Gray-box extraction of execution graphs for anomaly detection.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

Private Keyword-Based Push and Pull with Applications to Anonymous Communication.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Diffusion without false rumors: on propagating updates in a Byzantine environment.
Theor. Comput. Sci., 2003

Networked cryptographic devices resilient to capture.
Int. J. Inf. Sec., 2003

Objects shared by Byzantine processes.
Distributed Comput., 2003

Delegation of cryptographic servers for capture-resilient devices.
Distributed Comput., 2003

The Design and Implementation of a JCA-Compliant Capture Protection Infrastructure.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

Defending Against Denial-of-Service Attacks with Puzzle Auction.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

Automatic generation of two-party computations.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
Password hardening based on keystroke dynamics.
Int. J. Inf. Sec., 2002

Advanced concurrency control in Java.
Concurr. Comput. Pract. Exp., 2002

Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices.
Proceedings of the 11th USENIX Security Symposium, 2002

A Secure Distributed Search System.
Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing (HPDC-11 2002), 2002

2001
On k-Set Consensus Problems in Asynchronous Systems.
IEEE Trans. Parallel Distributed Syst., 2001

Fault Detection for Byzantine Quorum Systems.
IEEE Trans. Parallel Distributed Syst., 2001

An authorization model for a public key management service.
ACM Trans. Inf. Syst. Secur., 2001

Probabilistic Quorum Systems.
Inf. Comput., 2001

Efficient Update Diffusion in Byzantine Environments.
Proceedings of the 20th Symposium on Reliable Distributed Systems (SRDS 2001), 2001

Cryptographic Key Generation from Voice.
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001

Selective private function evaluation with applications to private statistics.
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001

Using voice to generate cryptographic keys.
Proceedings of the 2001: A Speaker Odyssey, 2001

Backoff Protocols for Distributed Mutual Exclusion and Ordering.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001

Discouraging Software Piracy Using Software Aging.
Proceedings of the Security and Privacy in Digital Rights Management, 2001

2000
Secure Execution of Java Applets Using a Remote Playground.
IEEE Trans. Software Eng., 2000

An Architecture for Survivable Coordination in Large Distributed Systems.
IEEE Trans. Knowl. Data Eng., 2000

The Load and Availability of Byzantine Quorum Systems.
SIAM J. Comput., 2000

Privacy-preserving global customization.
Proceedings of the 2nd ACM Conference on Electronic Commerce (EC-00), 2000

Dynamic Byzantine Quorum Systems.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

Which PKI (public key infrastructure) is the right one? (panel session).
Proceedings of the CCS 2000, 2000

1999
Authentication Metric Analysis and Design.
ACM Trans. Inf. Syst. Secur., 1999

High-Confidence Distributed Systems - Guest Editor's Introduction.
IEEE Internet Comput., 1999

On Propagating Updates in a Byzantine Environment
CoRR, 1999

On the Security of Pay-per-Click and Other Web Advertising Schemes.
Comput. Networks, 1999

Anonymous Web Transactions with Crowds.
Commun. ACM, 1999

The Design and Analysis of Graphical Passwords.
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999

On Diffusing Updates in a Byzantine Environment.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999

On <i>k</i>-Set Consensus Problems in Asynchronous Systems.
Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing, 1999

1998
Crowds: Anonymity for Web Transactions.
ACM Trans. Inf. Syst. Secur., 1998

Resilient Authentication Using Path Independence.
IEEE Trans. Computers, 1998

Byzantine Quorum Systems.
Distributed Comput., 1998

Detecting Hit Shaving in Click-Through Payment Schemes.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998

Survivable Consensus Objects.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

Secure and Scalable Replication in Phalanx.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

Secure Execution of Java Applets using a Remote Playground.
Proceedings of the Security and Privacy, 1998

Probabilistic Byzantine Quorum Systems.
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998

1997
A High-Throughput Secure Reliable Multicast Protocol.
J. Comput. Secur., 1997

Toward Acceptable Metrics of Authentication.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

Probabilistic Quorum Systems.
Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing, 1997

Unreliable Intrusion Detection in Distributed Computations.
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997

Path Independence for Authentication in Large-Scale Systems.
Proceedings of the CCS '97, 1997

Fair Exchange with a Semi-Trusted Third Party (extended abstract).
Proceedings of the CCS '97, 1997

1996
A Secure Group Membership Protocol.
IEEE Trans. Software Eng., 1996

The Design and Implementation of a Secure Auction Service.
IEEE Trans. Software Eng., 1996

The Omega Key Management Service.
J. Comput. Secur., 1996

Distributed Trust with the Rampart Toolkit.
Commun. ACM, 1996

Low-Exponent RSA with Related Messages.
Proceedings of the Advances in Cryptology, 1996

1995
Securing Causal Relationships in Distributed Systems.
Comput. J., 1995

Verifiable Signature Sharing.
Proceedings of the Advances in Cryptology, 1995

1994
How to Securely Replicate Services.
ACM Trans. Program. Lang. Syst., 1994

A Security Architecture for Fault-Toerant Systems.
ACM Trans. Comput. Syst., 1994

The Rampart Toolkit for Building High-Integrity Services.
Proceedings of the Theory and Practice in Distributed Systems, International Workshop, 1994

Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart.
Proceedings of the CCS '94, 1994

1993
A Security Architecture for Fault-Tolerant Systems.
PhD thesis, 1993

Preventing denial and forgery of causal relationships in distributed systems.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993

1992
Integrating Security in a Group Oriented Distributed System (Abstract).
ACM SIGOPS Oper. Syst. Rev., 1992

Integrating security in a group oriented distributed system.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992


  Loading...